Abstract
We propose a demand response privacy preserving interaction and intermediary protocol design (DPIP) using a trusted third party design to facilitate the collection of Smart Metering data and to perform Demand Response while preserving the privacy of residential customers in the Smart Grid. DPIP relies on intermediaries hiding customer program participation from Demand Response Aggregators (DRA) and thus enhance their anonymity and it provides individualized privacy preserved billing. This is the first of a series of papers. Its focus is the protocol, while following work discusses the role of differential privacy. Keywords: Smart Grid Management, Privacy, Privacy Enhancing Technologies.
The research leading to these results has received funding from the European Union’s Seventh Framework Programme (FP7-SMARTCITIES-2013) under grant agreement no 608712.
References
Arshad, N., Dahlquist, E., Javed, F., Vassileva, I., Wallin, F.: Forecasting for demand response in smart grids: an analysis on use of anthropologic and structural data and short term multiple loads forecasting. Appl. Energy 96, 150–160 (2012)
Avellana, N.: iURBAN Intelligent URBAN Energy Tool. FP7-SMARTCITIES-2013-608712 (2014). http://www.iurban-project.eu/about-the-project-en/related-projects.html Called 30 October 2014
Baligh, H.H., Richartz, L.E.: An analysis of vertical market structures. Manage. Sci. 10(4), 667–689 (1964)
Bieser, G., Strüker, J., Weppner, H.: Intermediaries for the internet of energy - exchanging smart meter data as a business model. In: ECIS 2011 (2011)
Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998)
Brown, I., Martin, A., Paverd, A.: Security and privacy in smart grid demand response systems. In: Second Internaional Workshop, SmartGridSec2014, Munich Germany (2014)
Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP) Common Criteria, SMGW-PP, Version 1.3, 31 March 2014
Cecchet, E., Fu, K., Irwin, D., Molina-Markham, A., Shenoy, P.: Private memoirs of a smart meter. In: BuildSys@SenSys 2010 (2010)
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)
Dwork, C., Smith, A.: Differential privacy for statistics: what we know and what we want to learn. J. Privacy Confidentiality 1, 135–154 (2009)
Eibl, G., Engel, D.: Influence of data granularity on nonintrusive appliance load monitoring. In: 2nd ACM Workshop on Information Hiding and Multimedia Security (2014)
Erkin, Z., Troncoso-Pastoriza, J.R., Lagendijk, R.L., Pérez-González, F.: Privacy-preserving data aggregation in smart metering systems. IEEE Sig. Process. Mag. 30, 75–86 (2013)
Jawurek, M., Johns, M., Rieck, K.: Smart metering de-pseudonymization. In: ACSAC (2011)
Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192–210. Springer, Heidelberg (2011)
Jawurek, M., Kerschbaum, F., Orlandi, C.: Zero-knowledge using garbled circuits: how to prove non-algebraic statements efficiently. In: ACM Conference on Computer and Communications Security 2013 (2013)
Jeske, T.: Privacy-preserving smart metering without a trusted-third-party. In: SECRYPT 2011 (2011)
Karwe, M, Strüker, J.: Privacy in residential demand side management applications. In: Smart Grid Security: Second Internaional Workshop, SmartGridSec2014, Munich Germany (2014)
Kerschbaum, F., Strüker, J.: From a barrier to a bride: data-privacy in deregulated smart grids. In: Thirty Third International Journal Conference on Information Systems, Orlando USA (2012)
Li, H., Lin, X., Yang, H., Liang, X., Lu, R., Shen, X.: EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans. Parallel Distrib. Syst. 25, 2053–2064 (2014)
McKenna, E., Richardson, I., Thomson, M.: Smart meter data: balancing consumer privacy with legitimate applications. Energy Policy 41, 807–814 (2012)
Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999)
Pretschner, A., Schaefer, C.: Mechanisms for usage control. In: ASIACCS (2008)
Skopik, F.: Security is not enough! on privacy challenges in smart grids. Int. J. Smart Grid Clean Energy 1, 7–14 (2012)
Sweeny, L.: k-Anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10, 557–570 (2002)
Westin, A.: Privacy and Freedom. Atheneum, New York (1967)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Karwe, M., Müller, G. (2015). DPIP: A Demand Response Privacy Preserving Interaction Protocol. In: Abramowicz, W. (eds) Business Information Systems Workshops. BIS 2015. Lecture Notes in Business Information Processing, vol 228. Springer, Cham. https://doi.org/10.1007/978-3-319-26762-3_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-26762-3_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26761-6
Online ISBN: 978-3-319-26762-3
eBook Packages: Computer ScienceComputer Science (R0)