Abstract
The paper introduces the privacy problem of demand response applications performed with the OpenADR standard. A simple usage control focused solution and its limitations are shown.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Molina-Markham, A., Shenoy, P., et al.: Private memoirs of a smart meter. In: BuildSys 2010. ACM (2010)
Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192–210. Springer, Heidelberg (2011)
Rial, A., Danezis, G.: Privacy-preserving smart metering. Technical report, Microsoft Research (2010), http://research.microsoft.com/apps/pubs/?id=141726 (called October 26, 2012)
Piette, M., Gahtikar, G., et al.: Open Automated Demand Responsecommunications Specification (2009)
AHAM: Assessment of Communication Standards of Smart Appliances, http://www.aham.org/ht/a/GetDocumentAction/i/50696 (called September 27, 2012)
FERC: A National Assessment of Demand Response Potential (2009), http://www.ferc.gov/legal/staff-reports/06-09-demand-response.pdf (called November 2012)
Roos, J., Lane, I.: Industrial power demand response analysis for one- part real-time pricing. IEEE Transactions on Power Systems 13 (1998)
Piette, M., Sezgen, O., et al.: Development and evaluation of fully automated demand response in large facilities (2005), http://escholarship.org/uc/item/4r45b9zt (called November 25, 2012)
Herter, K.: An exploratory analysis of California residential customer response to critical peak pricing of electricity. Energy 32(1) (2007), http://www.sciencedirect.com/science/article/pii/S0360544206000314 (called November 25, 2012)
Faruqui, A., George, S.: Quantifying customer response to dynamic pricing. The Electricity Journal 18(4) (2005), http://www.sciencedirect.com/science/article/pii/S1040619005000412 (called November 25, 2012)
Jeske, T.: Privacy-preserving Smart Metering without a Trusted third-party. In: Proceedings of the International Conference on Security and Cryptography (2011)
Petrlic, R.: A privacy-preserving concept for smart grids. In: 18. DFN Workshop “Sicherheit in vernetzten Systemen” (2011)
Li, D., Williams, J., et al.: Privacy Preservation for Appliance Control Application. Technical Report DNA#2012-09 (2012)
Kursawe, K., Danezis, G., Kohlweiss, M.: Privacy-friendly aggregation for the smart-grid. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 175–191. Springer, Heidelberg (2011)
Pretschner, A., Schaefer, C., et al.: Mechanisms for Usage Control. In: ASIACCS (2008)
Pretschner, A.: An overview of Distributed Usage Control. In: Knowledge Engineering: Principles and Techniques (2009)
Goyal, V., Pandey, O., et al.: Attribute-based encryption for fine- grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (2006)
BSI (Federal Office for Information Security): Protection Profile for the Gateway of a Smart Metering System, final draft (2011), https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/SmartMeter/PP-SmartMeter.pdf?__blob=publicationFile (called November 25, 2012)
Strüker, J., Kerschbaum, F.: From a Barrier to a Bridge: Data-Privacy in Dregulated Smart Grids. In: International Conference on Information Systems (2012)
Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)
Boneh, D., Franklin, M.: Identity Based Encryption from the Weil Pairing. SIAM J. of Computing 32(3) (2001)
Lazouski, A., Martinelli, F., Mori, P.: Usagecontrol in computer security: A survey. Computer Science Review 4(2) (2010)
Park, J., Sandhu, R.: Towards usagecontrol models: Beyond traditional access control. In: SACMAT 2002: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies. ACM (2002)
Rajkumar, P., Ghoshand, S., Dasgupta, P.: Application Specific Usage Control Implementation Verification. International Journal of Network Security & Its Applications (IJNSA) 1(3) (2009)
Hilty, M., Basin, D., Pretschner, A.: On obligations. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 98–117. Springer, Heidelberg (2005)
Cutillo, L., Molva, R., Önen, M.: Privacy Preserving Picture Sharing: Enforcing Usage Control in Distributed On-Line Social Networks. In: Proceedings of the Fifth Workshop on Social Network Systems (2012)
NIST. Guidelines for Smart Grid Cyber Security: vol. 2 Privacy and the Smart Grid, NISTIR 7628 (2008)
Jawurek, M., Freiling, F.: Privacy Threat Analysis of Smart Metering. In: 41. Jahrestagung der Gesellschaft für Informatik, Berlin (2011)
Lisovich, M., Mulligan, D., Wicker, S.: Inferring personal information from demand-response systems. IEEE Security & Privacy 8(1) (2010)
Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 238–243 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Karwe, M., Strüker, J. (2013). Maintaining Privacy in Data Rich Demand Response Applications. In: Cuellar, J. (eds) Smart Grid Security. SmartGridSec 2012. Lecture Notes in Computer Science, vol 7823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38030-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-38030-3_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38029-7
Online ISBN: 978-3-642-38030-3
eBook Packages: Computer ScienceComputer Science (R0)