ABSTRACT
Smart grid, managed by intelligent devices, have demonstrated great potentials to help residential customers to optimally schedule and manage the appliances' energy consumption. Due to the fine-grained power consumption information collected by smart meter, the customers' privacy becomes a serious concern. Combined with the effects of fake guideline electricity price, this paper focuses an on-line appliance scheduling design to protect customers' privacy in a cost-effective way, while taking into account the influences of non-schedulable appliances' operation uncertainties. We formulate the problem by minimizing the expected sum of electricity cost and achieving acceptable privacy protection. Without knowledge of future electricity consumptions, an on-line scheduling algorithm is proposed based on the only current observations by using a stochastic dynamic programming technique. The simulation results demonstrate the effectiveness of the proposed algorithm using real-world data.
- [1].Ameren day-ahead prices. https:.//www2.ameren.com/Retai1Energy/RealTimePrices.Google Scholar
- [2].Electricity consumption and occupancy. http://data-archive.ethz.ch/delivery/DelivervManagerServlet?dps_Did=IE594964.Google Scholar
- [3]. . Libsvm: a library for support vector machines, ACM Transactions on Intelliaent Systems and Technology, 2 (3): 27. 2011.Google ScholarDigital Library
- [4]. . Residential appliance dr energy management with electric privacy protection by online stochastic optimization. IEEE Transactions on, Smart. Grid, 4 (4): 1861–1869. 2013.Google ScholarCross Ref
- [5]. . Privacy for smart meters: Towards undetectable appliance load signatures. In IEEE International Conference on Smart Grid Communications, pages 232–237, 2010.Google Scholar
- [6]. . Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, pages 183–190, 2014.Google Scholar
- [7]. . Protecting consumer privacy from electric load monitoring. In Proceedings of the 18th ACM conference on Computerand communications security, pages 87–98. ACM, 2011.Google Scholar
- [8]. . Autonomous demand-side management based game-theoretic energy consumption scheduling for the future smart grid. IEEE transactions on Smart Grid, 1 (3): 320–331, 2010.Google ScholarCross Ref
- [9]. . Private memoirs of a smart meter. In ACM workshop on embedded sensing systems for enenyy-eficiency in building, pages 61–66, 2010.Google Scholar
- [10]. . Demand side management: Demand response, intelligent energy systems, and smart loads. IEEE transactions on industrial informatics, 7 (3): 381–3882011.Google Scholar
- [11]. . Smart metering and privacy: Existing laws and competing policies. Available at SSRN 1462285, 2009.Google Scholar
- [12]. . Smart meter privacy: A theoretical framework. IEEE Transactions on Smart Grid, 4 (2): 837–846, 2013.Google ScholarCross Ref
- [13]. . A tutorial on support vector regression. Statistics and computing, 14 (3): 199–222, 2004.Google ScholarDigital Library
- [14]. . Increasing smart meter privacy through energy harvesting and storage devices. IEEE Journal on Selected Areas in Communications, 31 (7): 1331–1341, 2013.Google ScholarCross Ref
- [15]. . Using support vector machines for time series prediction. Chemometrics and intelligent laboratory systems, 69 (1): 35–49, 2003.Google ScholarCross Ref
- [16]. . Travel-time prediction with support vector regression. IEEE transactions on intelligent transportation systems, 5 (4): 276–281, 2004.Google ScholarDigital Library
- [17]. . Cost-effective and privacy-preserving energy management for smart meters. IEEE Transactions on Smart Grid, 6 (1): 486–495 2015.Google ScholarCross Ref
- [18]. . Modeling load redistribution attacks in power systems. IEEE Transactions on Smart Grid, 2 (2): 382–390, 2011.Google ScholarCross Ref
- [19]. . Dual-priciIlg policy for controller-side strategies in demand side management. In IEEE International Conference on Smart Grid Communications, pages 357–362, 2011.Google Scholar
Index Terms
- Privacy protection via appliance scheduling in smart homes
Recommendations
Preserving Privacy in Smart Homes: A Socio-Cultural Approach
CHI EA '18: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing SystemsSmart homes are expected to reduce the time we spend on routine activities. Data becomes an enabler and asset, as smart devices collect and process it. Smart homes also have the potential to exaggerate bewilderment and resistance, feelings people ...
Privacy Perceptions and Designs of Bystanders in Smart Homes
As the Internet of Things (IoT) devices make their ways into people's homes, traditional dwellings are turning into smart homes. While prior empirical studies have examined people's privacy concerns of smart homes and their desired ways of mitigating ...
Comments