Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security 2013
DOI: 10.1145/2484313.2484362
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving smart metering with regional statistics and personal enquiry services

Abstract: In smart grid, households may send the readings of their energy usage to the utility and a third-party service provider which provides analyzed statistics data to users. User privacy becomes an important issue in this application. In this paper, we propose a new cryptographic-based solution for the privacy issue in smart grid systems. The advantages of our system are twofold: Households can send authenticated energy consumption readings to a third-party service provider anonymously. The service provider learns… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 43 publications
0
12
0
Order By: Relevance
“…Other criteria in smart grid systems include identity anonymization as a way to conceal users' real identities by exploiting zero knowledge proof, pseudonyms, and various kinds of signature schemes [32,[51][52][53][54][55][56][57]. Wang et al [57] proposed an anonymous aggregation scheme in a fog computing environment by exploiting the Castagnos-Laguillaumie cryptosystem.…”
Section: Privacy-preserving Aggregation With Authenticationmentioning
confidence: 99%
“…Other criteria in smart grid systems include identity anonymization as a way to conceal users' real identities by exploiting zero knowledge proof, pseudonyms, and various kinds of signature schemes [32,[51][52][53][54][55][56][57]. Wang et al [57] proposed an anonymous aggregation scheme in a fog computing environment by exploiting the Castagnos-Laguillaumie cryptosystem.…”
Section: Privacy-preserving Aggregation With Authenticationmentioning
confidence: 99%
“…Since any security breach in smart grids may lead to a big loss, there are initiatives to address security challenges in this type of systems. For examples, authors of [32], [15], [27] and [8] proposed different methods to address the security issues related to information processing of smart meters while Zhang et al [49] and Wei et al [48] respectively introduced security frameworks to control the consistency of security requirements across all smart grid components and to protect smart grids against cyber attacks. On the other hand, the Metke and Ekl [35] discussed key components for security in smart grids and Rogers et al [39] presented an authentication and integrity approach that used digital signatures and timestamps.…”
Section: Other Approaches To Smart Grid Securitymentioning
confidence: 99%
“…The proposed ECS and GECS problems assume all of the appliances are continuously on in a specified number of time slots. Occasionally, an agent may intend to turn on an appliance multiple times out of the entire n time slots; for instance, in a 12-h scheduling (n = 12 and 1 h each time slot), if agent i plans to run the washer (its j-th appliance) for 4 h in total, but 2 h in the morning (k ∈ [1,4]) and 2 h in the evening (k ∈ [9,12]). We can formulate two sets of constraints for such appliance in the scheduling as ∀k ∈ [1,4], ∑ 4 k=1 x ijk = 2 and ∀k ∈ [9,12], ∑ 4 k=1 x ijk = 2.…”
Section: Running Multiple Timesmentioning
confidence: 99%
“…Analyzing such fine-grained meter readings (viz. the energy demand) functions for many applications for electric utilities and consumers on the grid, such as load forecasting [2], billing [3], regional statistics [4] and energy theft detection [5].…”
Section: Introductionmentioning
confidence: 99%