On preserving user privacy in Smart Grid advanced metering infrastructure applications

ABSTRACT Advanced metering infrastructure (AMI) enables real‐time collection of power consumption data through the Smart Grid communication network. With the current deployment of smart meters (SMs), one of the concerns that started to be raised by the customers is on the privacy of their power cons...

Full description

Saved in:
Bibliographic Details
Published inSecurity and communication networks Vol. 7; no. 1; pp. 206 - 220
Main Authors Saputro, Nico, Akkaya, Kemal
Format Journal Article
LanguageEnglish
Published London Blackwell Publishing Ltd 01.01.2014
John Wiley & Sons, Inc
Subjects
Online AccessGet full text
ISSN1939-0114
1939-0122
DOI10.1002/sec.706

Cover

More Information
Summary:ABSTRACT Advanced metering infrastructure (AMI) enables real‐time collection of power consumption data through the Smart Grid communication network. With the current deployment of smart meters (SMs), one of the concerns that started to be raised by the customers is on the privacy of their power consumption data. The exposure of these data can lead to several privacy problems that need to be addressed before the customers can be convinced for the use of SMs. This paper has two contributions. First, it identifies the threats regarding user and data privacy in AMI applications and comprehensively surveys the existing solutions to address these threats. We categorize the existing approaches on privacy and discuss pros and cons of these approaches with respect to some criteria. Second, we pick one of the existing solutions on privacy, namely the homomorphic encryption, and evaluate its feasibility and impact on performance when used in data aggregation for real‐time AMI applications. We investigate and compare the performance of homomorphic encryption in terms of data size and end‐to‐end delay with that of hop‐by‐hop secure data aggregation and data concatenation within a network of SMs via extensive simulations. We finally conclude the paper with some future privacy issues that are subject to further research. Copyright © 2013 John Wiley & Sons, Ltd. In this paper, we provide a thorough survey and propose a classification of the existing efforts to protect user data privacy. We also investigate and compare the impact of privacy solutions on the performance of AMI applications that utilize data aggregation. The results indicated that the end‐to‐end latency of end‐to‐end homomorphic aggregation approach is superior to hop‐by‐hop concatenation and comparable with hop‐by‐hop aggregation. However, hop‐by‐hop aggregation does not provide privacy by itself even though it has the lowest bandwidth requirements.
Bibliography:ark:/67375/WNG-7997MQV7-Z
istex:213C8002A3D5EF77421D987C3F8F4BF82659D734
ArticleID:SEC706
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
ISSN:1939-0114
1939-0122
DOI:10.1002/sec.706