Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-qsmjn Total loading time: 0 Render date: 2024-04-25T00:54:11.369Z Has data issue: false hasContentIssue false

18 - Privacy in the Smart Grid: Information, Control, and Games

from Part IV - Data Systems and Related Applications

Published online by Cambridge University Press:  28 June 2017

H. V. Poor
Affiliation:
Department of Electrical Engineering, Princeton University
Rafael F. Schaefer
Affiliation:
Technische Universität Berlin
Holger Boche
Affiliation:
Technische Universität München
Ashish Khisti
Affiliation:
University of Toronto
H. Vincent Poor
Affiliation:
Princeton University, New Jersey
Get access

Summary

The deployment of advanced cyber infrastructure in the electricity grid, leading to the so-called smart grid, introduces concerns about the privacy of the parties interconnected by the grid. In this chapter, the roles of information, control, and game theories in quantifying and exploring such privacy issues are examined, primarily in the context of smart grid communications. Absolute privacy is generally not desirable in such applications, but rather the tradeoff between the privacy of data and its usefulness, or utility, is of concern. An information theoretic setting is used to characterize the optimal such tradeoff in a general context, and this setting is then applied to two problems arising in smart grid: smart meter privacy, in which control theory also plays a role when storage is introduced into the system; and competitive privacy, in which each of a group of multiple grid actors seeks to optimize its individual privacy–utility tradeoff while interacting with the other actors in information exchange, a setting that can be examined using game theory.

Introduction

The hierarchical, centralized, electricity grid is being transformed into a cyber-physical system. This transformation involves the introduction of sensors, meters, controls, and communication networks [1], in order to allow for greater end-point participation in the management of the grid. In particular, these developments will allow for demand-side participation in grid management, better integration of renewables and storage into the grid, etc., in order to create a more efficient, sustainable energy infrastructure. A key issue that arises when cyber capability is introduced into a system is privacy. This chapter will address this issue, first in a general setting, and then in the context of some particular problems arising in smart grid.

In considering this problem, we will see that information theory, control theory, and game theory all have roles to play in helping to understand the issue of privacy in the smart grid. In particular, we will first describe a general formalism for privacy, based on an information theoretic formulation. Then we will discuss the application of this formalism in two different settings arising in the smart grid.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2017

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] E., Hossain, Z., Han, and H. V., Poor, eds., Smart Grid Communications and Networking. Cambridge: Cambridge University Press, 2012.
[2] P., McDaniel and S., McLaughlin, “Security and privacy challenges in the smart grid,” IEEE Security and Privacy, vol. 7, no. 3, pp. 75–77, May 2009.Google Scholar
[3] E. L., Quinn, “Privacy and the new energy infrastructure,” Social Science Research Network, Feb. 2009.
[4] G., Kalogridis, R., Cepeda, S. Z., Denic, T., Lewis, and C., Efthymiou, “Elecprivacy: Evaluating the privacy protection of electricity management algorithms,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 750–758, Dec. 2011.Google Scholar
[5] F. G., Marmol, C., Sorge, O., Ugus, and G. M., Perez, “Do not snoop my habits: Preserving privacy in the smart grid,” IEEE Commun. Mag., vol. 50, no. 5, pp. 166–172, May 2012.Google Scholar
[6] L., Sankar, S. R., Rajagopalan, and H. V., Poor, “Utility–privacy tradeoffs in databases: An information-theoretic approach,” IEEE Trans. Inf. Forensics Security, vol. 8, no. 6, pp. 838–852, Jun. 2013.Google Scholar
[7] T. E., Raghunathan, J. P., Reiter, and D. B., Rubin, “Multiple imputation for statistical disclosure limitation,” IEEE Trans. Inf. Theory, vol. 43, no. 6, pp. 1877–1894, Jun. 1997.Google Scholar
[8] L., Sweeney, “k-anonymity: A model for protecting privacy,” Int. J. Uncertain. Fuzziness Knowl.-Based Syst., vol. 10, no. 5, pp. 557–570, Oct. 2002.Google Scholar
[9] A., Machanavajjhala, D., Kifer, J., Gehrke, and M., Venkitasubramaniam, “l-diversity: Privacy beyond k-anonymity,” ACM Trans. Knowl. Discov. Data, vol. 1, no. 1, p. 24, Mar. 2007.Google Scholar
[10] H., Kargupta, S., Datta, Q., Wang, and K., Sivakumar, “Random data perturbation techniques and privacy preserving datamining,” J. Knowl. Inf. Systems, vol. 7, no. 4, pp. 387–414, May 2005.Google Scholar
[11] C., Dwork and A., Roth, “The algorithmic foundations of differential privacy,” Foundations and Trends in Computer Science, vol. 9, no. 3–4, pp. 211–407, 2014.Google Scholar
[12] H., Yamamoto, “A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers,” IEEE Trans. Inf. Theory, vol. 29, no. 6, pp. 918–923, Nov. 1983.Google Scholar
[13] R., Tandon, L., Sankar, and H. V., Poor, “Discriminatory lossy source coding: Side information privacy,” IEEE Trans. Inf. Theory, vol. 59, no. 9, pp. 5665–5677, Sep. 2013.Google Scholar
[14] F., Sultanem, “Using appliance signatures for monitoring residential loads at meter panel level,” IEEE Trans. Power Delivery, vol. 6, no. 4, pp. 1380–1385, Oct. 1991.Google Scholar
[15] A., Molina-Markham, P., Shenoy, K., Fu, E., Cecchet, and D., Irwin, “Private memoirs of a smart meter,” in Proc. 2nd ACM Workshop Embedded Sensing Systems Energy-Efficiency Buildings, Zurich, Switzerland, Nov. 2010, pp. 61–66.
[16] G. W., Hart, “Nonintrusive appliance load monitoring,” Proc. IEEE, vol. 80, no. 12, pp. 1870–1891, Dec. 1992.Google Scholar
[17] H. Y., Lam, G. S. K., Fung, and W. K., Lee, “A novel method to construct taxonomy of electrical appliances based on load signatures,” IEEE Trans. Consumer Electronics, vol. 53, no. 2, pp. 653–660, May 2007.Google Scholar
[18] G., Kalogridis and S. Z., Denic, “Data mining and privacy of personal behaviour types in smart grid,” in Proc. IEEE Int. Conf. Data Mining, Vancouver, Canada, Dec. 2011, pp. 636–642.Google Scholar
[19] A., Predunzi, “A neuron nets based procedure for identifying domestic appliances pattern-of-use from energy recordings at meter panel,” in Proc. IEEE Power Eng. Soc. Winter Meeting, New York, NY, USA, Jan. 2002, pp. 941–946, vol. 2.
[20] U., Greveler, P., Glosekotter, B., Justus, and D., Loehr, “Multimedia content identification through smart meter power usage profiles,” in Proc. Int. Conf. Inf, Knowl. Eng., Las Vegas, NV, USA, Jul. 2012.
