Skip to main content
Top
Published in: SICS Software-Intensive Cyber-Physical Systems 1-2/2017

16-07-2016 | Special Issue Paper

Preserving privacy in Distributed Energy Management

Authors: Daniel Brettschneider, Daniel Hölker, Alfred Scheerhorn, Ralf Tönjes

Published in: SICS Software-Intensive Cyber-Physical Systems | Issue 1-2/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The smart power grid transforms into a distributed system of manifold stakeholders by integrating communication technology into the former static power grid. Distributed Energy Management (DEM) will play a vital role in future demand supply matching. An important and often overlooked factor in this concept is privacy. In this paper we present Priv-ADE, a privacy preserving algorithm for DEM. It utilises homomorphic encryption to privately gather aggregated data and perform energy management based on the max–min fairness principle. Simulations show that PrivADE achieves similar consumption results as two comparative approaches, while in contrast preserves privacy at all times. The computational and communicational complexity is analysed. Furthermore, the privacy concept is adopted to PowerMatcher.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Computer Science - Research and Development

Computer Science – Research and Development (CSRD), formerly Informatik – Forschung und Entwicklung (IFE), is a quarterly international journal that publishes high-quality research and survey papers from the Software Engineering & Systems area.

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Brettschneider D, Hölker D, Tönjes R (2016) SiENA: simulator for energy network applications combining power, heat and communication. In: VDE eV (ed) VDE Kongress 2016 Brettschneider D, Hölker D, Tönjes R (2016) SiENA: simulator for energy network applications combining power, heat and communication. In: VDE eV (ed) VDE Kongress 2016
2.
go back to reference Brettschneider D, Hölker D, Tönjes R, Scheerhorn A (2016) On homomorphic encryption for privacy-preserving distributed load adaption in smart grids. In: 2016 IEEE international conference on communications (ICC) Brettschneider D, Hölker D, Tönjes R, Scheerhorn A (2016) On homomorphic encryption for privacy-preserving distributed load adaption in smart grids. In: 2016 IEEE international conference on communications (ICC)
3.
go back to reference Brettschneider D, Scheerhorn A, Hölker D, Roer P, Tönjes R (2015) Privacy-friendly distributed algorithm for energy management in smart grids. In: 2015 international conference and workshops on networked systems (NetSys), pp 1–8 Brettschneider D, Scheerhorn A, Hölker D, Roer P, Tönjes R (2015) Privacy-friendly distributed algorithm for energy management in smart grids. In: 2015 international conference and workshops on networked systems (NetSys), pp 1–8
4.
go back to reference ElGamal T (1984) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley GR, Chaum D (eds) Advances in cryptology. Springer, Berlin, pp 10–18 ElGamal T (1984) A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley GR, Chaum D (eds) Advances in cryptology. Springer, Berlin, pp 10–18
5.
go back to reference Federal Statistical Office of Germany: Ausstattung privater Haushalte mit ausgewählten Gebrauchsgütern (2013) Federal Statistical Office of Germany: Ausstattung privater Haushalte mit ausgewählten Gebrauchsgütern (2013)
6.
go back to reference Fontaine C, Galand F (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007:15:1–15:15 Fontaine C, Galand F (2007) A survey of homomorphic encryption for nonspecialists. EURASIP J Inf Secur 2007:15:1–15:15
7.
go back to reference Henderson TR, Lacage M, Riley GF, Dowell C, Kopena J (2008) Network simulations with the ns-3 simulator. SIGCOMM Demonstr 15:17 Henderson TR, Lacage M, Riley GF, Dowell C, Kopena J (2008) Network simulations with the ns-3 simulator. SIGCOMM Demonstr 15:17
8.
go back to reference Hinrichs C, Lehnhoff S, Sonnenschein M (2013) COHDA: a combinatorial optimization heuristic for distributed agents. In: Filipe J, Fred A (eds) Agents and artificial intelligence. Springer, Berlin, pp 23–39 Hinrichs C, Lehnhoff S, Sonnenschein M (2013) COHDA: a combinatorial optimization heuristic for distributed agents. In: Filipe J, Fred A (eds) Agents and artificial intelligence. Springer, Berlin, pp 23–39
