IEEE INFOCOM 2014 - IEEE Conference on Computer Communications 2014
DOI: 10.1109/infocom.2014.6847974
|View full text |Cite
|
Sign up to set email alerts
|

Achieving differential privacy of data disclosure in the smart grid

Abstract: Abstract-The smart grid introduces new privacy implications to individuals and their family due to the fine-grained usage data collection. For example, smart metering data could reveal highly accurate real-time home appliance energy load, which may be used to infer the human activities inside the houses. One effective way to hide actual appliance loads from the outsiders is Battery-based Load Hiding (BLH), in which a battery is installed for each household and smartly controlled to store and supply power to th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
65
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 125 publications
(65 citation statements)
references
References 26 publications
0
65
0
Order By: Relevance
“…Zhao et al [27] proposed a metric for load signature moderation schemes, while Eibl et al [28] examined the effect of adding Laplacian noise to aggregated smart meter load profiles. Shankar et al [29] use the F-Test to measure and compare raw and noisy load profiles.…”
Section: Privacy Metricsmentioning
confidence: 99%
“…Zhao et al [27] proposed a metric for load signature moderation schemes, while Eibl et al [28] examined the effect of adding Laplacian noise to aggregated smart meter load profiles. Shankar et al [29] use the F-Test to measure and compare raw and noisy load profiles.…”
Section: Privacy Metricsmentioning
confidence: 99%
“…Counteracting attacks based on Non-Intrusive Load Monitoring (NILM) of energy usage traces has been addressed by a consistent body of literature (see [16] for a survey). Typical solutions rely on battery-based load hiding [17], [18], on noise injection (e.g. according to the framework of differential privacy [19]) or on multi-party computation cryptographic techniques [20], [21].…”
Section: Related Workmentioning
confidence: 99%
“…They are presented to achieve collusion-resistant or fault-tolerable data aggregation with privacy preservation. However, they leverage the differential privacy [18], [19], [20], [21] in various ways to achieve privacy as well as collusion (or fault) tolerance. The results given by their solutions contain asymptotically bounded error, and those works may not be applicable when exact results are desired.…”
Section: Related Workmentioning
confidence: 99%