No peeking: privacy-preserving demand response system in smart grids
- 12 November 2013
- journal article
- research article
- Published by Taylor & Francis in International Journal of Parallel, Emergent and Distributed Systems
- Vol. 29 (3), 290-315
- https://doi.org/10.1080/17445760.2013.851677
Abstract
Demand response (DR) programs are widely used to balance the supply and demand of electricity in a smart grid. This results in a reliable electric power system. Unfortunately, privacy violation becomes a pressing challenge that drastically affects the DR programs. Power usage and operational data can be abused to infer personal information of customers. Without a well-designed privacy preservation mechanism, adversaries can capture, model and divulge customers' behaviour and activities. In this paper, we first investigate the natures of privacy leakages and explore potential privacy threat models. After that, we design and implement a new protocol named privacy-preserving demand response based on the attributed-based encryption, and formally prove its validity. To demonstrate its viability, the protocol is adopted in several types of DR programs on an emulated smart grid platform. Experimental results show substantially lighter overheads while formidable privacy challenges are addressed.Keywords
This publication has 23 references indexed in Scilit:
- Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart GridSmart Grid and Renewable Energy, 2013
- Minimizing private data disclosures in the smart gridPublished by Association for Computing Machinery (ACM) ,2012
- A Key Management Scheme for Secure Communications of Advanced Metering Infrastructure in Smart GridIEEE Transactions on Industrial Electronics, 2012
- Smart meter privacy: A utility-privacy frameworkPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Security Technology for Smart Grid NetworksIEEE Transactions on Smart Grid, 2010
- Attribute-based encryption with non-monotonic access structuresPublished by Association for Computing Machinery (ACM) ,2007
- Demand Response in Electricity Markets: An OverviewPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Ciphertext-Policy Attribute-Based EncryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Efficient Implementation of Pairing-Based CryptosystemsJournal of Cryptology, 2004
- Consumer rationality assumptions in the real-time pricing of electricityIEE Proceedings C Generation, Transmission and Distribution, 1992