Privacy-Aware Profiling and Statistical Data Extraction for Smart Sustainable Energy Systems

The growing population and global warming have been calling for more effective energy usage, which have stimulated the emergence of smart sustainable energy technology. The distinct feature of this newly emerging technology is the incorporation of advanced information and communication technologies (ICT), which collects more detailed information on how energy is generated, distributed, and consumed. Various smart metering technologies have also been proposed to support the optimization on sustainable energy usage. Despite the obvious benefits of these technologies, people may still hesitate to adopt them because of possible privacy breach. On the other hand, we observe that the major target information for making the sustainable energy system smart is the aggregated statistics of energy usage, not the full detailed usage profiles which would compromise customers' privacy. Thus, how to design schemes to collect aggregated statistics while preserving customers' privacy becomes an important research problem. In this paper, we propose two schemes to deal with this problem. The first one can support dynamic profiling, which can extract aggregated statistical information without compromising individual privacy. The second one aims to extract correlation information among various factors for the smart system design and can also be used as an underlying tool for baseline inference and association rule mining.

[1]  Das Amrita,et al.  Mining Association Rules between Sets of Items in Large Databases , 2013 .

[2]  Prashant J. Shenoy,et al.  Designing Privacy-Preserving Smart Meters with Low-Cost Microcontrollers , 2012, Financial Cryptography.

[3]  Shwetak N. Patel,et al.  Televisions, video privacy, and powerline electromagnetic interference , 2011, CCS '11.

[4]  Andrew J. Blumberg,et al.  Privacy and accountability for location-based aggregate statistics , 2011, CCS '11.

[5]  George Danezis,et al.  Privacy-preserving smart metering , 2011, ISSE.

[6]  Xing Xie,et al.  Urban computing with taxicabs , 2011, UbiComp '11.

[7]  George Danezis,et al.  Privacy-Friendly Aggregation for the Smart-Grid , 2011, PETS.

[8]  George Danezis,et al.  Differentially Private Billing with Rebates , 2011 .

[9]  J. Snook,et al.  Driving Sustainable Behavior in the Mainstream Consumer: Leveraging Behavioral Economics to Minimize Household Energy Consumption , 2011 .

[10]  Ian H. Rowlands,et al.  The cost impacts of a mandatory move to time-of-use pricing on residential customers: an Ontario (Canada) case-study , 2011 .

[11]  Yuguang Fang,et al.  Private Information Extraction over Online Social Networks , 2011, IACR Cryptol. ePrint Arch..

[12]  Elaine Shi,et al.  Privacy-Preserving Aggregation of Time-Series Data , 2011, NDSS.

[13]  Marina Thottan,et al.  GERI - Bell Labs Smart Grid Research Focus: Economic Modeling, Networking, and Security & Privacy , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[14]  Bart Jacobs,et al.  Privacy-Friendly Energy-Metering via Homomorphic Encryption , 2010, STM.

[15]  Carmela Troncoso,et al.  PrETP: Privacy-Preserving Electronic Toll Pricing , 2010, USENIX Security Symposium.

[16]  Brian Norton,et al.  Real-life energy use in the UK: How occupancy and dwelling characteristics affect domestic electricity use , 2008 .

[17]  Amit Sahai,et al.  Efficient Noninteractive Proof Systems for Bilinear Groups , 2008, SIAM J. Comput..

[18]  A. Rosenfeld,et al.  An exploratory analysis of California residential customer response to critical peak pricing of electricity , 2007 .

[19]  Sarah C. Darby,et al.  Social learning and public policy: Lessons from an energy-conscious village , 2006 .

[20]  Hans-Joachim Mosler,et al.  Household energy use patterns and social organisation for optimal energy management in a multi‐user solar energy system , 2006 .

[21]  Dawn Xiaodong Song,et al.  Privacy-Preserving Set Operations , 2005, CRYPTO.

[22]  R. Dear,et al.  Weather sensitivity in household appliance energy end-use , 2004 .

[23]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[24]  Hugo Krawczyk,et al.  Robust Threshold DSS Signatures , 1996, Inf. Comput..

[25]  Ramakrishnan Srikant,et al.  Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.

[26]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.