No peeking: privacy-preserving demand response system in smart grids

被引:6
作者
Li, Depeng [1 ]
Aung, Zeyar [2 ]
Williams, John R. [3 ]
Sanchez, Abel [3 ]
机构
[1] Univ Hawaii Manoa, Dept Informat & Comp Sci, Honolulu, HI 96822 USA
[2] Masdar Inst Sci & Technol, Comp & Informat Sci, Abu Dhabi, U Arab Emirates
[3] MIT, Dept Civil & Environm Engn, Cambridge, MA 02139 USA
关键词
data encryption; multicast; privacy; smart grids;
D O I
10.1080/17445760.2013.851677
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Demand response (DR) programs are widely used to balance the supply and demand of electricity in a smart grid. This results in a reliable electric power system. Unfortunately, privacy violation becomes a pressing challenge that drastically affects the DR programs. Power usage and operational data can be abused to infer personal information of customers. Without a well-designed privacy preservation mechanism, adversaries can capture, model and divulge customers' behaviour and activities. In this paper, we first investigate the natures of privacy leakages and explore potential privacy threat models. After that, we design and implement a new protocol named privacy-preserving demand response based on the attributed-based encryption, and formally prove its validity. To demonstrate its viability, the protocol is adopted in several types of DR programs on an emulated smart grid platform. Experimental results show substantially lighter overheads while formidable privacy challenges are addressed.
引用
收藏
页码:290 / 315
页数:26
相关论文
共 34 条
[1]  
Albadi Mohamed H, 2007, PROC IEEE PES GEN M, P1, DOI [10.1109/PES.2007.385728, DOI 10.1109/PES.2007.385728]
[2]  
Barreto PSLM, 2004, J CRYPTOL, V17, P321, DOI [10.1007/s00I45-004-03U-z, 10.1007/s00145-004-0311-z]
[3]  
Bellare M, 1998, LECT NOTES COMPUT SC, V1462, P26, DOI 10.1007/BFb0055718
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]   AERO: Extraction of User's Activities from Electric Power Consumption Data [J].
Cho, Hyun Sang ;
Yamazaki, Tatsuya ;
Hahn, Minsoo .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (03) :2011-2018
[6]   CONSUMER RATIONALITY ASSUMPTIONS IN THE REAL-TIME PRICING OF ELECTRICITY [J].
DAVID, AK ;
LI, YZ .
IEE PROCEEDINGS-C GENERATION TRANSMISSION AND DISTRIBUTION, 1992, 139 (04) :315-322
[7]  
Efthymiou C, 2010, INT CONF SMART GRID, P238, DOI 10.1109/SMARTGRID.2010.5622050
[8]  
Garcia FD, 2011, LECT NOTES COMPUT SC, V6710, P226, DOI 10.1007/978-3-642-22444-7_15
[9]  
Hur J., SECURE DATA RETRIEVA
[10]   Decentralizing Attribute-Based Encryption [J].
Lewko, Allison ;
Waters, Brent .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 :568-588