Smart Meter Data Privacy: A Survey

Automated and smart meters are devices that are able to monitor the energy consumption of electricity consumers in near real-time. They are considered key technological enablers of the smart grid, as the real-time consumption data that they can collect could enable new sophisticated billing schemes, could facilitate more efficient power distribution system operation and could give rise to a variety of value-added services. At the same time, the energy consumption data that the meters collect are sensitive consumer information; thus, privacy is a key concern and is a major inhibitor of real-time data collection in practice. In this paper, we review the different uses of metering data in the smart grid and the related privacy legislation. We then provide a structured overview, shortcomings, recommendations, and research directions of security solutions that are needed for privacy-preserving meter data delivery and management. We finally survey recent work on privacy-preserving technologies for meter data collection for the three application areas: 1) billing; 2) operations; and 3) value-added services including demand response.

[1]  Dmitry Podkuiko,et al.  Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.

[2]  Hari Balakrishnan,et al.  CryptDB: processing queries on an encrypted database , 2012, CACM.

[3]  Li Xiong,et al.  Real-time aggregate monitoring with differential privacy , 2012, CIKM.

[4]  Carl A. Gunter,et al.  Cumulative Attestation Kernels for Embedded Systems , 2009, IEEE Transactions on Smart Grid.

[5]  Zhenyu Yang,et al.  $P^{2}$ : Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid , 2011, IEEE Transactions on Smart Grid.

[6]  Craig Gentry,et al.  Pinocchio: Nearly Practical Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.

[7]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[8]  A. Prudenzi,et al.  A neuron nets based procedure for identifying domestic appliances pattern-of-use from energy recordings at meter panel , 2002, 2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309).

[9]  Bruno Crispo,et al.  Supporting complex queries and access policies for multi-user encrypted databases , 2013, CCSW.

[10]  Yevgeniy Vahlis,et al.  Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..

[11]  Michael Gertz,et al.  Authentic Third-party Data Publication , 2000, DBSec.

[12]  Georgios Kalogridis,et al.  Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[13]  Todd Baumeister,et al.  Adapting PKI for the smart grid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[14]  M. Newborough,et al.  Dynamic energy-consumption indicators for domestic appliances: environment, behaviour and design , 2003 .

[15]  Giacomo Verticale,et al.  A privacy-friendly game-theoretic distributed scheduling system for domestic appliances , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[16]  Kian-Lee Tan,et al.  Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.

[17]  Mahesh Sooriyabandara,et al.  Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities , 2011, IEEE Communications Surveys & Tutorials.

[18]  Peng Liu,et al.  Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.

[19]  Ramakrishnan Srikant,et al.  Order preserving encryption for numeric data , 2004, SIGMOD '04.

[20]  Mikhail J. Atallah,et al.  Algorithms and Theory of Computation Handbook , 2009, Chapman & Hall/CRC Applied Algorithms and Data Structures series.

[21]  Heejo Lee,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .

[22]  Zekeriya Erkin,et al.  Private Computation of Spatial and Temporal Power Consumption with Smart Meters , 2012, ACNS.

[23]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[24]  Max Mühlhäuser,et al.  A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).

[25]  Henrik W. Bindner,et al.  Real-time measurements and their effects on state estimation of distribution power system , 2013, IEEE PES ISGT Europe 2013.

[26]  Sean W. Smith,et al.  PEREA: towards practical TTP-free revocation in anonymous authentication , 2008, CCS.

[27]  Ross J. Anderson,et al.  On the Security Economics of Electricity Metering , 2010, WEIS.

[28]  Xiaohui Liang,et al.  EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.

[29]  Josh Benaloh,et al.  Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.

[30]  Andreas Pitsillides,et al.  Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.

[31]  Idit Keidar,et al.  Venus: verification for untrusted cloud storage , 2010, CCSW '10.

[32]  Rolf Isermann,et al.  Fault-Diagnosis Applications , 2011 .

[33]  H. Y. Lam,et al.  A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof , 2007, IEEE Transactions on Consumer Electronics.

[34]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[35]  Christoph Sorge,et al.  A Privacy Model for Smart Metering , 2010, 2010 IEEE International Conference on Communications Workshops.

[36]  Bing-Rong Lin,et al.  Information Measures in Statistical Privacy and Data Processing Applications , 2015, TKDD.

[37]  J. Zico Kolter,et al.  REDD : A Public Data Set for Energy Disaggregation Research , 2011 .

[38]  Sergey Yekhanin,et al.  Private information retrieval , 2010, CACM.

[39]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[40]  Junqi Liu,et al.  PMU and smart metering deployment for state estimation in active distribution grids , 2012, 2012 IEEE International Energy Conference and Exhibition (ENERGYCON).

[41]  Fábio Borges de Oliveira On Privacy-Preserving Protocols for Smart Metering Systems , 2017 .

[42]  Chris Clifton,et al.  Privacy-preserving outlier detection , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).

[43]  Nora Cuppens-Boulahia,et al.  Data Privacy Management and Autonomous Spontaneous Security , 2014, Lecture Notes in Computer Science.

[44]  Claude Castelluccia,et al.  I Have a DREAM! (DiffeRentially privatE smArt Metering) , 2011, Information Hiding.

[45]  Ralf Küsters,et al.  Extending and Applying a Framework for the Cryptographic Verification of Java Programs , 2014, IACR Cryptol. ePrint Arch..

[46]  A. Cavoukian,et al.  SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation , 2010 .

[47]  Andrew P. Martin,et al.  Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[48]  Henrik Sandberg,et al.  Security of smart distribution grids: Data integrity attacks on integrated volt/VAR control and countermeasures , 2014, 2014 American Control Conference.

[49]  L. V. Doorn,et al.  SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.

[50]  M. Baranski,et al.  Genetic algorithm for pattern detection in NIALM systems , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[51]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[52]  Henrik Sandberg,et al.  Differentially private state estimation in distribution networks with smart meters , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[53]  Santiago Grijalva,et al.  Leveraging AMI Data for Distribution System Model Calibration and Situational Awareness , 2015, IEEE Transactions on Smart Grid.

[54]  Jorge Cuellar Smart Grid Security , 2014, Lecture Notes in Computer Science.

[55]  Patrick D. McDaniel,et al.  Protecting consumer privacy from electric load monitoring , 2011, CCS '11.

[56]  David P. Varodayan,et al.  Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[57]  Max Mühlhäuser,et al.  Introducing asymmetric DC-Nets , 2014, 2014 IEEE Conference on Communications and Network Security.

[58]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[59]  Daniel K. Molzahn,et al.  Confidentiality-preserving optimal power flow for cloud computing , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[60]  Sushmita Ruj,et al.  A Decentralized Security Framework for Data Aggregation and Access Control in Smart Grids , 2013, IEEE Transactions on Smart Grid.

[61]  Roch Guérin,et al.  A Framework for Policy-based Admission Control , 2000, RFC.

[62]  Gene Tsudik,et al.  Secure Code Update for Embedded Devices via Proofs of Secure Erasure , 2010, ESORICS.

[63]  Mohammad Abdullah Al Faruque,et al.  Home energy management as a service over networking platforms , 2015, 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).

[64]  Alberto Ceselli,et al.  Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.

[65]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.

[66]  Elaine Shi,et al.  Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.

[67]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[68]  Curtis R. Taylor,et al.  The Economics of Privacy , 2016 .

[69]  Randy L. Ekl,et al.  Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.

[70]  Jianfeng Ma,et al.  Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems , 2012, Int. J. Distributed Sens. Networks.

[71]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[72]  Michael Zeifman,et al.  Disaggregation of home energy display data using probabilistic approach , 2012, IEEE Transactions on Consumer Electronics.

[73]  Naranker Dulay,et al.  Shared and Searchable Encrypted Data for Untrusted Servers , 2008, DBSec.

[74]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[75]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[76]  G. Loewenstein,et al.  What Is Privacy Worth? , 2013, The Journal of Legal Studies.

[77]  Fábio Borges,et al.  On privacy-preserving protocols for smart metering systems , 2015 .

[78]  Rakesh Bobba,et al.  Confidentiality-preserving obfuscation for cloud-based power system contingency analysis , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[79]  Florian Kerschbaum,et al.  Plug-In Privacy for Smart Metering Billing , 2010, PETS.

[80]  Naima Kaabouch,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[81]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[82]  S. Karnouskos,et al.  Smart houses in the smart grid and the search for value-added services in the cloud of things era , 2013, 2013 IEEE International Conference on Industrial Technology (ICIT).

[83]  Jan Camenisch,et al.  How to win the clonewars: efficient periodic n-times anonymous authentication , 2006, CCS '06.

[84]  Claudio Soriente,et al.  On the difficulty of software-based attestation of embedded devices , 2009, CCS.

[85]  G. W. Hart,et al.  Nonintrusive appliance load monitoring , 1992, Proc. IEEE.

[86]  Michael Backes,et al.  Differentially Private Smart Metering with Battery Recharging , 2013, DPM/SETOP.

[87]  Constantine E. Kontokosta Energy disclosure, market behavior, and the building data ecosystem , 2013, Annals of the New York Academy of Sciences.

[88]  Jan Camenisch,et al.  A Signature Scheme with Efficient Protocols , 2002, SCN.

[89]  Georgios Kalogridis,et al.  ElecPrivacy: Evaluating the Privacy Protection of Electricity Management Algorithms , 2011, IEEE Transactions on Smart Grid.

[90]  A. Perrig,et al.  Secure and Efficient Capability-Based Power Management in the Smart Grid , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.

[91]  Patrick D. McDaniel,et al.  Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.

