Skip to main content

2017 | OriginalPaper | Buchkapitel

Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data

verfasst von : Mitsuhiro Hattori, Takato Hirano, Nori Matsuda, Rina Shimizu, Ye Wang

Erschienen in: Information Security and Privacy

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Privacy-preserving data mining technologies have been studied extensively, and as a general approach, du Pin Calmon and Fawaz have proposed a data distortion mechanism based on a statistical inference attack framework. This theory has been extended by Erdogdu et al. to time-series data and been applied to energy disaggregation of smart-meter data. However, their theory assumes both smart-meter data and sensitive appliance state information are available when applying the privacy-preserving mechanism, which is impractical in typical smart-meter systems where only the total power usage is available. In this paper, we extend their approach to enable the application of a privacy-utility tradeoff mechanism to such practical applications. Firstly, we define a system model which captures both the architecture of the smart-meter system and the practical constraints that the power usage of each appliance cannot be measured individually. This enables us to formalize the tradeoff problem more rigorously. Secondly, we propose a privacy-utility tradeoff mechanism for that system. We apply a linear Gaussian model assumption to the system and thereby reduce the problem of obtaining unobservable information to that of learning the system parameters. Finally, we conduct experiments of applying the proposed mechanism to the power usage data of an actual household. The experimental results show that the proposed mechanism works partly effectively; i.e., it prevents usage analysis of certain types of sensitive appliances while at the same time preserving that of non-sensitive appliances.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
In Recital 7 of the GDPR.
 
2
Examples of distortion function include the \(L_1\) norm, \(L_2\) norm and more generally \(L_p\) norm.
 
4
Strictly speaking, the number of appliances used in the household is 18 because a refrigerator is also used. However, it was always ON throughout the data collection and therefore we regarded it as a part of the background noise.
 
Literatur
1.
Zurück zum Zitat Alcalá, J., Parson, O., Rogers, A.: Detecting anomalies in activities of daily living of elderly residents via energy disaggregation and cox processes. In: BuildSys 2015. ACM (2015) Alcalá, J., Parson, O., Rogers, A.: Detecting anomalies in activities of daily living of elderly residents via energy disaggregation and cox processes. In: BuildSys 2015. ACM (2015)
2.
Zurück zum Zitat Alcalá, J., Ureña, J., Hernández, A.: Activity supervision tool using non-intrusive load monitoring systems. In: ETFA 2015. IEEE (2015) Alcalá, J., Ureña, J., Hernández, A.: Activity supervision tool using non-intrusive load monitoring systems. In: ETFA 2015. IEEE (2015)
3.
Zurück zum Zitat Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefMATH Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefMATH
4.
Zurück zum Zitat Basciftci, Y.O., Wang, Y., Ishwar, P.: On privacy-utility tradeoffs for constrained data release mechanisms. In: ITA 2016. IEEE (2016) Basciftci, Y.O., Wang, Y., Ishwar, P.: On privacy-utility tradeoffs for constrained data release mechanisms. In: ITA 2016. IEEE (2016)
5.
Zurück zum Zitat Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)CrossRefMATH Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)CrossRefMATH
6.
Zurück zum Zitat Boyd, S., Vandenberghe, L., Grant, M.: Advances in convex optimization. In: Chinese Control Conference 2006. IEEE (2006) Boyd, S., Vandenberghe, L., Grant, M.: Advances in convex optimization. In: Chinese Control Conference 2006. IEEE (2006)
7.
Zurück zum Zitat Duhigg, C.: How companies learn your secrets. The New York Times Magazine (2012) Duhigg, C.: How companies learn your secrets. The New York Times Magazine (2012)
8.
Zurück zum Zitat Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). doi:10.1007/11787006_1 CrossRef Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). doi:10.​1007/​11787006_​1 CrossRef
10.
Zurück zum Zitat Eisenberg, B., Sullivan, R.: Why is the sum of independent normal random variables normal? Math. Mag. 81(5), 362–366 (2008)MATH Eisenberg, B., Sullivan, R.: Why is the sum of independent normal random variables normal? Math. Mag. 81(5), 362–366 (2008)MATH
11.
Zurück zum Zitat Erdogdu, M.A., Fawaz, N.: Privacy-utility trade-off under continual observation. In: ISIT 2015, pp. 1801–1805. IEEE (2015) Erdogdu, M.A., Fawaz, N.: Privacy-utility trade-off under continual observation. In: ISIT 2015, pp. 1801–1805. IEEE (2015)
12.
Zurück zum Zitat Erdogdu, M.A., Fawaz, N., Montanari, A.: Privacy-utility trade-off for time-series with application to smart-meter data. In: AAAI 2015 Workshop on Computational Sustainability (2015) Erdogdu, M.A., Fawaz, N., Montanari, A.: Privacy-utility trade-off for time-series with application to smart-meter data. In: AAAI 2015 Workshop on Computational Sustainability (2015)
13.
Zurück zum Zitat Ghahramani, Z., Jordan, M.I.: Factorial hidden Markov models. Mach. Learn. 29(2/3), 245–273 (1997)CrossRefMATH Ghahramani, Z., Jordan, M.I.: Factorial hidden Markov models. Mach. Learn. 29(2/3), 245–273 (1997)CrossRefMATH
14.
Zurück zum Zitat Guo, Z., Wang, Z.J., Kashani, A.: Home appliance load modmodel from aggregated smart meter data. IEEE Trans. Power Syst. 30(1), 254–262 (2015)CrossRef Guo, Z., Wang, Z.J., Kashani, A.: Home appliance load modmodel from aggregated smart meter data. IEEE Trans. Power Syst. 30(1), 254–262 (2015)CrossRef
15.
Zurück zum Zitat Hart, G.: Nonintrusive appliance load monitoring. Proc. IEEE 80(12), 1870–1891 (1992)CrossRef Hart, G.: Nonintrusive appliance load monitoring. Proc. IEEE 80(12), 1870–1891 (1992)CrossRef
16.
Zurück zum Zitat Kalogridis, G., Denic, S.Z.: Data mining and privacy of personal behaviour types in smart grid. In: ICDMW 2011. IEEE (2011) Kalogridis, G., Denic, S.Z.: Data mining and privacy of personal behaviour types in smart grid. In: ICDMW 2011. IEEE (2011)
17.
Zurück zum Zitat Kelly, J., Knottenbelt, W.: Neural NILM: deep neural networks applied to energy disaggregation. In: BuildSys 2015. ACM (2015) Kelly, J., Knottenbelt, W.: Neural NILM: deep neural networks applied to energy disaggregation. In: BuildSys 2015. ACM (2015)
18.
Zurück zum Zitat Kim, H., Marwah, M., Arlitt, M., Lyon, G., Han, J.: Unsupervised disaggregation of low frequency power measurements. In: SDM 2011, pp. 747–758. SIAM (2011) Kim, H., Marwah, M., Arlitt, M., Lyon, G., Han, J.: Unsupervised disaggregation of low frequency power measurements. In: SDM 2011, pp. 747–758. SIAM (2011)
19.
Zurück zum Zitat Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: ICDE 2007, pp. 106–115. IEEE (2007) Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: ICDE 2007, pp. 106–115. IEEE (2007)
20.
Zurück zum Zitat Li, S., Khisti, A., Mahajan, A.: Privacy-optimal strategies for smart metering systems with a rechargeable battery. In: ACC 2016. IEEE (2016) Li, S., Khisti, A., Mahajan, A.: Privacy-optimal strategies for smart metering systems with a rechargeable battery. In: ACC 2016. IEEE (2016)
21.
Zurück zum Zitat Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. In: 22nd International Conference on Data Engineering, ICDE 2006, p. 24. IEEE (2006). doi:10.1109/icde.2006.1 Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. In: 22nd International Conference on Data Engineering, ICDE 2006, p. 24. IEEE (2006). doi:10.​1109/​icde.​2006.​1
