Skip to main content

2023 | OriginalPaper | Buchkapitel

Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics

verfasst von : Nazim Uddin Sheikh, Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kaafar

Erschienen in: E-Business and Telecommunications

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Energy consumption data is collected the service providers and shared with various stakeholders involved in a smart grid ecosystem. The fine-grained energy consumption data is immensely useful for maintaining and operating grid services. Further, these data can be used for future consumption prediction using machine learning and statistical models and market segmentation purposes. However, sharing and releasing fine-grained energy data or releasing predictive models trained on user-specific data induce explicit violations of private information of consumers [34, 41]. Thus, the service providers may share and release aggregated statistics to protect the privacy of users aiming at mitigating the privacy risks of individual users’ consumption traces. In this chapter, we show that an attacker can recover individual users’ traces of energy consumption data by exploiting regularity and uniqueness properties of individual consumption load patterns. We propose an unsupervised attack framework to recover hourly energy consumption time-series of users without any background information. We construct the problem of assigning aggregated energy consumption meter readings to individual users as a mathematical assignment problem and solve it by the Hungarian algorithm [30, 50]. We used two real-world datasets to demonstrate an attacker’s performance in recovering private traits of users. Our results show that an attacker is capable of recovering 70% of users’ energy consumption patterns with over 90% accuracy. Finally, we proposed few defense techniques, such as differential privacy and federated machine learning that may potentially help reduce an attacker’s capability to infer users’ private information.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308–318 (2016) Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308–318 (2016)
2.
Zurück zum Zitat Abdallah, A., Shen, X.S.: A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Trans. Smart Grid 9(1), 396–405 (2016)CrossRef Abdallah, A., Shen, X.S.: A lightweight lattice-based homomorphic privacy-preserving data aggregation scheme for smart grid. IEEE Trans. Smart Grid 9(1), 396–405 (2016)CrossRef
3.
Zurück zum Zitat Barzegar, M., Shajari, M.: Attack scenario reconstruction using intrusion semantics. Expert Syst. Appl. 108, 119–133 (2018)CrossRef Barzegar, M., Shajari, M.: Attack scenario reconstruction using intrusion semantics. Expert Syst. Appl. 108, 119–133 (2018)CrossRef
5.
Zurück zum Zitat Buescher, N., Boukoros, S., Bauregger, S., Katzenbeisser, S.: Two is not enough: privacy assessment of aggregation schemes in smart metering. Proc. Privacy Enhanc. Technol. 2017(4), 198–214 (2017)CrossRef Buescher, N., Boukoros, S., Bauregger, S., Katzenbeisser, S.: Two is not enough: privacy assessment of aggregation schemes in smart metering. Proc. Privacy Enhanc. Technol. 2017(4), 198–214 (2017)CrossRef
7.
Zurück zum Zitat Chen, K., He, Z., Wang, S.X., Hu, J., Li, L., He, J.: Learning-based data analytics: moving towards transparent power grids. CSEE J. Power Energy Syst. 4(1), 67–82 (2018) Chen, K., He, Z., Wang, S.X., Hu, J., Li, L., He, J.: Learning-based data analytics: moving towards transparent power grids. CSEE J. Power Energy Syst. 4(1), 67–82 (2018)
8.
Zurück zum Zitat Dong, X., Zhou, J., Cao, Z.: Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications. Concurr. Comput. Pract. Exp. 28(4), 1145–1160 (2016)CrossRef Dong, X., Zhou, J., Cao, Z.: Efficient privacy-preserving temporal and spacial data aggregation for smart grid communications. Concurr. Comput. Pract. Exp. 28(4), 1145–1160 (2016)CrossRef
12.
Zurück zum Zitat Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)MathSciNetMATH Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)MathSciNetMATH
14.
Zurück zum Zitat Dwork, C., Smith, A., Steinke, T., Ullman, J.: Exposed! a survey of attacks on private data. Annu. Rev. Stat. Appl. 4, 61–84 (2017)CrossRef Dwork, C., Smith, A., Steinke, T., Ullman, J.: Exposed! a survey of attacks on private data. Annu. Rev. Stat. Appl. 4, 61–84 (2017)CrossRef
15.
