2017
DOI: 10.1515/popets-2017-0045
|View full text |Cite
|
Sign up to set email alerts
|

Two Is Not Enough: Privacy Assessment of Aggregation Schemes in Smart Metering

Abstract: Abstract:The widespread deployment of smart meters that frequently report energy consumption information, is a known threat to consumers' privacy. Many promising privacy protection mechanisms based on secure aggregation schemes have been proposed. Even though these schemes are cryptographically secure, the energy provider has access to the plaintext aggregated power consumption. A privacy trade-off exists between the size of the aggregation scheme and the personal data that might be leaked, where smaller aggre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
59
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(60 citation statements)
references
References 26 publications
1
59
0
Order By: Relevance
“…In 2015, a study by industrial body Energy Networks Association in the UK concluded that aggregating the consumption of only two smart meters provides privacy [49]. The conclusions of this study were recently disputed in [50]; however, it was shown that larger groups (of around hundreds) with lower temporal resolution (sampling time of multiple hours) can provide significant privacy to households. One way to obtain aggregate consumption reports is to measure the electricity consumption at substation levels.…”
Section: Smart‐meter Privacy With Data Manipulationmentioning
confidence: 97%
See 1 more Smart Citation
“…In 2015, a study by industrial body Energy Networks Association in the UK concluded that aggregating the consumption of only two smart meters provides privacy [49]. The conclusions of this study were recently disputed in [50]; however, it was shown that larger groups (of around hundreds) with lower temporal resolution (sampling time of multiple hours) can provide significant privacy to households. One way to obtain aggregate consumption reports is to measure the electricity consumption at substation levels.…”
Section: Smart‐meter Privacy With Data Manipulationmentioning
confidence: 97%
“…As stated in the introduction, tracing attacks against aggregated smart‐meter readings [50] and non‐intrusive load monitoring attacks [18] are two common privacy attacks used by adversaries. In [78], it is shown that noiseless privacy can severely disrupt performance of such attacks.…”
Section: Smart‐meter Privacy With Data Manipulationmentioning
confidence: 99%
“…At this point, the goal of the aggregation protocol as well as our analysis ends. Yet, the data concentrator is not capable to extract individual measurements from the sum, if the number of smart meters is large enough [20]. • The aggregator, if present, performs mathematical operations on the protected measurements, but has no means to see the bare individual measurements.…”
Section: A Involved Partiesmentioning
confidence: 99%
“…• Heuristic: Problems that are not trivial to solve in general, but may be easy for some hard-to-define cases or input data. For example, extracting (disaggregating) one distinct measurement m d from an aggregation result M = m d + i m i depends on the distribution of the measurements [20].…”
Section: Privacy Levelsmentioning
confidence: 99%
“…In this work, we strive to bring energy providers in the position to train load forecast models on differentially private aggregated data from electricity customers. Differential Privacy is required due to possible insufficiencies of pure aggregation for privacy protection [8,31].…”
Section: Differentially Private Metering Processmentioning
confidence: 99%