[21] M., Backes and S., Meiser, “Differentially private smart metering with battery recharging,” IACR Cryptology ePrint Archive, vol. 2012, no. 2, p. 183, 2012.Google Scholar
[22] T. D., Nicol and D. M., Nicol, “Combating unauthorized load signal analysis with targeted event masking,” in Proc. 45th Hawaii Int. Conf. System Science, Grand Wailea, HI, USA, Jan. 2012, pp. 2037–2043.
[23] C., Efthymiou and G., Kalogridis, “Smart grid privacy via anonymization of smart metering data,” in Proc. 1st IEEE Int. Conf. Smart Grid Commun., Gaithersburg, MD, USA, Oct. 2010, pp. 238–243.
[24] C. S. J.-M., Bohli and O., Ugus, “A privacy model for smart metering,” in Proc. IEEE Int. Conf. Commun., Capetown, South Africa, May 2010, pp. 1–5.
[25] F. D., Garcia and B., Jacobs, “Privacy-friendly energy-metering via homomorphic encryption,” Lecture Notes in Computer Science, vol. 6710, pp. 226–238, 2011.Google Scholar
[26] E. N. Y., Kim and M., Srivastava, “Cooperative state estimation for preserving privacy of user behaviors in smart grid,” in Proce. IEEE Int. Conf. Smart Grid Commun., Brussels, Belgium, Oct. 2011, pp. 178–183.
[27] S., McLaughlin, P., McDaniel, and W., Aiello, “Protecting consumer privacy from electric load monitoring,” in Proc. 18th ACM Conf. Computer Commun. Security, Chicago, IL, USA, Oct. 2011, pp. 87–98.
[28] H., Li, R., Mao, L., Lai, and R., Qiu, “Compressed meter reading for delay-sensitive and secure load report in smart grid,” in Proc. 1st IEEE Int. Conf. Smart Grid Commun., Gaithersburg, MD, USA, Oct. 2010, pp. 114–119.
[29] G., Kalogridis, C., Efthymiou, S., Denic, T. A., Lewis, and R., Cepeda, “Privacy for smart meters: Towards undetectable appliance load signatures,” in Proc. 1st IEEE Int. Conf. Smart Grid Commun., Gaithersburg, MD, USA, Oct. 2010, pp. 232–237.
[30] L., Sankar, S. R., Rajagopalan, S., Mohajer, and H. V., Poor, “Smart meter privacy: A theoretical framework,” IEEE Trans. Smart Grid, vol. 4, no. 2, pp. 837–846, Jun. 2013.Google Scholar
[31] O., Tan, D., Gündüz, and H. V., Poor, “Increasing smart meter privacy through energy harvesting and storage devices,” IEEE J. Sel. Areas Commun., vol. 31, no. 7, pp. 1331–1341, Jul. 2013.Google Scholar
[32] D. M., Arnold, H. A., Loeliger, P. O., Vontobel, A., Kavcic, and W., Zeng, “Simulation-based computation of information rates for channels with memory,” IEEE Trans. Inf. Theory, vol. 52, no. 8, pp. 3498–3508, Aug. 2006.Google Scholar
[33] D., Varodayan and A., Khisti, “Smart meter privacy using a rechargeable battery:Minimizing the rate of information leakage,” in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Process., Prague, Czech Republic, May 2011, pp. 1932–1935.
[34] L., Yang, X., Chen, J., Zhang, and H. V. Poor, “Cost-effective and privacy-preserving energy management for smart meters,” IEEE Trans. Smart Grid, vol. 6, no. 1, pp. 486–495, Jan. 2015.Google Scholar
[35] L., Sankar, S. K., Kar, R., Tandon, and H. V., Poor, “Competitive privacy in the smart grid: An information-theoretic approach,” in Proc. IEEE Int. Conf. Smart Grid Commun., Brussels, Belgium, Oct. 2011, pp. 220–225.
[36] A. D., Wyner and J., Ziv, “The rate–distortion function for source coding with side information at the decoder,” IEEE Trans. Inf. Theory, vol. 22, no. 1, pp. 1–10, Jan. 1976.Google Scholar
[37] T., Berger, The Information Theory Approach to Communications. Berlin, Heidelberg: Springer-Verlag, 1977, pp. 170–231.
[38] E. V., Belmega, L., Sankar, and H. V., Poor, “Enabling data exchange in interactive state estimation under privacy constraints,” IEEE J. Sel. Topics Signal Process., vol. 9, no. 7, pp. 1285–1297, 2015.Google Scholar
[39] D., Monderer and L. S., Shapley, “Potential games,” Games and Economic Behavior, vol. 14, no. 1, pp. 124–143, May 1996.Google Scholar
[40] D., Fudenberg and J., Tirole, Game Theory. Cambridge, MA: MIT Press, 1991.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×