Technical Papers
Apr 18, 2014

Achievable Privacy in Aggregate Residential Energy Management Systems

Publication: Journal of Energy Engineering
Volume 141, Issue 1

Abstract

Demand-side energy management systems consist of communication links between consumer homes and a centralized scheduler, whose main responsibility is to make decisions regarding curtailment, shifting, or modification of individual loads so that the aggregate load profile closely matches a predetermined supply function for a given time horizon. One challenge for aggregators using a centralized energy management system is the consumer’s wariness of exposing usage data to third parties. Thus, the transmission of load requests from individual consumers to the centralized scheduler must support the flexibility of anonymizing usage data from potential eavesdroppers. This paper considers how load request times can be hidden from any third party entity by incorporating a packet scheduler that collects individual load requests within a consumer’s home and reschedules the load request packets by inserting dummy packets to hide the true load request instances. The packet scheduler impacts performance of the aggregate energy management system and the consumer’s quality of service by introducing a delay that helps distort true load request times. Furthermore, it impacts the design of the underlying communication infrastructure in terms of required bandwidth. The paper provides an analytical framework for quantifying the trade-off between the system metrics of privacy, bandwidth, and utility of the centralized scheduler when anonymity is enabled via delay and dummy packet insertions.

Get full access to this article

View all available purchase options and get full access to this article.

References

Blahut, R. E. (1972). “Computation of channel capacity and rate-distortion functions.” IEEE Trans. Inform. Theor., 18(4), 460–473.
California Public Utilities Commission (PUC). (2011). “Decision 11-07-056.” California Public Utilities Commission 〈http://www.cpuc.ca.gov/NR/rdonlyres/56281147-02B8-42FC-A768-1448ED18373C/0/SCESmartGridAnnualPrivacyReport2013.pdf〉 (Jul. 28, 2011).
Cover, T., and Thomas, J. (1991). Elements of information theory, Wiley, New York.
Danezis, G., Dingledine, R., and Mathewson, N. (2003). “Mixminion: Design of a type III anonymous remailer protocol.” Proc., 2003 Symp. on Security and Privacy, IEEE Computer Society, Washington, DC, 2–15.
Dwork, C. (2006). “Differential privacy.” Automata, languages and programming, lecture notes in computer science, Vol. 4052, Springer, Berlin, 1–12.
Efthymiou, C., and Kalogridis, G. (2010). “Smart grid privacy via anonymization of smart metering data.” Proc., IEEE 1st Int. Conf. on Smart Grid Communications, IEEE Communications Society, 238–243.
Kalogridis, G., Efthymiou, C., Denic, S. Z., Lewis, T. A., and Cepeda, R. (2010). “Privacy for smart meters: Towards undetectable appliance load signatures.” Proc., IEEE 1st Int. Conf. on Smart Grid Communications, IEEE Communications Society, 232–237.
Kishore, S., and Snyder, L. V. (2010). “Control mechanisms for residential electricity demand in smart grids.” Proc., IEEE 1st Int. Conf. on Smart Grid Communications, IEEE Communications Society, Gaithersburg, MD, 443–448.
Li, F., Luo, B., and Liu, P. (2010). “Secure information aggregation for smart grids using homomorphic encryption.” Proc., IEEE 1st Int. Conf. on Smart Grid Communications, IEEE Communications Society, 327–332.
McLaughlin, S., McDaniel, P., and Aiello, W. (2011). “Protecting consumer privacy from electric load monitoring.” Proc., 18th Association for Computing Machinery Conf. on Computer and Communication Security, ACM Special Interest Group on Security, Audit and Control (SIGSAC).
Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., and Irwin, D. (2010). “Private memoirs of a smart meter.” Proc., 2nd ACM Workshop Embedded Sensing Systems for Energy-Efficiency in Buildings, ACM, 61–66.
Rajagopalan, R., Sankar, L., Mohajer, S., and Poor, H. V. (2011). “Smart meter privacy: A utility-privacy tradeoff framework.” Proc., IEEE 2nd Int. Conf. on Smart Grid Communications, IEEE Communications Society.
Rastogi, V., and Nath, S. (2010). “Differentially private aggregation of distributed time-series with transformation and encryption.” Proc., 2010 Int. Conf. Data Management, SCITEPRESS Digital Library, 735–746.
Raymond, J.-F. (2001). “Traffic analysis: Protocols, attacks, design issues and open problems.” Designing Privacy Enhancing Technologies: Proc., Int. Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science, H. Federrath, ed., Vol. 2009, Springer, Berlin, 10–29.
Reed, M. G., Syverson, P. F., and Goldschlag, D. M. (1998). “Anonymous connections and onion routing.” IEEE J. Sel. Areas Commun., 16(4), 482–494.
Serjantov, A., and Sewell, P. (2005). “Passive-attack analysis for connection-based anonymity systems.” Int. J. Inform. Secur., 4(3), 5262–5270.
Shannon, C. E. (1949). “Communication theory of secrecy systems.” Bell Syst. Tech. J., 28(4), 656–714.
Sultanem, F. (1991). “Using appliance signatures for monitoring residential loads at meter panel level.” IEEE Trans. Power Delivery, 6(4), 1380–1385.
U.S. Department of Energy (DOE). (2009). “The smart grids: An introduction.” DOE Office of Electricity Delivery and Energy Reliability 〈http://energy.gov/oe/downloads/smart-grid-introduction-0〉 (Jun. 19, 2013).
U.S. Energy Information Administration. (2011). “International energy outlook 2011.” U.S. Energy Information Administration Rep. No. DOE/EIA-0484, 〈http://www.large.stanford.edu/courses/2012/ph241/miller1/docs/0484-2011.pdf〉 (Jun. 19, 2013).
Varodayan, D., and Khisti, A. (2011). “Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage.” Proc., IEEE Int. Conf. on Acoustics, Speech and Signal Processing, IEEE Signal Processing Society.
Voydock, V. L., and Kent, S. T. (1983). “Security mechanisms in high-level network protocols.” ACM Comput. Surv., 15(2), 135–171.
West, N. (1988). The SIGINT secrets: The signal intelligence war: 1900 to today, William Morrow, New York.

Information & Authors

Information

Published In

Go to Journal of Energy Engineering
Journal of Energy Engineering
Volume 141Issue 1March 2015

History

Received: Jun 24, 2013
Accepted: Jan 14, 2014
Published online: Apr 18, 2014
Discussion open until: Sep 18, 2014
Published in print: Mar 1, 2015

Permissions

Request permissions for this article.

Authors

Affiliations

Graduate Student, Dept. of Electrical and Computer Engineering, Lehigh Univ., Bethlehem, PA 18015. E-mail: [email protected]
Graduate Student, Dept. of Industrial and Systems Engineering, Lehigh Univ., Bethlehem, PA 18015. E-mail: [email protected]
Parv Venkitasubramaniam [email protected]
Assistant Professor, Dept. of Electrical and Computer Engineering, Lehigh Univ., Bethlehem, PA 18015. E-mail: [email protected]
Shalinee Kishore [email protected]
Associate Professor, Dept. of Electrical and Computer Engineering, Lehigh Univ., Bethlehem, PA 18015 (corresponding author). E-mail: [email protected]
Lawrence V. Snyder [email protected]
Associate Professor, Dept. of Industrial and Systems Engineering, Lehigh Univ., Bethlehem, PA 18015. E-mail: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share