Skip to main content

Mobile User Data Privacy

  • Chapter
  • First Online:
Smart Grids: Security and Privacy Issues

Abstract

Smart grid (SG) concept is introduced to achieve a sustainable, secure, and environmentally-friendly power system by using new elements such as distributed renewable resources, advanced metering infrastructure, and modern transportation in terms of electric vehicle (EV) utilization [1, 2]. In recent years, the U.S. government targets to increase the penetration of modern EVs[3]. From a critical point of view, utilizing large number of EVs connected to the future power grid may threaten the reliability and stability of power grid [4, 5]. The society of automotive engineers (SAE) established some standards about the utilization of EVs including SAE J2847 which institutes requirements and specifications for communication between EVs and power system. This standard specifies interactions between EVs and power system operators [6]. According to [1], from the utilities perspective, it is not elaborately specified whether EV utilization in terms of vehicle to grid (V2G) is cost-effective [7]. In [8], the authors introduced a comparison between direct and deterministic communication structure and proposed an aggregative command transmit architecture considering three influential factors, reliability, availability, and participating EVs in ancillary services.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Running maximum M t of the Brownian Motion process B t is a random process which has the following cumulative density function at the arbitrary time t > 0 (σ 2 represents the variance of process B t ): \(F_{M_{t}}(m) = \mbox{ erf}\left ( \frac{m} {\sqrt{2t\sigma ^{2}}} \right )\) for every m ≥ 0.

References

  1. R. Dewri, Location privacy and attacker knowledge: who are we fighting against? in Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 96 (Springer, Berlin, 2012), pp. 96–115

    Google Scholar 

  2. M. Li, S. Salinas, A. Thapa, P. Li, n-CD: a geometric approach to preserving location privacy in location-based services, in Proceedings of IEEE INFOCOM, 2013

    Google Scholar 

  3. M. Gruteser, D. Grunwald, Anonymous usage of location-based services through spatial and temporal cloaking, in ACM Mobisys’03, May 2003

    Google Scholar 

  4. B. Gedik, L. Liu, Protecting location privacy with personalized k-anonymity: architecture and algorithms. IEEE Trans. Mob. Comput. 7(1), 1–18 (2008)

    Article  Google Scholar 

  5. J. Meyerowitz, R.R. Choudhury, Hiding stars with fireworks: location privacy through camouflage, in Proceedings of ACM MobiCom, Beijing, Sept 2009

    Google Scholar 

  6. M.F. Mokbel, C.Y. Chow, W.G. Aref, The new casper: query processing for location services without compromising privacy, in Proceedings of VLDB, 2006

    Google Scholar 

  7. C.-Y. Chow, M.F. Mokbel, X. Liu, A peer-to-peer spatial cloaking algorithm for anonymous location-based service, in Proceedings of ACM GIS, Arlington, VA, Nov 2006

    Google Scholar 

  8. A. Beresford, F. Stajano, Location privacy in pervasive computing. IEEE Pervasive Comput. 2(1), 46–55 (2003)

    Article  Google Scholar 

  9. B. Hoh, M. Gruteser, H. Xiong, A. Alrabady, Preserving privacy in GPS traces via uncertainty-aware path cloaking, in Proceedings of ACM CCS 2007, Alexandria, VA, Jan 2007

    Google Scholar 

  10. H. Kido, Y. Yanagisawa, T. Satoh, An anonymous communication technique using dummies for location-based services, in Proceedings of IEEE ICPS, Santorini, July 2006

    Google Scholar 

  11. P. Kalnis, G. Ghinita, K. Mouratidis, D. Papadias, Preventing location-based identity inference in anonymous spatial queries. IEEE Trans. Knowl. Data Eng. 19(12), 1719–1733 (2007)

    Article  Google Scholar 

  12. B. Gedik, L. Liu, Location privacy in mobile systems: a personalized anonymization model, in Proceedings of IEEE ICDCS, Columbus, OH, June 2005

    Google Scholar 

  13. H. Lu, C.S. Jensen, M.L. Yiu, Pad: privacy-area aware, dummy based location privacy in mobile services, in Proceedings of ACM MobiDE, Vancouver, June 2008

    Google Scholar 

  14. M. Duckham, L. Kulik, A formal model of obfuscation and negotiation for location privacy, in Proceedings of International Conference on Pervasive Computing, Munich, May 2005

    Google Scholar 

  15. C.A. Ardagna, M. Cremonini, S.D.C. di Vimercati, P. Samarati, An obfuscation-based approach for protecting location privacy. IEEE Trans. Dependable Secure Comput. 8(1), 13–27 (2011)

    Article  Google Scholar 

  16. A. Pingley, W. Yu, N. Zhang, X. Fu, W. Zhao, Cap: a contextaware privacy protection system for location-based services, in Proceedings of IEEE ICDCS, Montreal, June 2009

    Google Scholar 

  17. M. Damiani, E. Bertino, C. Silvestri, Probe: an obfuscation system for the protection of sensitive location information in LBS. Technical Report 2001–145, CERIAS, 2008

    Google Scholar 

  18. R. Shokri, G. Theodorakopoulos, C. Troncoso, J.-P. Hubaux, J.-Y. Le Boudec, Protecting location privacy: optimal strategy against localization attacks, in CCS ‘12 Proceedings of the 2012 ACM conference on Computer and Communications Security, New York, NY, 2012, pp. 617–627

    Google Scholar 

  19. R. Shokri, G. Theodorakopoulos, J.-Y. Le Boudec, J.-P. Hubaux, Quantifying location privacy, in 2011 IEEE Symposium on Security and Privacy (SP), Berkeley, CA, May 2011, pp. 247–262

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Boroojeni, K.G., Amini, M.H., Iyengar, S.S. (2017). Mobile User Data Privacy. In: Smart Grids: Security and Privacy Issues. Springer, Cham. https://doi.org/10.1007/978-3-319-45050-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-45050-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-45049-0

  • Online ISBN: 978-3-319-45050-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics