Outsourceable Privacy-Preserving Power Usage Control in a Smart Grid

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9149)


The smart grid systems, in replace of the traditional power grid systems, have been widely used among some well-known telecommunication, IT and power industries. These systems have multiple advantages such as energy efficiency, reliability and self-monitoring. To prevent power outage, threshold based power usage control (PUC) in a smart grid considers a situation where the utility company sets a threshold to control the total power usage of a neighborhood. If the total power usage exceeds the threshold, certain households need to reduce their power consumption. In PUC, the utility company needs to frequently collect power usage data from smart meters. It has been well documented that these power usage data can reveal a person’s daily activity and violate personal privacy. To avoid the privacy concern, privacy-preserving power usage control (P-PUC) protocols have been introduced. However, the existing P-PUC protocols are not very efficient and the computations cannot be outsourced to a cloud server. Thus, the utility company cannot take advantage of the cloud computing paradigm to potentially reduce its operational cost. The goal of this paper is to develop a P-PUC protocol whose computation/execution is outsourceable to a cloud. In addition, the proposed protocol is much more efficient than the existing P-PUC protocols. We will provide extensive empirical study to show the practicality of our proposed protocol.


Smart grid Privacy-preserving Power usage control 



The authors would like to thank the anonymous reviewers for their insightful comments and suggestions. In addition, the first and third authors’ contribution to this work was supported by NSF under award No. CNS-1011984.


  1. 1.
    Guidelines for smart grid cyber security the smart grid interoper-ability panel cyber security working group. In: NISTIR 7628, August 2010Google Scholar
  2. 2.
    Atallah, M., Bykova, M., Li, J., Frikken, K., Topkara, M.: Private collaborative forecasting and benchmarking. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pp. 103–114. ACM (2004)Google Scholar
  3. 3.
    Blake, I.F., Kolesnikov, V.: One-round secure comparison of integers. J. Math. Cryptolol. 3(1), 37–68 (2009)MATHMathSciNetGoogle Scholar
  4. 4.
    Bunn, P., Ostrovsky, R.: Secure two-party k-means clustering. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 486–497. ACM (2007)Google Scholar
  5. 5.
    Cramer, R., Damgård, I.B., Nielsen, J.B.: Multiparty computation from threshold homomorphic encryption. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 280–299. Springer, Heidelberg (2001) CrossRefGoogle Scholar
  6. 6.
    Damgård, I.B., Geisler, M., Krøigaard, M.: Efficient and secure comparison for on-line auctions. In: Pieprzyk, J., Ghodosi, H., Dawson, E. (eds.) ACISP 2007. LNCS, vol. 4586, pp. 416–430. Springer, Heidelberg (2007) CrossRefGoogle Scholar
  7. 7.
    Damgard, I., Geisler, M., Kroigard, M.: Homomorphic encryption and secure comparison. Int. J. Appl. Crypt. 1(1), 22–31 (2008)MATHMathSciNetCrossRefGoogle Scholar
  8. 8.
    Drenker, S., Kader, A.: Nonintrusive monitoring of electric loads. IEEE Comput. Appl. Power 12(4), 47–51 (1999)CrossRefGoogle Scholar
  9. 9.
    Garay, J.A., Schoenmakers, B., Villegas, J.: Practical and secure solutions for integer comparison. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 330–342. Springer, Heidelberg (2007) CrossRefGoogle Scholar
  10. 10.
    Goldreich, O.: Foundations of Cryptography: Volume 2, Basic Applications., vol. 2. Cambridge University Press, New York (2009) Google Scholar
  11. 11.
    Chun, H., Jiang, W., McMillin, B.: Privacy-preserving power usage control in the smart grid. In: Butts, J., Shenoi, S. (eds.) Critical Infrastructure Protection VI. IFIP Advances in Information and Communication Technology, vol. 390, pp. 127–137. Springer, Berlin Heidelberg (2012)CrossRefGoogle Scholar
  12. 12.
    Huang, Y., Evans, D., Katz, J., Malka, L.: Faster secure two-party computation using garbled circuits. In: USENIX Security Symposium, vol. 201 (2011)Google Scholar
  13. 13.
    Jokar, N., Arianpoo, P., Leung, V.: A survey on security issues in smart grids. Secur. Comm. Netw. 7(4), 414–424 (2012). doi: 10.1002/sec.559.V.C.M Google Scholar
  14. 14.
    Kursawe, K., Danezis, G., Kohlweiss, M.: Privacy-friendly aggregation for the smart-grid. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 175–191. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  15. 15.
    Lisovich, M.A., Mulligan, D.K., Wicker, S.B.: Inferring personal information from demand-response systems. IEEE Secur. Privacy 8(1), 11–20 (2010)CrossRefGoogle Scholar
  16. 16.
    Liu, J., Xiao, Y., Li, S., Liang, W., Chen, C.L.P.: Cyber security and privacy issues in smart grids. IEEE Commun. Surv. Tutorials 14(4), 981–997 (2012)CrossRefGoogle Scholar
  17. 17.
    Rongxing, L., Xiaohui Liang, X., Li, X.L., Shen, X.: Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621–1631 (2012)CrossRefGoogle Scholar
  18. 18.
    Melicher, W., Zahur, S., Evans, D.: An intermediate language for garbled circuits. In: IEEE Symposium on Security and Privacy Poster Abstract (2012)Google Scholar
  19. 19.
    Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building, pp. 61–66. ACM (2010)Google Scholar
  20. 20.
    Nergiz, A.E., Nergiz, M.E., Pedersen, T., Clifton, C.: Practical and secure integer comparison and interval check. In: 2010 IEEE Second International Conference on Social Computing (SocialCom), pp. 791–799. IEEE (2010)Google Scholar
  21. 21.
    Quinn, E.L.: Privacy and the new energy infrastructure. SSRN E. J. (2009). http://dx.doi.org/10.2139/ssrn.1370731
  22. 22.
    Quinn, E.L.: Smart metering and privacy: existing laws and competing policies. SSRN eLibrary (2009). http://dx.doi.org/10.2139/ssrn.1462285
  23. 23.
    Rial, A., Danezis, G.: Privacy-preserving smart metering. In: Proceedings of the 10th annual ACM Workshop on Privacy in the Electronic Society, pp. 49–60. ACM (2011)Google Scholar
  24. 24.
    Rouf, I., Mustafa, H., Xu, M., Xu, W., Miller, R., Gruteser, M.: Neighborhood watch: security and privacy analysis of automatic meter reading systems. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 462–473. ACM (2012)Google Scholar
  25. 25.
    Salinas, S., Li, M., Li, P.: Privacy-preserving energy theft detection in smart grids. In: 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 605–613. IEEE (2012)Google Scholar
  26. 26.
    Samanthula, B.K., Chun, H., Jiang, W., McMillin, B.M.: Secure and threshold-based power usage control in smart grid environments. Int. J. Parallel, Emergent Distrib. Syst. 29(3), 264–289 (2014)CrossRefGoogle Scholar
  27. 27.
    Saputro, N., Akkaya, K.: Performance evaluation of smart grid data aggregation via homomorphic encryption. In: 2012 IEEE Wireless Communications and Networking Conference (WCNC), pp. 2945–2950. IEEE (2012)Google Scholar
  28. 28.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MATHMathSciNetCrossRefGoogle Scholar
  29. 29.
    Yao, A.C.-C.: How to generate and exchange secrets. In: 1986 27th Annual Symposium on Foundations of Computer Science, pp. 162–167. IEEE (1986)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2015

Authors and Affiliations

  1. 1.Department of Computer ScienceMissouri University of Science and TechnologyRollaUSA
  2. 2.Department of Computer Science and EngineeringSUNY BuffaloBuffaloUSA

Personalised recommendations