Skip to main content

Maintaining Privacy in Data Rich Demand Response Applications

  • Conference paper
Smart Grid Security (SmartGridSec 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7823))

Included in the following conference series:

Abstract

The paper introduces the privacy problem of demand response applications performed with the OpenADR standard. A simple usage control focused solution and its limitations are shown.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Molina-Markham, A., Shenoy, P., et al.: Private memoirs of a smart meter. In: BuildSys 2010. ACM (2010)

    Google Scholar 

  2. Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 192–210. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  3. Rial, A., Danezis, G.: Privacy-preserving smart metering. Technical report, Microsoft Research (2010), http://research.microsoft.com/apps/pubs/?id=141726 (called October 26, 2012)

  4. Piette, M., Gahtikar, G., et al.: Open Automated Demand Responsecommunications Specification (2009)

    Google Scholar 

  5. AHAM: Assessment of Communication Standards of Smart Appliances, http://www.aham.org/ht/a/GetDocumentAction/i/50696 (called September 27, 2012)

  6. FERC: A National Assessment of Demand Response Potential (2009), http://www.ferc.gov/legal/staff-reports/06-09-demand-response.pdf (called November 2012)

  7. Roos, J., Lane, I.: Industrial power demand response analysis for one- part real-time pricing. IEEE Transactions on Power Systems 13 (1998)

    Google Scholar 

  8. Piette, M., Sezgen, O., et al.: Development and evaluation of fully automated demand response in large facilities (2005), http://escholarship.org/uc/item/4r45b9zt (called November 25, 2012)

  9. Herter, K.: An exploratory analysis of California residential customer response to critical peak pricing of electricity. Energy 32(1) (2007), http://www.sciencedirect.com/science/article/pii/S0360544206000314 (called November 25, 2012)

  10. Faruqui, A., George, S.: Quantifying customer response to dynamic pricing. The Electricity Journal 18(4) (2005), http://www.sciencedirect.com/science/article/pii/S1040619005000412 (called November 25, 2012)

  11. Jeske, T.: Privacy-preserving Smart Metering without a Trusted third-party. In: Proceedings of the International Conference on Security and Cryptography (2011)

    Google Scholar 

  12. Petrlic, R.: A privacy-preserving concept for smart grids. In: 18. DFN Workshop “Sicherheit in vernetzten Systemen” (2011)

    Google Scholar 

  13. Li, D., Williams, J., et al.: Privacy Preservation for Appliance Control Application. Technical Report DNA#2012-09 (2012)

    Google Scholar 

  14. Kursawe, K., Danezis, G., Kohlweiss, M.: Privacy-friendly aggregation for the smart-grid. In: Fischer-Hübner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 175–191. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  15. Pretschner, A., Schaefer, C., et al.: Mechanisms for Usage Control. In: ASIACCS (2008)

    Google Scholar 

  16. Pretschner, A.: An overview of Distributed Usage Control. In: Knowledge Engineering: Principles and Techniques (2009)

    Google Scholar 

  17. Goyal, V., Pandey, O., et al.: Attribute-based encryption for fine- grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (2006)

    Google Scholar 

  18. BSI (Federal Office for Information Security): Protection Profile for the Gateway of a Smart Metering System, final draft (2011), https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/SmartMeter/PP-SmartMeter.pdf?__blob=publicationFile (called November 25, 2012)

  19. Strüker, J., Kerschbaum, F.: From a Barrier to a Bridge: Data-Privacy in Dregulated Smart Grids. In: International Conference on Information Systems (2012)

    Google Scholar 

  20. Sahai, A., Waters, B.: Fuzzy Identity-Based Encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  21. Boneh, D., Franklin, M.: Identity Based Encryption from the Weil Pairing. SIAM J. of Computing 32(3) (2001)

    Google Scholar 

  22. Lazouski, A., Martinelli, F., Mori, P.: Usagecontrol in computer security: A survey. Computer Science Review 4(2) (2010)

    Google Scholar 

  23. Park, J., Sandhu, R.: Towards usagecontrol models: Beyond traditional access control. In: SACMAT 2002: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies. ACM (2002)

    Google Scholar 

  24. Rajkumar, P., Ghoshand, S., Dasgupta, P.: Application Specific Usage Control Implementation Verification. International Journal of Network Security & Its Applications (IJNSA) 1(3) (2009)

    Google Scholar 

  25. Hilty, M., Basin, D., Pretschner, A.: On obligations. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 98–117. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  26. Cutillo, L., Molva, R., Önen, M.: Privacy Preserving Picture Sharing: Enforcing Usage Control in Distributed On-Line Social Networks. In: Proceedings of the Fifth Workshop on Social Network Systems (2012)

    Google Scholar 

  27. NIST. Guidelines for Smart Grid Cyber Security: vol. 2 Privacy and the Smart Grid, NISTIR 7628 (2008)

    Google Scholar 

  28. Jawurek, M., Freiling, F.: Privacy Threat Analysis of Smart Metering. In: 41. Jahrestagung der Gesellschaft für Informatik, Berlin (2011)

    Google Scholar 

  29. Lisovich, M., Mulligan, D., Wicker, S.: Inferring personal information from demand-response systems. IEEE Security & Privacy 8(1) (2010)

    Google Scholar 

  30. Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 238–243 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karwe, M., Strüker, J. (2013). Maintaining Privacy in Data Rich Demand Response Applications. In: Cuellar, J. (eds) Smart Grid Security. SmartGridSec 2012. Lecture Notes in Computer Science, vol 7823. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38030-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38030-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38029-7

  • Online ISBN: 978-3-642-38030-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics