Skip to main content

Differential Privacy in Power Big Data Publishing

  • Conference paper
  • First Online:
  • 1381 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 729))

Abstract

In recent years, the development of smart grid leads to the explosive growth of power big data. Power companies can analyze these data to provide personalized services to users. However, the analysis of power big data can have the risk of user privacy disclosure. The performance of the traditional algorithms is not satisfied due to the complexity of the power big data on preventing information leakage. Distributed and heterogeneous data generated in the operation, maintenance and other processes of electricity smart grid can cause the complexity of the data. This paper proposes a method of differential privacy to preserve privacy in the power big data publishing. The experimental results shows that the performance of our method is convincing.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Acs, G., Castelluccia, C.: I have a dream! (differentially private smart metering). In: Information Hiding - International Conference, 18–20 May 2011, Prague, Czech Republic, Revised Selected Papers, pp. 118–132 (2011)

    Google Scholar 

  2. Chu, D., Li, Y., Wang, T., Zhang, L.: Practical anonymization for protecting privacy in combinatorial maps, pp. 119–123 (2014)

    Google Scholar 

  3. Clifton, C., Tassa, T.: On syntactic anonymity and differential privacy. In: IEEE International Conference on Data Engineering Workshops, pp. 161–183 (2013)

    Google Scholar 

  4. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008). doi:10.1007/978-3-540-79228-4_1

    Chapter  Google Scholar 

  5. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). doi:10.1007/11681878_14

    Chapter  Google Scholar 

  6. Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends? Theor. Comput. Sci. 9(3–4), 211–407 (2014)

    MathSciNet  MATH  Google Scholar 

  7. Erkin, Z., Tsudik, G.: Private computation of spatial and temporal power consumption with smart meters. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 561–577. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31284-7_33

    Chapter  Google Scholar 

  8. Garcia, F.D., Jacobs, B.: Privacy-friendly energy-metering via homomorphic encryption. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 226–238. Springer, Heidelberg (2011). doi:10.1007/978-3-642-22444-7_15

    Chapter  Google Scholar 

  9. Jain, P., Kulkarni, V., Thakurta, A., Williams, O.: To drop or not to drop: robustness, consistency and differential privacy properties of dropout. Comput. Sci. (2015). arXiv:1503.02031

  10. Lei, J.: Differentially private m-estimators. In: Advances in Neural Information Processing Systems (2011)

    Google Scholar 

  11. Li, F., Luo, B., Liu, P.: Secure information aggregation for smart grids using homomorphic encryption. In: IEEE International Conference on Smart Grid Communications, pp. 327–332 (2010)

    Google Scholar 

  12. Li, Y., Shen, H.: On identity disclosure control for hypergraph-based data publishing. IEEE Trans. Inf. Forensics Secur. 8(8), 1384–1396 (2013)

    Article  Google Scholar 

  13. Li, Y., Li, Y., Xu, G.: Protecting private geosocial networks against practical hybrid attacks with heterogeneous information. Neurocomputing 210, 81–90 (2016)

    Article  Google Scholar 

  14. Xiong, P., Zhu, T.Q., Wang, X.F.: A survey on differential privacy and applications. Chin. J. Comput. 37(1), 101–122 (2014)

    Google Scholar 

  15. Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: ACM Conference on Computer and Communications Security, pp. 1310–1321 (2015)

    Google Scholar 

  16. Wang, D.: Application of big date visualization technique in power grid enterprise. Jiangsu Electrical Engineering (2014)

    Google Scholar 

  17. Wang, Y., Si, C., Wu, X.: Regression model fitting under differential privacy and model inversion attack. In: International Conference on Artificial Intelligence (2015)

    Google Scholar 

  18. Wang, Y., Wu, X., Wu, L.: Differential privacy preserving spectral graph analysis. In: Pei, J., Tseng, V.S., Cao, L., Motoda, H., Xu, G. (eds.) PAKDD 2013. LNCS, vol. 7819, pp. 329–340. Springer, Heidelberg (2013). doi:10.1007/978-3-642-37456-2_28

    Chapter  Google Scholar 

  19. Zhan, J., Huang, J., Niu, L., Peng, X., Deng, D., Cheng, S.: Study of the key technologies of electric power big data and its application prospects in smart grid. In: 2014 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), pp. 1–4 (2014)

    Google Scholar 

  20. Zheng, H., Cong, J.I., Zheng, X., Kunming, L.I.: Analysis technology and typical scenario application of electricity big data of power consumers. Power Syst. Technol. 39, 3147–3152 (2015)

    Google Scholar 

Download references

Acknowledgement

This work is supported by National Science Foundation of China Grant #61672088, Fundamental Research Funds for the Central Universities #2016JBM022 and #2015ZBJ007, Open Research Funds of Guangdong Key Laboratory of Popular High Performance Computers.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yidong Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd

About this paper

Cite this paper

Kong, P., Wang, X., Zhang, B., Li, Y. (2017). Differential Privacy in Power Big Data Publishing. In: Chen, G., Shen, H., Chen, M. (eds) Parallel Architecture, Algorithm and Programming. PAAP 2017. Communications in Computer and Information Science, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-6442-5_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6442-5_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6441-8

  • Online ISBN: 978-981-10-6442-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics