Skip to main content

“Hello? Is There Anybody in There?” Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure

  • Conference paper
  • First Online:
Applied Cryptography and Network Security (ACNS 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14585))

Included in the following conference series:

  • 244 Accesses

Abstract

Smart meters provide fine-grained power usage profiles of consumers to utility providers to facilitate various grid functionalities such as load monitoring, real-time pricing, etc. However, information leakage from these usage profiles can potentially reveal sensitive aspects of consumers’ daily routines and their home absence, as state-of-the-art metering strategies lack adequate security and privacy measures. Among various privacy-preserving mechanisms, Differential Privacy (DP) is widely adopted in the literature due to its solid mathematical foundation. Nevertheless, the privacy-utility trade-off problem in smart metering systems limits the amount of privacy protection various instances of DP mechanisms can provide. We demonstrate that the constraints imposed by the privacy-utility trade-off make it possible to launch empirical statistical attacks on the differential private metering data. In this paper, we propose a novel statistical methodology, constructed using the principles of t-test based hypothesis testing, to discover the absence of a consumer in their household upon observing real-time differentially private output traces of sensitive meter readings over successive sampling windows. Additionally, we formally establish that this trade-off is an inherent characteristic of the smart metering problem, implying that any mechanism adhering to this trade-off is susceptible to our attack. We conduct an extensive experimental evaluation using a real-world metering dataset to validate our proposed methodology. We evaluate our scheme against six state-of-the-art DP mechanisms employed in metering infrastructure. Our results demonstrate that the proposed approach attains a success rate exceeding \(90\%\) within a mere six-hour observation interval, highlighting its effectiveness in revealing vulnerabilities within established DP implementations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Google’s differential privacy libraries (2022). https://github.com/google/differential-privacy

  2. Naperville Smart Meters Keep Track of Household Activities (2022). https://smartgridawareness.org/2013/10/03/smart-meter-data-reveals/

  3. Ács, G., Castelluccia, C.: I have a DREAM! (DiffeRentially privatE smArt Metering). In: Filler, T., Pevný, T., Craver, S., Ker, A. (eds.) IH 2011. LNCS, vol. 6958, pp. 118–132. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24178-9_9

    Chapter  Google Scholar 

  4. Avula, R.R., Oechtering, T.J.: Privacy-enhancing appliance filtering for smart meters. In: ICASSP 2022–2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 9042–9046. IEEE (2022)

    Google Scholar 

  5. Bao, H., Lu, R.: A new differentially private data aggregation with fault tolerance for smart grid communications. IEEE Internet Things J. 2(3), 248–258 (2015). https://doi.org/10.1109/JIOT.2015.2412552

    Article  Google Scholar 

  6. Barbosa, P., Brito, A., Almeida, H.: A technique to provide differential privacy for appliance usage in smart metering. Inf. Sci. 370 (2016)

    Google Scholar 

  7. Cao, X., Jia, J., Gong, N.Z.: Data poisoning attacks to local differential privacy protocols. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 947–964 (2021)

    Google Scholar 

  8. Chen, R., Fung, B.C., Yu, P.S., Desai, B.C.: Correlated network data publication via differential privacy. VLDB J. 23, 653–676 (2014)

    Article  Google Scholar 

  9. Cheu, A., Smith, A., Ullman, J.: Manipulation attacks in local differential privacy. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 883–900. IEEE (2021)

    Google Scholar 

  10. Clark, M.R., Hopkinson, K.M.: Towards an understanding of the tradeoffs in adversary models of smart grid privacy protocols. In: 2013 IEEE Power and Energy Society General Meeting, pp. 1–5 (2013). https://doi.org/10.1109/PESMG.2013.6672334

  11. Dimitriou, T.: Secure and scalable aggregation in the smart grid. In: 2014 6th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–5 (2014). https://doi.org/10.1109/NTMS.2014.6814048

  12. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1

    Chapter  Google Scholar 

  13. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79228-4_1

    Chapter  Google Scholar 

  14. Dwork, C.: A firm foundation for private data analysis. Commun. ACM 54(1), 86–95 (2011)

    Article  Google Scholar 

  15. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006). https://doi.org/10.1007/11681878_14

    Chapter  Google Scholar 

  16. Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends® Theor. Comput. Sci. (2014)

    Google Scholar 

  17. Dwork, C., Smith, A.: Differential privacy for statistics: What we know and what we want to learn. J. Priv. Confidentiality (2009)

    Google Scholar 

  18. Eibl, G., Engel, D.: Differential privacy for real smart metering data. Comput. Sci.-Res. Dev. 32(1), 173–182 (2017)

    Article  Google Scholar 

  19. Farokhi, F.: Review of results on smart-meter privacy by data manipulation, demand shaping, and load scheduling. IET Smart Grid 3(5), 605–613 (2020)

    Article  Google Scholar 

  20. Geng, Q., Ding, W., Guo, R., Kumar, S.: Tight analysis of privacy and utility tradeoff in approximate differential privacy. In: International Conference on Artificial Intelligence and Statistics, pp. 89–99. PMLR (2020)

    Google Scholar 

  21. Gilbert Goodwill, B.J., Jaffe, J., Rohatgi, P., et al.: A testing methodology for side-channel resistance validation. In: NIST Non-invasive Attack Testing Workshop, vol. 7, pp. 115–136 (2011)

    Google Scholar 

  22. Giraldo, J., Cardenas, A., Kantarcioglu, M., Katz, J.: Adversarial classification under differential privacy. In: Network and Distributed Systems Security (NDSS) Symposium 2020 (2020)

    Google Scholar 

  23. Goel, S., Hong, Y.: Security challenges in smart grid implementation. In: Smart Grid Security. SC, pp. 1–39. Springer, London (2015). https://doi.org/10.1007/978-1-4471-6663-4_1

    Chapter  Google Scholar 

  24. Gough, M.B., Santos, S.F., AlSkaif, T., Javadi, M.S., Castro, R., Catalão, J.P.: Preserving privacy of smart meter data in a smart grid environment. IEEE Trans. Ind. Inform. (2021)

    Google Scholar 

  25. Gough, M.B., Santos, S.F., AlSkaif, T., Javadi, M.S., Castro, R., Catalão, J.P.S.: Preserving privacy of smart meter data in a smart grid environment. IEEE Trans. Ind. Inf. 18(1), 707–718 (2022). https://doi.org/10.1109/TII.2021.3074915

    Article  Google Scholar 

  26. Hassan, M.U., Rehmani, M.H., Chen, J.: Performance evaluation of differential privacy mechanisms in blockchain based smart metering. arXiv preprint arXiv:2007.09802 (2020)

  27. Hassan, M.U., Rehmani, M.H., Kotagiri, R., Zhang, J., Chen, J.: Differential privacy for renewable energy resources based smart metering. J. Parallel Distrib. Comput. 131, 69–80 (2019)

    Article  Google Scholar 

  28. Hassan, M.U., Rehmani, M.H., Kotagiri, R., Zhang, J., Chen, J.: Differential privacy for renewable energy resources based smart metering. J. Parallel Distrib. Comput. 131, 69–80 (2019

    Google Scholar 

  29. Hong, Y., Liu, W.M., Wang, L.: Privacy preserving smart meter streaming against information leakage of appliance status. IEEE Trans. Inf. Forensics Secur. 12(9) (2017). https://doi.org/10.1109/TIFS.2017.2704904

  30. Huang, W., Zhou, S., Liao, Y., Zhuo, M.: Optimizing query times for multiple users scenario of differential privacy. IEEE Access 7, 183292–183299 (2019)

    Article  Google Scholar 

  31. Huang, Z., Mitra, S., Dullerud, G.: Differentially private iterative synchronous consensus. In: Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, pp. 81–90 (2012)

    Google Scholar 

  32. Jin, J., McMurtry, E., Rubinstein, B.I., Ohrimenko, O.: Are we there yet? timing and floating-point attacks on differential privacy systems. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 473–488. IEEE (2022)

    Google Scholar 

  33. Kairouz, P., Oh, S., Viswanath, P.: The composition theorem for differential privacy. In: International Conference on Machine Learning, pp. 1376–1385. PMLR (2015)

    Google Scholar 

  34. Kelly, J., Knottenbelt, W.: Neural NILM: deep neural networks applied to energy disaggregation. In: Proceedings of the 2nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments, pp. 55–64 (2015)

    Google Scholar 

  35. Kelly, J., Knottenbelt, W.: The UK-dale dataset, domestic appliance-level electricity demand and whole-house demand from five UK homes. Sci. Data 2(1), 1–14 (2015)

    Article  Google Scholar 

  36. Liu, C., Chakraborty, S., Mittal, P.: Dependence makes you vulnberable: differential privacy under dependent tuples. In: NDSS, vol. 16, pp. 21–24 (2016)

    Google Scholar 

  37. Nissim, K., Raskhodnikova, S., Smith, A.: Smooth sensitivity and sampling in private data analysis. In: Proceedings of the Thirty-Ninth Annual ACM Symposium on Theory of Computing, pp. 75–84 (2007)

    Google Scholar 

  38. Rajagopalan, S.R., Sankar, L., Mohajer, S., Poor, H.V.: Smart meter privacy: a utility-privacy framework. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 190–195. IEEE (2011)

    Google Scholar 

  39. Randolph, M., Diehl, W.: Power side-channel attack analysis: a review of 20 years of study for the layman. Cryptography 4(2), 15 (2020)

    Article  Google Scholar 

  40. Saha, S., Kumar, S.N., Patranabis, S., Mukhopadhyay, D., Dasgupta, P.: Alafa: automatic leakage assessment for fault attack countermeasures. In: Proceedings of the 56th Annual Design Automation Conference 2019, pp. 1–6 (2019)

    Google Scholar 

  41. Sankar, L., Rajagopalan, S.R., Mohajer, S., Poor, H.V.: Smart meter privacy: a theoretical framework. IEEE Trans. Smart Grid 4(2) (2012)

    Google Scholar 

  42. Tan, R., Badrinath Krishna, V., Yau, D.K., Kalbarczyk, Z.: Impact of integrity attacks on real-time pricing in smart grids. In: Proceedings of the 2013 ACM SIGSAC conference on Computer and communications security (2013)

    Google Scholar 

  43. Tran, H.Y., Hu, J., Pota, H.R.: Smart meter data obfuscation with a hybrid privacy-preserving data publishing scheme without a trusted third party. IEEE Internet Things J. 9(17), 16080–16095 (2022)

    Article  Google Scholar 

  44. Wagh, G.S., Gupta, S., Mishra, S.: A distributed privacy preserving framework for the smart grid. In: 2020 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp. 1–5 (2020). https://doi.org/10.1109/ISGT45199.2020.9087730

  45. Wang, H., Xu, Z., Jia, S., Xia, Y., Zhang, X.: Why current differential privacy schemes are inapplicable for correlated data publishing? World Wide Web 24(1), 1–23 (2021)

    Article  Google Scholar 

  46. Wang, H., Zhang, J., Lu, C., Wu, C.: Privacy preserving in non-intrusive load monitoring: a differential privacy perspective. IEEE Trans. Smart Grid 12(3), 2529–2543 (2020)

    Article  Google Scholar 

  47. Xu, D., Yuan, S., Wu, X.: Achieving differential privacy and fairness in logistic regression. In: Companion Proceedings of the 2019 World Wide Web Conference, pp. 594–599 (2019)

    Google Scholar 

  48. Zhang, C., Zhong, M., Wang, Z., Goddard, N., Sutton, C.: Sequence-to-point learning with neural networks for non-intrusive load monitoring. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 32 (2018)

    Google Scholar 

  49. Zheng, Z., Wang, T., Bashir, A.K., Alazab, M., Mumtaz, S., Wang, X.: A decentralized mechanism based on differential privacy for privacy-preserving computation in smart grid. IEEE Trans. Comput. 71(11), 2915–2926 (2021)

    Article  Google Scholar 

Download references

Acknowledgement

The authors would like to thank the anonymous reviewers for their insightful comments and suggestions for improving the paper. They would also like to thank the Department of Science and Technology (DST), Govt of India, IHUB NTIHAC Foundation, C3i Building, Indian Institute of Technology Kanpur, and Centre on Hardware-Security Entrepreneurship Research and Development, Meity, India, for partially funding this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soumyadyuti Ghosh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ghosh, S., Alam, M., Dey, S., Mukhopadhyay, D. (2024). “Hello? Is There Anybody in There?” Leakage Assessment of Differential Privacy Mechanisms in Smart Metering Infrastructure. In: Pöpper, C., Batina, L. (eds) Applied Cryptography and Network Security. ACNS 2024. Lecture Notes in Computer Science, vol 14585. Springer, Cham. https://doi.org/10.1007/978-3-031-54776-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-54776-8_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-54775-1

  • Online ISBN: 978-3-031-54776-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics