Smart Meter Data Privacy: A Survey
暂无分享,去创建一个
Imrich Chlamtac | Daniele Miorandi | Muhammad Rizwan Asghar | György Dán | I. Chlamtac | D. Miorandi | G. Dán | M. R. Asghar
[1] Dmitry Podkuiko,et al. Energy Theft in the Advanced Metering Infrastructure , 2009, CRITIS.
[2] Hari Balakrishnan,et al. CryptDB: processing queries on an encrypted database , 2012, CACM.
[3] Li Xiong,et al. Real-time aggregate monitoring with differential privacy , 2012, CIKM.
[4] Carl A. Gunter,et al. Cumulative Attestation Kernels for Embedded Systems , 2009, IEEE Transactions on Smart Grid.
[5] Zhenyu Yang,et al. $P^{2}$ : Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid , 2011, IEEE Transactions on Smart Grid.
[6] Craig Gentry,et al. Pinocchio: Nearly Practical Verifiable Computation , 2013, 2013 IEEE Symposium on Security and Privacy.
[7] Sushil Jajodia,et al. Exploring steganography: Seeing the unseen , 1998, Computer.
[8] A. Prudenzi,et al. A neuron nets based procedure for identifying domestic appliances pattern-of-use from energy recordings at meter panel , 2002, 2002 IEEE Power Engineering Society Winter Meeting. Conference Proceedings (Cat. No.02CH37309).
[9] Bruno Crispo,et al. Supporting complex queries and access policies for multi-user encrypted databases , 2013, CCSW.
[10] Yevgeniy Vahlis,et al. Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..
[11] Michael Gertz,et al. Authentic Third-party Data Publication , 2000, DBSec.
[12] Georgios Kalogridis,et al. Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[13] Todd Baumeister,et al. Adapting PKI for the smart grid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[14] M. Newborough,et al. Dynamic energy-consumption indicators for domestic appliances: environment, behaviour and design , 2003 .
[15] Giacomo Verticale,et al. A privacy-friendly game-theoretic distributed scheduling system for domestic appliances , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[16] Kian-Lee Tan,et al. Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.
[17] Mahesh Sooriyabandara,et al. Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities , 2011, IEEE Communications Surveys & Tutorials.
[18] Peng Liu,et al. Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.
[19] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[20] Mikhail J. Atallah,et al. Algorithms and Theory of Computation Handbook , 2009, Chapman & Hall/CRC Applied Algorithms and Data Structures series.
[21] Heejo Lee,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. INVITED PAPER Cyber–Physical Security of a Smart Grid Infrastructure , 2022 .
[22] Zekeriya Erkin,et al. Private Computation of Spatial and Temporal Power Consumption with Smart Meters , 2012, ACNS.
[23] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[24] Max Mühlhäuser,et al. A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).
[25] Henrik W. Bindner,et al. Real-time measurements and their effects on state estimation of distribution power system , 2013, IEEE PES ISGT Europe 2013.
[26] Sean W. Smith,et al. PEREA: towards practical TTP-free revocation in anonymous authentication , 2008, CCS.
[27] Ross J. Anderson,et al. On the Security Economics of Electricity Metering , 2010, WEIS.
[28] Xiaohui Liang,et al. EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications , 2012, IEEE Transactions on Parallel and Distributed Systems.
[29] Josh Benaloh,et al. Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.
[30] Andreas Pitsillides,et al. Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.
[31] Idit Keidar,et al. Venus: verification for untrusted cloud storage , 2010, CCSW '10.
[32] Rolf Isermann,et al. Fault-Diagnosis Applications , 2011 .
[33] H. Y. Lam,et al. A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof , 2007, IEEE Transactions on Consumer Electronics.
[34] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[35] Christoph Sorge,et al. A Privacy Model for Smart Metering , 2010, 2010 IEEE International Conference on Communications Workshops.
[36] Bing-Rong Lin,et al. Information Measures in Statistical Privacy and Data Processing Applications , 2015, TKDD.
[37] J. Zico Kolter,et al. REDD : A Public Data Set for Energy Disaggregation Research , 2011 .
[38] Sergey Yekhanin,et al. Private information retrieval , 2010, CACM.
[39] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[40] Junqi Liu,et al. PMU and smart metering deployment for state estimation in active distribution grids , 2012, 2012 IEEE International Energy Conference and Exhibition (ENERGYCON).
[41] Fábio Borges de Oliveira. On Privacy-Preserving Protocols for Smart Metering Systems , 2017 .
[42] Chris Clifton,et al. Privacy-preserving outlier detection , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[43] Nora Cuppens-Boulahia,et al. Data Privacy Management and Autonomous Spontaneous Security , 2014, Lecture Notes in Computer Science.
[44] Claude Castelluccia,et al. I Have a DREAM! (DiffeRentially privatE smArt Metering) , 2011, Information Hiding.