[92]  George Danezis,et al.  Privacy-Friendly Aggregation for the Smart-Grid , 2011, PETS.

[93]  George Danezis,et al.  DP5: A Private Presence Service , 2015, Proc. Priv. Enhancing Technol..

[94]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[95]  Giovanni Russello,et al.  ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems , 2012, 2012 IEEE International Symposium on Policies for Distributed Systems and Networks.

[96]  Haimonti Dutta,et al.  NILMTK: an open source toolkit for non-intrusive load monitoring , 2014, e-Energy.

[97]  Muhammad Rizwan Asghar,et al.  Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments , 2013, IACR Cryptol. ePrint Arch..

[98]  E. Quinn Privacy and the New Energy Infrastructure , 2009 .

[99]  Henrik Sandberg,et al.  Wiretap codes for secure multi-party computation , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[100]  Rafail Ostrovsky,et al.  Software protection and simulation on oblivious RAMs , 1996, JACM.

[101]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[102]  Nathan Chenette,et al.  Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..

[103]  H. Vincent Poor,et al.  Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices , 2013, IEEE Journal on Selected Areas in Communications.

[104]  Kannan Balasubramanian,et al.  Secure Multiparty Computation , 2011, Encyclopedia of Cryptography and Security.

[105]  Assaf Schuster,et al.  Data mining with differential privacy , 2010, KDD.

[106]  Daniele Miorandi,et al.  A Holistic View of Security and Privacy Issues in Smart Grids , 2012, SmartGridSec.

[107]  Bert-Jaap Koops,et al.  Smart Metering and Privacy in Europe: Lessons from the Dutch Case , 2013, European Data Protection.

[108]  Ulrich Greveler,et al.  Multimedia Content Identification Through Smart Meter Power Usage Profiles , 2012 .

[109]  Giacomo Verticale,et al.  Privacy-friendly appliance load scheduling in smart grids , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[110]  Srinath T. V. Setty,et al.  Making argument systems for outsourced computation practical (sometimes) , 2012, NDSS.

[111]  Peng Liu,et al.  Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[112]  Rolf Isermann,et al.  Fault-Diagnosis Applications: Model-Based Condition Monitoring: Actuators, Drives, Machinery, Plants, Sensors, and Fault-tolerant Systems , 2011 .

[113]  Ingmar Baumgart,et al.  Privacy-Aware Smart Metering: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[114]  Vivek K. Goyal,et al.  Multiple description coding: compression meets the network , 2001, IEEE Signal Process. Mag..

[115]  George Danezis,et al.  Privacy-preserving smart metering , 2011, ISSE.

[116]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[117]  Dirk Westhoff,et al.  Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture , 2012, SECRYPT.

[118]  Jian Liang,et al.  Load Signature Study—Part II: Disaggregation Framework, Simulation, and Applications , 2010, IEEE Transactions on Power Delivery.

[119]  Roberto Guanciale,et al.  Automating Information Flow Analysis of Low Level Code , 2014, CCS.

[120]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[121]  Todd Baumeister,et al.  Literature Review on Smart Grid Cyber Security , 2010 .

[122]  Dae-Man Han,et al.  Design and implementation of smart home energy management systems based on zigbee , 2010, IEEE Transactions on Consumer Electronics.

[123]  Jens Groth,et al.  Non-interactive Zero-Knowledge Arguments for Voting , 2005, ACNS.

[124]  Michael Backes,et al.  Verifiable delegation of computation on outsourced data , 2013, CCS.

[125]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[126]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[127]  Anthony Rowe,et al.  BLUED : A Fully Labeled Public Dataset for Event-Based Non-Intrusive Load Monitoring Research , 2012 .

[128]  Stephen B. Wicker,et al.  Hierarchical key management for multi-resolution load data representation , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[129]  Dominik Engel,et al.  Wavelet-based load profile representation for smart meter privacy , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).

[130]  Prashant J. Shenoy,et al.  Private memoirs of a smart meter , 2010, BuildSys '10.

[131]  Ning Lu,et al.  Smart-grid security issues , 2010, IEEE Security & Privacy.

[132]  Rafail Ostrovsky,et al.  Efficient computation on oblivious RAMs , 1990, STOC '90.

[133]  Jianzhong Wu,et al.  Use of delayed smart meter measurements for distribution state estimation , 2011, 2011 IEEE Power and Energy Society General Meeting.

[134]  Georgios Kalogridis,et al.  Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[135]  Lalit Mohan Saini,et al.  Performance analysis of smart metering for smart grid: An overview , 2015 .

[136]  Rakesh Bobba,et al.  Cloud Computing for the Power Grid: From Service Composition to Assured Clouds , 2013, HotCloud.

[137]  Peter Williams,et al.  Usable PIR , 2008, NDSS.

[138]  Tanya L. Brewer,et al.  Smart Grid Cyber Security Strategy and Requirements , 2009 .