Abstract

Smart electricity meters as a prominent instance of the Internet of Things (IoT) have driven more efficient energy services in smart grids but also created growing concerns of consumer privacy. Homomorphic encryption of consumption data is a conventional solution for privacy protection, but it incurs a high computational burden to the resource-restrained smart meters (SMs) due to the encryption of high-frequency consumption readings. Perturbation is another major approach in providing the privacy protection of SM readings which is highly efficient. However, most existing perturbation-based works inadequately balance the tradeoff between the need of hiding individual consumption profiles and the need of retaining utility’s quality. This article proposes a hybrid privacy-preserving electricity consumption data publishing scheme without a trusted third party which utilizes the desirable properties of both perturbation and cryptography for better privacy-utility tradeoff and efficiency. The proposed scheme for fine-grained SM consumption data consists of two phases, which are noise generation and noise distribution. In the first phase, a distributed perturbation method is designed to provide differential privacy protection for high-frequency consumption while retaining the accuracy of energy services like regional load forecasting. In the second phase, a private noise distribution protocol, <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$nn$ </tex-math></inline-formula> -PND, securely distributes <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$n$ </tex-math></inline-formula> noise elements generated by an energy distribution operator to <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$n$ </tex-math></inline-formula> SMs in a semihonest adversarial model. Formal proofs of correctness and privacy of the scheme are provided. Experiments of regional short-term electricity consumption forecast using real-world data sets demonstrate the preservation of the utility over the masked data of this scheme.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.