The influence of dataset characteristics on privacy preserving methods in the advanced metering infrastructure

The computing and communication devices employed by the cyber-physical IoT-enabled systems generate large quantities of data. These data offer new possibilities but also raise a number of challenges, especially through their social implications. One of these challenges is preserving the privacy of the individuals whose behavior generates the data in question. Studying how the characteristics of these large datasets may influence the efficiency of different privacy enhancing methods is important. Stakeholders can then better understand the properties of their datasets and the conditions under which such datasets can be released to third parties. In this paper we study the effect of Advanced Metering Infrastructure (AMI) dataset characteristics on privacy preserving solutions previously proposed in the literature. We focus on common characteristics (data granularity, retention time and use of pseudonyms) and we study their effect on two privacy violations: de-anonymization and de-pseudonymization. In order to better understand their effect, we study the capabilities of the adversary through its modeling and description by a probabilistic framework. We perform evaluations on a large dataset collected from a real AMI environment. Our results show that simple changes in the data collection procedure can help mitigate the outcome of these privacy violations.

[1]  Vitaly Shmatikov,et al.  Myths and fallacies of "Personally Identifiable Information" , 2010, Commun. ACM.

[2]  S. Sastry,et al.  Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[3]  Sonja Buchegger,et al.  Privacy-Preserving Access Control in Publicly Readable Storage Systems , 2015, Privacy and Identity Management.

[4]  Prashant J. Shenoy,et al.  Private memoirs of a smart meter , 2010, BuildSys '10.

[5]  P. Schegner,et al.  Energy loss estimation in distribution networks for planning purposes , 2009, 2009 IEEE Bucharest PowerTech.

[6]  Dogan Kesdogan,et al.  GridPriv: A Smart Metering Architecture Offering k-Anonymity , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[7]  Klemens Böhm,et al.  Re-identification of Smart Meter data , 2012, Personal and Ubiquitous Computing.

[8]  Valentin Tudor,et al.  A study on data de-pseudonymization in the smart grid , 2015, EUROSEC.

[9]  S. Fischer-Hübner IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms , 2001 .

[10]  Giacomo Verticale,et al.  The Role of Smart Meters in Enabling Real-Time Energy Services for Households: The Italian Case , 2017 .

[11]  Max Mühlhäuser,et al.  Analysis of privacy-enhancing protocols based on anonymity networks , 2012, 2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm).

[12]  Xiaoqian Jiang,et al.  A Randomized Response Model for Privacy Preserving Smart Metering , 2012, IEEE Transactions on Smart Grid.

[13]  Giacomo Verticale,et al.  Enabling Privacy in a Distributed Game-Theoretical Scheduling System for Domestic Appliances , 2017, IEEE Transactions on Smart Grid.

[14]  Georgios Kalogridis,et al.  ElecPrivacy: Evaluating the Privacy Protection of Electricity Management Algorithms , 2011, IEEE Transactions on Smart Grid.

[15]  Tomer Toledo,et al.  In-vehicle data recorders for monitoring and feedback on drivers' behavior , 2008 .

[16]  Alvaro A. Cárdenas,et al.  Evaluating Electricity Theft Detectors in Smart Grid Networks , 2012, RAID.

[17]  Magnus Almgren,et al.  2016 Ieee International Conference on Big Data (big Data) Detecting Non-technical Energy Losses through Structural Periodic Patterns in Ami Data , 2022 .

[18]  Giacomo Verticale,et al.  A data pseudonymization protocol for Smart Grids , 2012, 2012 IEEE Online Conference on Green Communications (GreenCom).

[19]  Valentin Tudor,et al.  BES: Differentially Private and Distributed Event Aggregation in Advanced Metering Infrastructures , 2016, CPSS@AsiaCCS.

[20]  Valentin Tudor,et al.  Analysis of the impact of data granularity on privacy for the smart grid , 2013, WPES.

[21]  Sherali Zeadally,et al.  Smart Grid Privacy: Issues and Solutions , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[22]  Christos Faloutsos,et al.  Fast subsequence matching in time-series databases , 1994, SIGMOD '94.

[23]  Eli Upfal,et al.  Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .

[24]  Christoph Sorge,et al.  A Privacy Model for Smart Metering , 2010, 2010 IEEE International Conference on Communications Workshops.

[25]  Dimitrios Gunopulos,et al.  Finding Similar Time Series , 1997, PKDD.

[26]  Marina Papatriantafilou,et al.  Dealing with storage without forecasts in smart grids: problem transformation and online scheduling algorithm , 2014, SAC.

[27]  Valentin Tudor,et al.  Employing Private Data in AMI Applications: Short Term Load Forecasting Using Differentially Private Aggregated Data , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).

[28]  Hui Ding,et al.  Querying and mining of time series data: experimental comparison of representations and distance measures , 2008, Proc. VLDB Endow..

[29]  Sören Preibusch,et al.  Privacy behaviors after Snowden , 2015, Commun. ACM.

[30]  Murat Kantarcioglu,et al.  Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms , 2017, HotSoS.

[31]  Georgios Kalogridis,et al.  Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[32]  Hamid Sharif,et al.  A secure and reliable in-network collaborative communication scheme for advanced metering infrastructure in smart grid , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[33]  Marek Jawurek,et al.  Smart metering de-pseudonymization , 2011, ACSAC '11.

[34]  George Danezis,et al.  Privacy-Friendly Aggregation for the Smart-Grid , 2011, PETS.

[35]  Zekeriya Erkin,et al.  Privacy Enhanced Personal Services for Smart Grids , 2014, SEGS@CCS.

[36]  Kanae Matsui,et al.  Feedback on electricity usage for home energy management: A social experiment in a local village of cold region , 2014 .

[37]  G. Danezis,et al.  Privacy Technologies for Smart Grids - A Survey of Options , 2012 .

[38]  Louis D. Brandeis,et al.  The Right to Privacy , 1890 .

[39]  George Danezis,et al.  Verified Computational Differential Privacy with Applications to Smart Metering , 2013, 2013 IEEE 26th Computer Security Foundations Symposium.

[40]  Claude Castelluccia,et al.  I Have a DREAM! (DiffeRentially privatE smArt Metering) , 2011, Information Hiding.

[41]  Davide Della Giustina,et al.  Use case analysis of real-time low voltage network management , 2011, 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies.

[42]  Georgios Kalogridis,et al.  Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[43]  Hamid Sharif,et al.  A Secure Data Aggregation and Dispatch Scheme for Home Area Networks in Smart Grid , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[44]  Moni Naor,et al.  Differential privacy under continual observation , 2010, STOC '10.