9.
go back to reference Kok JK, Warmer CJ, Kamphuis IG (2005) PowerMatcher: multiagent control in the electricity infrastructure. In: Proceedings of the fourth international joint conference on autonomous agents and multiagent systems, pp 75–82 (ACM) Kok JK, Warmer CJ, Kamphuis IG (2005) PowerMatcher: multiagent control in the electricity infrastructure. In: Proceedings of the fourth international joint conference on autonomous agents and multiagent systems, pp 75–82 (ACM)
10.
go back to reference Kok K (2013) The powermatcher: smart coordination for the smart electricity grid. TNO, The Netherlands Kok K (2013) The powermatcher: smart coordination for the smart electricity grid. TNO, The Netherlands
11.
go back to reference Li F, Luo B, Liu P (2010) Secure information aggregation for smart grids using homomorphic encryption. In: 2010 first IEEE international conference on smart grid communications (SmartGridComm), pp 327–332 Li F, Luo B, Liu P (2010) Secure information aggregation for smart grids using homomorphic encryption. In: 2010 first IEEE international conference on smart grid communications (SmartGridComm), pp 327–332
12.
go back to reference Li H, Liang X, Lu R, Lin X, Shen X (2012) EDR: an efficient demand response scheme for achieving forward secrecy in smart grid. In: 2012 IEEE global communications conference (GLOBECOM), pp 929–934 Li H, Liang X, Lu R, Lin X, Shen X (2012) EDR: an efficient demand response scheme for achieving forward secrecy in smart grid. In: 2012 IEEE global communications conference (GLOBECOM), pp 929–934
13.
go back to reference Liang X, Li X, Lu R, Lin X, Shen X (2013) UDP: usage-based dynamic pricing with privacy preservation for smart grid. IEEE Trans Smart Grid 4(1):141–150CrossRef Liang X, Li X, Lu R, Lin X, Shen X (2013) UDP: usage-based dynamic pricing with privacy preservation for smart grid. IEEE Trans Smart Grid 4(1):141–150CrossRef
14.
go back to reference Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631CrossRef Lu R, Liang X, Li X, Lin X, Shen X (2012) EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans Parallel Distrib Syst 23(9):1621–1631CrossRef
15.
go back to reference Mohsenian-Rad AH, Wong V, Jatskevich J, Schober R, Leon-Garcia A (2010) Autonomous demand-side management based on game-theoretic energy consumption scheduling for the future smart grid. IEEE Trans Smart Grid 1(3):320–331CrossRef Mohsenian-Rad AH, Wong V, Jatskevich J, Schober R, Leon-Garcia A (2010) Autonomous demand-side management based on game-theoretic energy consumption scheduling for the future smart grid. IEEE Trans Smart Grid 1(3):320–331CrossRef
17.
go back to reference Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Stern J (ed) Advances in cryptology EUROCRYPT 99. Springer, Berlin, pp 223–238 Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Stern J (ed) Advances in cryptology EUROCRYPT 99. Springer, Berlin, pp 223–238
18.
go back to reference Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetCrossRefMATH Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126MathSciNetCrossRefMATH
19.
go back to reference Verein Deutscher Ingeniuere EV (2008) VDI 4655:2008-05 reference load profiles of single-family and multi-family houses for the use of CHP systemsIn: VDE eV (ed) VDI-Gesellschaft Energie und Umwelt, DÃOEsseldorf Verein Deutscher Ingeniuere EV (2008) VDI 4655:2008-05 reference load profiles of single-family and multi-family houses for the use of CHP systemsIn: VDE eV (ed) VDI-Gesellschaft Energie und Umwelt, DÃOEsseldorf
Metadata
Title
Preserving privacy in Distributed Energy Management
Authors
Daniel Brettschneider
Daniel Hölker
Alfred Scheerhorn
Ralf Tönjes
Publication date
16-07-2016
Publisher
Springer Berlin Heidelberg
Published in
SICS Software-Intensive Cyber-Physical Systems / Issue 1-2/2017
Print ISSN: 2524-8510
Electronic ISSN: 2524-8529
DOI
https://doi.org/10.1007/s00450-016-0309-4

Other articles of this Issue 1-2/2017

SICS Software-Intensive Cyber-Physical Systems 1-2/2017 Go to the issue

Premium Partner