[45] Ralf Küsters,et al. Extending and Applying a Framework for the Cryptographic Verification of Java Programs , 2014, IACR Cryptol. ePrint Arch..
[46] A. Cavoukian,et al. SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation , 2010 .
[47] Andrew P. Martin,et al. Privacy-enhanced bi-directional communication in the Smart Grid using trusted computing , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[48] Henrik Sandberg,et al. Security of smart distribution grids: Data integrity attacks on integrated volt/VAR control and countermeasures , 2014, 2014 American Control Conference.
[49] L. V. Doorn,et al. SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.
[50] M. Baranski,et al. Genetic algorithm for pattern detection in NIALM systems , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[51] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[52] Henrik Sandberg,et al. Differentially private state estimation in distribution networks with smart meters , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).
[53] Santiago Grijalva,et al. Leveraging AMI Data for Distribution System Model Calibration and Situational Awareness , 2015, IEEE Transactions on Smart Grid.
[54] Jorge Cuellar. Smart Grid Security , 2014, Lecture Notes in Computer Science.
[55] Patrick D. McDaniel,et al. Protecting consumer privacy from electric load monitoring , 2011, CCS '11.
[56] David P. Varodayan,et al. Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[57] Max Mühlhäuser,et al. Introducing asymmetric DC-Nets , 2014, 2014 IEEE Conference on Communications and Network Security.
[58] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[59] Daniel K. Molzahn,et al. Confidentiality-preserving optimal power flow for cloud computing , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[60] Sushmita Ruj,et al. A Decentralized Security Framework for Data Aggregation and Access Control in Smart Grids , 2013, IEEE Transactions on Smart Grid.
[61] Roch Guérin,et al. A Framework for Policy-based Admission Control , 2000, RFC.
[62] Gene Tsudik,et al. Secure Code Update for Embedded Devices via Proofs of Secure Erasure , 2010, ESORICS.
[63] Mohammad Abdullah Al Faruque,et al. Home energy management as a service over networking platforms , 2015, 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT).
[64] Alberto Ceselli,et al. Modeling and assessing inference exposure in encrypted databases , 2005, TSEC.
[65] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[66] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[67] Craig Gentry,et al. A fully homomorphic encryption scheme , 2009 .
[68] Curtis R. Taylor,et al. The Economics of Privacy , 2016 .
[69] Randy L. Ekl,et al. Security Technology for Smart Grid Networks , 2010, IEEE Transactions on Smart Grid.
[70] Jianfeng Ma,et al. Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems , 2012, Int. J. Distributed Sens. Networks.
[71] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[72] Michael Zeifman,et al. Disaggregation of home energy display data using probabilistic approach , 2012, IEEE Transactions on Consumer Electronics.
[73] Naranker Dulay,et al. Shared and Searchable Encrypted Data for Untrusted Servers , 2008, DBSec.
[74] Zhuo Lu,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[75] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[76] G. Loewenstein,et al. What Is Privacy Worth? , 2013, The Journal of Legal Studies.
[77] Fábio Borges,et al. On privacy-preserving protocols for smart metering systems , 2015 .
[78] Rakesh Bobba,et al. Confidentiality-preserving obfuscation for cloud-based power system contingency analysis , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[79] Florian Kerschbaum,et al. Plug-In Privacy for Smart Metering Billing , 2010, PETS.
[80] Naima Kaabouch,et al. Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.
[81] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[82] S. Karnouskos,et al. Smart houses in the smart grid and the search for value-added services in the cloud of things era , 2013, 2013 IEEE International Conference on Industrial Technology (ICIT).
[83] Jan Camenisch,et al. How to win the clonewars: efficient periodic n-times anonymous authentication , 2006, CCS '06.
[84] Claudio Soriente,et al. On the difficulty of software-based attestation of embedded devices , 2009, CCS.
[85] G. W. Hart,et al. Nonintrusive appliance load monitoring , 1992, Proc. IEEE.
[86] Michael Backes,et al. Differentially Private Smart Metering with Battery Recharging , 2013, DPM/SETOP.
[87] Constantine E. Kontokosta. Energy disclosure, market behavior, and the building data ecosystem , 2013, Annals of the New York Academy of Sciences.
[88] Jan Camenisch,et al. A Signature Scheme with Efficient Protocols , 2002, SCN.
[89] Georgios Kalogridis,et al. ElecPrivacy: Evaluating the Privacy Protection of Electricity Management Algorithms , 2011, IEEE Transactions on Smart Grid.
[90] A. Perrig,et al. Secure and Efficient Capability-Based Power Management in the Smart Grid , 2011, 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops.
[91] Patrick D. McDaniel,et al. Security and Privacy Challenges in the Smart Grid , 2009, IEEE Security & Privacy.
[92] George Danezis,et al. Privacy-Friendly Aggregation for the Smart-Grid , 2011, PETS.
[93] George Danezis,et al. DP5: A Private Presence Service , 2015, Proc. Priv. Enhancing Technol..
[94] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[95] Giovanni Russello,et al. ACTORS: A Goal-Driven Approach for Capturing and Managing Consent in e-Health Systems , 2012, 2012 IEEE International Symposium on Policies for Distributed Systems and Networks.
[96] Haimonti Dutta,et al. NILMTK: an open source toolkit for non-intrusive load monitoring , 2014, e-Energy.
[97] Muhammad Rizwan Asghar,et al. Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments , 2013, IACR Cryptol. ePrint Arch..
[98] E. Quinn. Privacy and the New Energy Infrastructure , 2009 .
[99] Henrik Sandberg,et al. Wiretap codes for secure multi-party computation , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).
[100] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[101] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[102] Nathan Chenette,et al. Order-Preserving Symmetric Encryption , 2009, IACR Cryptol. ePrint Arch..
[103] H. Vincent Poor,et al. Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices , 2013, IEEE Journal on Selected Areas in Communications.
[104] Kannan Balasubramanian,et al. Secure Multiparty Computation , 2011, Encyclopedia of Cryptography and Security.
[105] Assaf Schuster,et al. Data mining with differential privacy , 2010, KDD.
[106] Daniele Miorandi,et al. A Holistic View of Security and Privacy Issues in Smart Grids , 2012, SmartGridSec.
[107] Bert-Jaap Koops,et al. Smart Metering and Privacy in Europe: Lessons from the Dutch Case , 2013, European Data Protection.
[108] Ulrich Greveler,et al. Multimedia Content Identification Through Smart Meter Power Usage Profiles , 2012 .
[109] Giacomo Verticale,et al. Privacy-friendly appliance load scheduling in smart grids , 2013, 2013 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[110] Srinath T. V. Setty,et al. Making argument systems for outsourced computation practical (sometimes) , 2012, NDSS.
[111] Peng Liu,et al. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[112] Rolf Isermann,et al. Fault-Diagnosis Applications: Model-Based Condition Monitoring: Actuators, Drives, Machinery, Plants, Sensors, and Fault-tolerant Systems , 2011 .
[113] Ingmar Baumgart,et al. Privacy-Aware Smart Metering: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[114] Vivek K. Goyal,et al. Multiple description coding: compression meets the network , 2001, IEEE Signal Process. Mag..
[115] George Danezis,et al. Privacy-preserving smart metering , 2011, ISSE.
[116] Yang Xiao,et al. Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.
[117] Dirk Westhoff,et al. Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture , 2012, SECRYPT.
[118] Jian Liang,et al. Load Signature Study—Part II: Disaggregation Framework, Simulation, and Applications , 2010, IEEE Transactions on Power Delivery.
[119] Roberto Guanciale,et al. Automating Information Flow Analysis of Low Level Code , 2014, CCS.
[120] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[121] Todd Baumeister,et al. Literature Review on Smart Grid Cyber Security , 2010 .
[122] Dae-Man Han,et al. Design and implementation of smart home energy management systems based on zigbee , 2010, IEEE Transactions on Consumer Electronics.
[123] Jens Groth,et al. Non-interactive Zero-Knowledge Arguments for Voting , 2005, ACNS.
[124] Michael Backes,et al. Verifiable delegation of computation on outsourced data , 2013, CCS.
[125] Cong Wang,et al. Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[126] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[127] Anthony Rowe,et al. BLUED : A Fully Labeled Public Dataset for Event-Based Non-Intrusive Load Monitoring Research , 2012 .
[128] Stephen B. Wicker,et al. Hierarchical key management for multi-resolution load data representation , 2014, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm).
[129] Dominik Engel,et al. Wavelet-based load profile representation for smart meter privacy , 2013, 2013 IEEE PES Innovative Smart Grid Technologies Conference (ISGT).
[130] Prashant J. Shenoy,et al. Private memoirs of a smart meter , 2010, BuildSys '10.
[131] Ning Lu,et al. Smart-grid security issues , 2010, IEEE Security & Privacy.
[132] Rafail Ostrovsky,et al. Efficient computation on oblivious RAMs , 1990, STOC '90.
[133] Jianzhong Wu,et al. Use of delayed smart meter measurements for distribution state estimation , 2011, 2011 IEEE Power and Energy Society General Meeting.
[134] Georgios Kalogridis,et al. Smart Grid Privacy via Anonymization of Smart Metering Data , 2010, 2010 First IEEE International Conference on Smart Grid Communications.
[135] Lalit Mohan Saini,et al. Performance analysis of smart metering for smart grid: An overview , 2015 .
[136] Rakesh Bobba,et al. Cloud Computing for the Power Grid: From Service Composition to Assured Clouds , 2013, HotCloud.
[137] Peter Williams,et al. Usable PIR , 2008, NDSS.
[138] Tanya L. Brewer,et al. Smart Grid Cyber Security Strategy and Requirements , 2009 .