2012
DOI: 10.1109/tsg.2012.2192487
|View full text |Cite
|
Sign up to set email alerts
|

A Randomized Response Model for Privacy Preserving Smart Metering

Abstract: The adoption of smart meters may bring new privacy concerns to the general public. Given the fact that metering data of individual homes/factories is accumulated every 15 minutes, it is possible to infer the pattern of electricity consumption of individual users. In order to protect the privacy of users in a completely de-centralized setting (i.e., individuals do not communicate with one another), we propose a novel protocol, which allows individual meters to report the true electricity consumption reading wit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 70 publications
(38 citation statements)
references
References 26 publications
(31 reference statements)
0
38
0
Order By: Relevance
“…increase) its consumption, and thus, in practice it is not possible to achieve a constant rate. Anonymization Anonymization techniques allow the service provider to obtain meter data from users without being able to tell apart the meter readings that belong to each individual user [16,51]. This technique can be useful for applications such as forecasting, leak detection or flow monitoring, where knowing the consumption of each user may not be needed.…”
Section: Related Workmentioning
confidence: 99%
“…increase) its consumption, and thus, in practice it is not possible to achieve a constant rate. Anonymization Anonymization techniques allow the service provider to obtain meter data from users without being able to tell apart the meter readings that belong to each individual user [16,51]. This technique can be useful for applications such as forecasting, leak detection or flow monitoring, where knowing the consumption of each user may not be needed.…”
Section: Related Workmentioning
confidence: 99%
“…Night Dragon was an intrusion ostensibly originating in China [6] and aimed at probing industrial control systems of energy companies (oil, gas, and petrochemical) in the United States. The attacks used a combination of social engineering and vulnerabilities in remote administration tools on Windows platforms to break into critical computers on the network to gather proprietary information including documents related to oil and gas field exploration and business negotiations as well as details of SCADA systems.…”
Section: Reported Attacks On Electric Gridsmentioning
confidence: 99%
“…Note that utilizing a rechargeable battery does not mean that the load peak or energy consumption profile could be completely hidden, but the inference from the metering data could be significantly limited. Similarly, Wang et al [6] proposed a protocol to enable individual meters to report the true energy consumption readings with a predetermined probability. The randomized response model also obfuscated the metering data so as to prevent the inference of individual households' electricity consumption patterns.…”
Section: Metering Data Protectionmentioning
confidence: 99%
“…Third party escrow mechanisms [1,7,20] require the presence of a trusted third party entity whose role is to anonymize the data collected from the customers and then present it to the DSO or to aggregate the data and present it in an anonymized form. As mentioned in Section 2.1, Efthymiou and Kalogridis [7] present a solution based on separation of data into attributable low-frequency data, collected seldom and mainly used for billing, and anonymized high-frequency data, collected very often and used for grid operation.…”
Section: Overview Of Smart Grid Privacy Mechanisms In the Literaturementioning
confidence: 99%