skip to main content
10.1145/2966986.2980089guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Privacy protection via appliance scheduling in smart homes

Authors Info & Claims
Published:07 November 2016Publication History

ABSTRACT

Smart grid, managed by intelligent devices, have demonstrated great potentials to help residential customers to optimally schedule and manage the appliances' energy consumption. Due to the fine-grained power consumption information collected by smart meter, the customers' privacy becomes a serious concern. Combined with the effects of fake guideline electricity price, this paper focuses an on-line appliance scheduling design to protect customers' privacy in a cost-effective way, while taking into account the influences of non-schedulable appliances' operation uncertainties. We formulate the problem by minimizing the expected sum of electricity cost and achieving acceptable privacy protection. Without knowledge of future electricity consumptions, an on-line scheduling algorithm is proposed based on the only current observations by using a stochastic dynamic programming technique. The simulation results demonstrate the effectiveness of the proposed algorithm using real-world data.

References

  1. [1].Ameren day-ahead prices. https:.//www2.ameren.com/Retai1Energy/RealTimePrices.Google ScholarGoogle Scholar
  2. [2].Electricity consumption and occupancy. http://data-archive.ethz.ch/delivery/DelivervManagerServlet?dps_Did=IE594964.Google ScholarGoogle Scholar
  3. [3].Chang C.-C. and Lin C.-J.. Libsvm: a library for support vector machines, ACM Transactions on Intelliaent Systems and Technology, 2 (3): 27. 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4].Chen Z. and Wu L.. Residential appliance dr energy management with electric privacy protection by online stochastic optimization. IEEE Transactions on, Smart. Grid, 4 (4): 18611869. 2013.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5].Kalogridis G. Efthymiou C. Denic S. Z. Lewis T. A., and Cepeda R.. Privacy for smart meters: Towards undetectable appliance load signatures. In IEEE International Conference on Smart Grid Communications, pages 232237, 2010.Google ScholarGoogle Scholar
  6. [6].Liu Y., Hu S., and Ho T.-Y.. Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, pages 183190, 2014.Google ScholarGoogle Scholar
  7. [7].McLaughlin S. Mc Daniel P. and Aiello W.. Protecting consumer privacy from electric load monitoring. In Proceedings of the 18th ACM conference on Computerand communications security, pages 8798. ACM, 2011.Google ScholarGoogle Scholar
  8. [8].Mohsenian-Rad A.-H., Wong V. W. Jatskevich J., Schober R., and Leon-Garcia A.. Autonomous demand-side management based game-theoretic energy consumption scheduling for the future smart grid. IEEE transactions on Smart Grid, 1 (3): 320331, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  9. [9].Molina-Markham A. Shenoy P., Fu K., Cecchet E., and Irwin D.. Private memoirs of a smart meter. In ACM workshop on embedded sensing systems for enenyy-eficiency in building, pages 6166, 2010.Google ScholarGoogle Scholar
  10. [10].Palensky P. and Dietrich D.. Demand side management: Demand response, intelligent energy systems, and smart loads. IEEE transactions on industrial informatics, 7 (3): 3813882011.Google ScholarGoogle Scholar
  11. [11].Quinn E. L.. Smart metering and privacy: Existing laws and competing policies. Available at SSRN 1462285, 2009.Google ScholarGoogle Scholar
  12. [12].Sankar L. Rajagopalan S. R., and Mohajer S.. Smart meter privacy: A theoretical framework. IEEE Transactions on Smart Grid, 4 (2): 837846, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13].Smola A. J. and Schölkopf B.. A tutorial on support vector regression. Statistics and computing, 14 (3): 199222, 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14].Tan O., Gunduz D., and Poor H. V.. Increasing smart meter privacy through energy harvesting and storage devices. IEEE Journal on Selected Areas in Communications, 31 (7): 13311341, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15].Thissen U., Van Brakel R., De Weijer A., Melssen W., and Buydens L.. Using support vector machines for time series prediction. Chemometrics and intelligent laboratory systems, 69 (1): 3549, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16].Wu C.-H., Ho J.-M., and Lee D.-T.. Travel-time prediction with support vector regression. IEEE transactions on intelligent transportation systems, 5 (4): 276281, 2004.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17].Yang L., Chen X., Zhang J., and Poor H. V.. Cost-effective and privacy-preserving energy management for smart meters. IEEE Transactions on Smart Grid, 6 (1): 486495 2015.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18].Yuan Y., Li Z., and Ren K.. Modeling load redistribution attacks in power systems. IEEE Transactions on Smart Grid, 2 (2): 382390, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19].Yue S., Chen J., Gu Y., Wu C., and Shi Y.. Dual-priciIlg policy for controller-side strategies in demand side management. In IEEE International Conference on Smart Grid Communications, pages 357362, 2011.Google ScholarGoogle Scholar

Index Terms

  1. Privacy protection via appliance scheduling in smart homes
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image Guide Proceedings
            2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
            Nov 2016
            946 pages

            Copyright © 2016

            Publisher

            IEEE Press

            Publication History

            • Published: 7 November 2016

            Permissions

            Request permissions about this article.

            Request Permissions

            Qualifiers

            • research-article