Abstract
In the smart grid, the power usage of households are recorded and analyzed in (near) real time by utility companies. The usage data enables a utility to manage its electric power supply to neighborhoods more efficiently and effectively. For instance, to prevent a power outage during a peak demand period, the utility can determine the power supply threshold for a neighborhood. When the total power usage of the neighborhood exceeds the threshold, certain households in the neighborhood are required to reduce their energy consumption. This type of power usage control benefits electric utilities and their consumers. However, the energy usage data collected by a utility can also be used to profile an individual’s daily activities – a potentially serious breach of personal privacy. To address the problem, this paper specifies distributed, privacy-preserving energy usage control protocols that enable utilities to efficiently manage power distribution while ensuring that individual power usage data is not revealed.
Chapter PDF
Similar content being viewed by others
References
M. Atallah, M. Bykova, J. Li, K. Frikken and M. Topkara, Private collaborative forecasting and benchmarking, Proceedings of the ACM Workshop on Privacy in the Electronic Society, pp. 103–114, 2004.
A. Ben-David, N. Nisan and B. Pinkas, FairplayMP: A system for secure multi-party computation, Proceedings of the Fifteenth ACM Conference on Computer and Communications Security, pp. 257–266, 2008.
M. Blanton, Empirical Evaluation of Secure Two-Party Computation Models, CERIAS Technical Report TR 2005-58, Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, Indiana, 2005.
S. Drenker and A. Kader, Nonintrusive monitoring of electric loads, IEEE Computer Applications in Power, vol. 12(4), pp. 47–50, 1999.
O. Goldreich, The Foundations of Cryptography, Volume II: Basic Applications, Cambridge University Press, Cambridge, United Kingdom, 2004.
O. Goldreich, S. Micali and A. Wigderson, How to play any mental game, Proceedings of the Nineteenth Annual ACM Symposium on the Theory of Computing, pp. 218–229, 1987.
S. Goldwasser, S. Micali and C. Rackoff, The knowledge complexity of interactive proof systems, Proceedings of the Seventeenth Annual ACM Symposium on the Theory of Computing, pp. 291–304, 1985.
M. Lisovich, D. Mulligan and S. Wicker, Inferring personal information from demand-response systems, IEEE Security and Privacy, vol. 8(1), pp. 11–20, 2010.
P. Paillier, Public key cryptosystems based on composite degree residuosity classes, Proceedings of the Seventeenth International Conference on the Theory and Application of Cryptographic Techniques, pp. 223–238, 1999.
E. Quinn, Privacy and the New Energy Infrastructure, CEES Working Paper No. 09-001, Center for Energy and Environmental Security, University of Colorado Law School, Boulder, Colorado, 2009.
E. Quinn, Smart Metering and Privacy: Existing Law and Competing Policies, Report for the Colorado Public Utilities Commission, University of Colorado Law School, Boulder, Colorado, 2009.
Smart Grid Interoperability Panel, Guidelines for Smart Grid Security (Introduction, Volumes 1, 2 and 3), NIST IR 7628, National Institute of Standards and Technology, Gaithersburg, Maryland, 2010.
L. Xiong, S. Chitti and L. Liu, Topk queries across multiple private databases, IEEE Security and Privacy, pp. 145–154, 2005.
A. Yao, Protocols for secure computations, Proceedings of the Twenty-Third Annual Symposium on the Foundations of Computer Science, pp. 160–164, 1982.
A. Yao, How to generate and exchange secrets, Proceedings of the Twenty-Seventh Annual Symposium on the Foundations of Computer Science, pp. 162–167, 1986.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Hu, C., Jiang, W., McMillin, B. (2012). Privacy-Preserving Power Usage Control in the Smart Grid. In: Butts, J., Shenoi, S. (eds) Critical Infrastructure Protection VI. ICCIP 2012. IFIP Advances in Information and Communication Technology, vol 390. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35764-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-35764-0_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35763-3
Online ISBN: 978-3-642-35764-0
eBook Packages: Computer ScienceComputer Science (R0)