Zurück zum Zitat Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 238–243. IEEE (2010) Efthymiou, C., Kalogridis, G.: Smart grid privacy via anonymization of smart metering data. In: 2010 First IEEE International Conference on Smart Grid Communications, pp. 238–243. IEEE (2010)
16.
Zurück zum Zitat ENA-Report. Energy networks association: smart meter aggregation assessment final report (2015) ENA-Report. Energy networks association: smart meter aggregation assessment final report (2015)
18.
Zurück zum Zitat Farokhi, F.: Review of results on smart-meter privacy by data manipulation, demand shaping, and load scheduling. IET Smart Grid (2020) Farokhi, F.: Review of results on smart-meter privacy by data manipulation, demand shaping, and load scheduling. IET Smart Grid (2020)
19.
Zurück zum Zitat Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1322–1333 (2015) Fredrikson, M., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1322–1333 (2015)
20.
Zurück zum Zitat Gong, N.Z., Liu, B.: You are who you know and how you behave: attribute inference attacks via users’ social friends and behaviors. In: 25th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 16), pp. 979–995 (2016) Gong, N.Z., Liu, B.: You are who you know and how you behave: attribute inference attacks via users’ social friends and behaviors. In: 25th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 16), pp. 979–995 (2016)
21.
Zurück zum Zitat Gong, N.Z., Liu, B.: Attribute inference attacks in online social networks. ACM Trans. Privacy Secur. (TOPS) 21(1), 1–30 (2018)CrossRef Gong, N.Z., Liu, B.: Attribute inference attacks in online social networks. ACM Trans. Privacy Secur. (TOPS) 21(1), 1–30 (2018)CrossRef
22.
Zurück zum Zitat Habtemariam, B., Miranskyy, A., Miri, A., Samet, S., Davison, M.: Privacy preserving predictive analytics with smart meters. In: 2016 IEEE International Congress on Big Data (BigData Congress), pp. 190–197. IEEE (2016) Habtemariam, B., Miranskyy, A., Miri, A., Samet, S., Davison, M.: Privacy preserving predictive analytics with smart meters. In: 2016 IEEE International Congress on Big Data (BigData Congress), pp. 190–197. IEEE (2016)
24.
Zurück zum Zitat Hong, Y., Liu, W.M., Wang, L.: Privacy preserving smart meter streaming against information leakage of appliance status. IEEE Trans. Inf. Forensics Secur. 12(9), 2227–2241 (2017) Hong, Y., Liu, W.M., Wang, L.: Privacy preserving smart meter streaming against information leakage of appliance status. IEEE Trans. Inf. Forensics Secur. 12(9), 2227–2241 (2017)
25.
Zurück zum Zitat Hossain, Md.N., et al.: \(\{\)SLEUTH\(\}\): real-time attack scenario reconstruction from \(\{\)COTS\(\}\) audit data. In: 26th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 17), pp. 487–504 (2017) Hossain, Md.N., et al.: \(\{\)SLEUTH\(\}\): real-time attack scenario reconstruction from \(\{\)COTS\(\}\) audit data. In: 26th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 17), pp. 487–504 (2017)
26.
Zurück zum Zitat Jayaraman, B., Evans, D.: Evaluating differentially private machine learning in practice. In: 28th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 19), pp. 1895–1912 (2019) Jayaraman, B., Evans, D.: Evaluating differentially private machine learning in practice. In: 28th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 19), pp. 1895–1912 (2019)
27.
Zurück zum Zitat Jia, J., Gong, N.Z.: Attriguard: a practical defense against attribute inference attacks via adversarial machine learning. In: 27th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 18), pp. 513–529 (2018) Jia, J., Gong, N.Z.: Attriguard: a practical defense against attribute inference attacks via adversarial machine learning. In: 27th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 18), pp. 513–529 (2018)
28.
Zurück zum Zitat Kelly, J., Knottenbelt, W.: Neural NILM: deep neural networks applied to energy disaggregation. In: Proceedings of the 2nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments, pp. 55–64 (2015) Kelly, J., Knottenbelt, W.: Neural NILM: deep neural networks applied to energy disaggregation. In: Proceedings of the 2nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments, pp. 55–64 (2015)
29.