22.
Zurück zum Zitat Parson, O., Ghosh, S., Weal, M., Rogers, A.: Non-intrusive load monitoring using prior models of general appliance types. In: AAAI 2012, pp. 356–362 (2012) Parson, O., Ghosh, S., Weal, M., Rogers, A.: Non-intrusive load monitoring using prior models of general appliance types. In: AAAI 2012, pp. 356–362 (2012)
23.
Zurück zum Zitat Parson, O., Ghosh, S., Weal, M., Rogers, A.: An unsupervised training method for non-intrusive appliance load monitoring. Artif. Intell. 217, 1–19 (2014)CrossRefMATH Parson, O., Ghosh, S., Weal, M., Rogers, A.: An unsupervised training method for non-intrusive appliance load monitoring. Artif. Intell. 217, 1–19 (2014)CrossRefMATH
24.
Zurück zum Zitat Pillitteri, V.Y., Brewer, T.L.: Guidelines for smart grid cybersecurity. Internal Report NISTIR 7628 Revision 1, National Institute of Standards and Technology (2014) Pillitteri, V.Y., Brewer, T.L.: Guidelines for smart grid cybersecurity. Internal Report NISTIR 7628 Revision 1, National Institute of Standards and Technology (2014)
25.
Zurück zum Zitat du Pin Calmon, F., Fawaz, N.: Privacy against statistical inference. In: Allerton 2012. IEEE (2012) du Pin Calmon, F., Fawaz, N.: Privacy against statistical inference. In: Allerton 2012. IEEE (2012)
27.
Zurück zum Zitat Rajagopalan, S.R., Sankar, L., Mohajer, S., Poor, H.V.: Smart meter privacy: a utility-privacy framework. In: SmartGridComm 2011. IEEE (2011) Rajagopalan, S.R., Sankar, L., Mohajer, S., Poor, H.V.: Smart meter privacy: a utility-privacy framework. In: SmartGridComm 2011. IEEE (2011)
28.
Zurück zum Zitat Salamatian, S., Zhang, A., du Pin Calmon, F., Bhamidipati, S., Fawaz, N., Kveton, B., Oliveira, P., Taft, N.: Managing your private and public data: Bringing down inference attacks against your privacy. IEEE J. Sel. Top. Sig. Proces. 9(7), 1240–1255 (2015) Salamatian, S., Zhang, A., du Pin Calmon, F., Bhamidipati, S., Fawaz, N., Kveton, B., Oliveira, P., Taft, N.: Managing your private and public data: Bringing down inference attacks against your privacy. IEEE J. Sel. Top. Sig. Proces. 9(7), 1240–1255 (2015)
29.
Zurück zum Zitat Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)CrossRef Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)CrossRef
30.
Zurück zum Zitat Schneier, B.: Data and goliath: The hidden battles to collect your data and control your world. W. W. Norton & Company (2015) Schneier, B.: Data and goliath: The hidden battles to collect your data and control your world. W. W. Norton & Company (2015)
31.
Zurück zum Zitat Song, H., Kalogridis, G., Fan, Z.: Short paper: time-dependent power load disaggregation with applications to daily activity monitoring. In: WF-IoT 2014. IEEE (2014) Song, H., Kalogridis, G., Fan, Z.: Short paper: time-dependent power load disaggregation with applications to daily activity monitoring. In: WF-IoT 2014. IEEE (2014)
32.
Zurück zum Zitat Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)MathSciNetCrossRefMATH Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)MathSciNetCrossRefMATH
33.
Zurück zum Zitat Tan, O., Gunduz, D., Poor, H.V.: Increasing smart meter privacy through energy harvesting and storage devices. IEEE J. Sel. Areas Commun. 31(7), 1331–1341 (2013)CrossRef Tan, O., Gunduz, D., Poor, H.V.: Increasing smart meter privacy through energy harvesting and storage devices. IEEE J. Sel. Areas Commun. 31(7), 1331–1341 (2013)CrossRef
34.
Zurück zum Zitat Xiao, X., Tao, Y.: m-invariance: towards privacy preserving re-publication of dynamic datasets. In: SIGMOD 2007, pp. 689–700. ACM (2007) Xiao, X., Tao, Y.: m-invariance: towards privacy preserving re-publication of dynamic datasets. In: SIGMOD 2007, pp. 689–700. ACM (2007)
35.
Zurück zum Zitat Yang, L., Chen, X., Zhang, J., Poor, H.V.: Cost-effective and privacy-preserving energy management for smart meters. IEEE Trans. Smart Grid 6(1), 486–495 (2015)CrossRef Yang, L., Chen, X., Zhang, J., Poor, H.V.: Cost-effective and privacy-preserving energy management for smart meters. IEEE Trans. Smart Grid 6(1), 486–495 (2015)CrossRef
36.
Zurück zum Zitat Yang, W., Li, N., Qi, Y., Qardaji, W., McLaughlin, S., McDaniel, P.: Minimizing private data disclosures in the smart grid. In: ACM CCS 2012, pp. 415–427. ACM (2012) Yang, W., Li, N., Qi, Y., Qardaji, W., McLaughlin, S., McDaniel, P.: Minimizing private data disclosures in the smart grid. In: ACM CCS 2012, pp. 415–427. ACM (2012)
37.
Zurück zum Zitat Yao, J., Venkitasubramaniam, P.: The privacy analysis of battery control mechanisms in demand response: revealing state approach and rate distortion bounds. IEEE Trans. Smart Grid 6(5), 2417–2425 (2015)CrossRef Yao, J., Venkitasubramaniam, P.: The privacy analysis of battery control mechanisms in demand response: revealing state approach and rate distortion bounds. IEEE Trans. Smart Grid 6(5), 2417–2425 (2015)CrossRef
Metadaten
Titel
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data
verfasst von
Mitsuhiro Hattori
Takato Hirano
Nori Matsuda
Rina Shimizu
Ye Wang
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-59870-3_12

Premium Partner