Sensitivity inspector: Detecting privacy in smart energy applications

The problem of privacy disclosure hinders large number of ubiquitous applications to collect, disseminate and analyze personal data from providing useful and important services. It is understood that sharing private data has high potential for facilitating innumerable benefits as well as inviting intended or unintended malicious activities leading to severe privacy breach. Such privacy breach attacks mostly capture sensitive or broadly the anomalous events. Fine grained, high resolution smart meter energy consumption data contains sensitive house hold activity signature. In this paper, we propose a tool called `Sensitivity Inspector' that detects sensitivity in smart meter data and inculcates privacy awareness among smart meter users, presuming private events are related to anomalous or unusual activities. Specifically, we analyze the sensitive content of smart meter data through robust unsupervised statistical method considering user activity as a piece-wise, stationary, stochastic process with associated uncertainty. We show the efficacy of our scheme under relevant statistical and information theoretic measures. We implement our algorithm and compare sensitivity detection capability with related supervised learning based approach and relevant privacy breaching attack like Non-Intrusive Load Monitoring (NILM).

[1]  J. Zico Kolter,et al.  REDD : A Public Data Set for Energy Disaggregation Research , 2011 .

[2]  C.-C. Jay Kuo,et al.  A Distortion-Based Approach to Privacy-Preserving Metering in Smart Grids , 2013, IEEE Access.

[3]  Yuan Qi,et al.  Minimizing private data disclosures in the smart grid , 2012, CCS '12.

[4]  R. Serfling,et al.  General foundations for studying masking and swamping robustness of outlier identifiers , 2014 .

[5]  Wei Jiang,et al.  On-line outlier detection and data cleaning , 2004, Comput. Chem. Eng..

[6]  J. P. Park The Identification Of Multiple Outliers , 2000 .

[7]  Stephen B. Wicker,et al.  Inferring Personal Information from Demand-Response Systems , 2010, IEEE Security & Privacy.

[8]  Prashant J. Shenoy,et al.  Private memoirs of a smart meter , 2010, BuildSys '10.

[9]  Arijit Ukil,et al.  Security and Privacy in Wireless Sensor Networks , 2010 .

[10]  Srinivas Akella,et al.  Power line carrier (PLC) signal analysis of smart meters for outlier detection , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[11]  Eliahu Khalastchi,et al.  Detecting anomalies in unmanned vehicles using the Mahalanobis distance , 2010, 2010 IEEE International Conference on Robotics and Automation.

[12]  M. M. Hassan Mahmud,et al.  Transfer Learning using Kolmogorov Complexity: Basic Theory and Empirical Evaluations , 2007, NIPS.

[13]  B. Rosner Percentage Points for a Generalized ESD Many-Outlier Procedure , 1983 .

[14]  John E. Seem,et al.  Using intelligent data analysis to detect abnormal energy consumption in buildings , 2007 .

[15]  A. R. Aoki,et al.  Outliers' detection and filling algorithms for smart metering centers , 2012, PES T&D 2012.

[16]  Manish Marwah,et al.  Unsupervised Disaggregation of Low Frequency Power Measurements , 2011, SDM.

[17]  Soma Bandyopadhyay,et al.  Negotiation-based privacy preservation scheme in internet of things platform , 2012, SecurIT '12.

[18]  Wenyuan Xu,et al.  Neighborhood watch: security and privacy analysis of automatic meter reading systems , 2012, CCS.

[19]  Swanand Kadhe,et al.  A Framework for Non Intrusive Load Monitoring Using Bayesian Inference , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[20]  Christoph Sorge,et al.  Do not snoop my habits: preserving privacy in the smart grid , 2012, IEEE Communications Magazine.