Zurück zum Zitat Knirsch, F., Eibl, G., Engel, D.: Error-resilient masking approaches for privacy preserving data aggregation. IEEE Trans. Smart Grid 9(4), 3351–3361 (2016)CrossRef Knirsch, F., Eibl, G., Engel, D.: Error-resilient masking approaches for privacy preserving data aggregation. IEEE Trans. Smart Grid 9(4), 3351–3361 (2016)CrossRef
30.
Zurück zum Zitat Kuhn, H.W.: The Hungarian method for the assignment problem. Naval Res. Logist. Q. 2(1–2), 83–97 (1955) Kuhn, H.W.: The Hungarian method for the assignment problem. Naval Res. Logist. Q. 2(1–2), 83–97 (1955)
31.
Zurück zum Zitat Lee, Y.-T., Hsiao, W.-H., Lin, Y.-S., Chou, S.-C.T.: Privacy-preserving data analytics in cloud-based smart home with community hierarchy. IEEE Trans. Consum. Electron. 63(2), 200–207 (2017) Lee, Y.-T., Hsiao, W.-H., Lin, Y.-S., Chou, S.-C.T.: Privacy-preserving data analytics in cloud-based smart home with community hierarchy. IEEE Trans. Consum. Electron. 63(2), 200–207 (2017)
32.
Zurück zum Zitat Liu, Y., Guo, W., Fan, C.-I., Chang, L., Cheng, C.: A practical privacy-preserving data aggregation (3pda) scheme for smart grid. IEEE Trans. Industr. Inf. 15(3), 1767–1774 (2018)CrossRef Liu, Y., Guo, W., Fan, C.-I., Chang, L., Cheng, C.: A practical privacy-preserving data aggregation (3pda) scheme for smart grid. IEEE Trans. Industr. Inf. 15(3), 1767–1774 (2018)CrossRef
33.
Zurück zum Zitat Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., Ni, W.: Privysharing: a blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Comput. Secur. 88, 101653 (2020)CrossRef Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., Ni, W.: Privysharing: a blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Comput. Secur. 88, 101653 (2020)CrossRef
34.
Zurück zum Zitat Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of the 2nd ACM workshop on Embedded Sensing Systems for Energy-Efficiency in Building, pp. 61–66. ACM (2010) Molina-Markham, A., Shenoy, P., Fu, K., Cecchet, E., Irwin, D.: Private memoirs of a smart meter. In: Proceedings of the 2nd ACM workshop on Embedded Sensing Systems for Energy-Efficiency in Building, pp. 61–66. ACM (2010)
35.
Zurück zum Zitat Palanisamy, B., Li, C., Krishnamurthy, P.: Group differential privacy-preserving disclosure of multi-level association graphs. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2587–2588. IEEE (2017) Palanisamy, B., Li, C., Krishnamurthy, P.: Group differential privacy-preserving disclosure of multi-level association graphs. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2587–2588. IEEE (2017)
36.
Zurück zum Zitat Reinhardt, A., Egarter, D., Konstantinou, G., Christin, D.: Worried about privacy? Let your PV converter cover your electricity consumption fingerprints. In: 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 25–30. IEEE (2015) Reinhardt, A., Egarter, D., Konstantinou, G., Christin, D.: Worried about privacy? Let your PV converter cover your electricity consumption fingerprints. In: 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 25–30. IEEE (2015)
37.
Zurück zum Zitat Salem, A., Bhattacharya, A., Backes, M., Fritz, M., Zhang, Y.: Updates-leak: data set inference and reconstruction attacks in online learning. In: 29th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 20), pp. 1291–1308 (2020) Salem, A., Bhattacharya, A., Backes, M., Fritz, M., Zhang, Y.: Updates-leak: data set inference and reconstruction attacks in online learning. In: 29th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 20), pp. 1291–1308 (2020)
38.
Zurück zum Zitat Sankar, L., Rajagopalan, S.R., Mohajer, S., Poor, H.V.: Smart meter privacy: a theoretical framework. IEEE Trans. Smart Grid 4(2), 837–846 (2012) Sankar, L., Rajagopalan, S.R., Mohajer, S., Poor, H.V.: Smart meter privacy: a theoretical framework. IEEE Trans. Smart Grid 4(2), 837–846 (2012)
39.
Zurück zum Zitat Shateri, M., Messina, F., Piantanida, P., Labeau, F.: Deep directed information-based learning for privacy-preserving smart meter data release. In: 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1–7. IEEE (2019) Shateri, M., Messina, F., Piantanida, P., Labeau, F.: Deep directed information-based learning for privacy-preserving smart meter data release. In: 2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm), pp. 1–7. IEEE (2019)
40.
Zurück zum Zitat Sheikh, N., Lu, Z., Asghar, H., Kaafar, M.: Trace recovery: inferring fine-grained trace of energy data from aggregates. In: Proceedings of the 18th International Conference on Security and Cryptography - Volume 1: SECRYPT, pp. 283–294. INSTICC, SciTePress (2021) Sheikh, N., Lu, Z., Asghar, H., Kaafar, M.: Trace recovery: inferring fine-grained trace of energy data from aggregates. In: Proceedings of the 18th International Conference on Security and Cryptography - Volume 1: SECRYPT, pp. 283–294. INSTICC, SciTePress (2021)
41.
Zurück zum Zitat Sheikh, N.U., Asghar, H.J., Farokhi, F., Kaafar, M.A.: Do auto-regressive models protect privacy inferring fine-grained energy consumption from aggregated model parameters. IEEE Trans. Serv. Comput. (2021) Sheikh, N.U., Asghar, H.J., Farokhi, F., Kaafar, M.A.: Do auto-regressive models protect privacy inferring fine-grained energy consumption from aggregated model parameters. IEEE Trans. Serv. Comput. (2021)
42.
Zurück zum Zitat Sirojan, T., Lu, S., Phung, B.T., Ambikairajah, E.: Embedded edge computing for real-time smart meter data analytics. In: 2019 International Conference on Smart Energy Systems and Technologies (SEST), pp. 1–5. IEEE (2019) Sirojan, T., Lu, S., Phung, B.T., Ambikairajah, E.: Embedded edge computing for real-time smart meter data analytics. In: 2019 International Conference on Smart Energy Systems and Technologies (SEST), pp. 1–5. IEEE (2019)
43.
Zurück zum Zitat Vahedi, E., Bayat, M., Pakravan, M.R., Aref, M.R.: A secure ECC-based privacy preserving data aggregation scheme for smart grids. Comput. Netw. 129, 28–36 (2017) Vahedi, E., Bayat, M., Pakravan, M.R., Aref, M.R.: A secure ECC-based privacy preserving data aggregation scheme for smart grids. Comput. Netw. 129, 28–36 (2017)
44.
Zurück zum Zitat Veale, M., Binns, R., Edwards, L.: Algorithms that remember: model inversion attacks and data protection law. Philos. Trans. Roy. Soc. A Math. Phys. Eng. Sci. 376(2133), 20180083 (2018)CrossRef Veale, M., Binns, R., Edwards, L.: Algorithms that remember: model inversion attacks and data protection law. Philos. Trans. Roy. Soc. A Math. Phys. Eng. Sci. 376(2133), 20180083 (2018)CrossRef
45.
Zurück zum Zitat Wang, H., Wen, X., Xu, Y., Zhou, B., Peng, J.-C., Liu, W.: Operating state reconstruction in cyber physical smart grid for automatic attack filtering. IEEE Trans. Ind. Inform. (2020) Wang, H., Wen, X., Xu, Y., Zhou, B., Peng, J.-C., Liu, W.: Operating state reconstruction in cyber physical smart grid for automatic attack filtering. IEEE Trans. Ind. Inform. (2020)
46.
Zurück zum Zitat Wang, Y., Chen, Q., Hong, T., Kang, C.: Review of smart meter data analytics: applications, methodologies, and challenges. IEEE Trans. Smart Grid 10(3), 3125–3148 (2018)CrossRef Wang, Y., Chen, Q., Hong, T., Kang, C.: Review of smart meter data analytics: applications, methodologies, and challenges. IEEE Trans. Smart Grid 10(3), 3125–3148 (2018)CrossRef
47.
Zurück zum Zitat Wei, K., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454–3469 (2020)CrossRef Wei, K., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454–3469 (2020)CrossRef
48.
Zurück zum Zitat Wen, M., Rongxing, L., Zhang, K., Lei, J., Liang, X., Shen, X.: Parq: a privacy-preserving range query scheme over encrypted metering data for smart grid. IEEE Trans. Emerg. Top. Comput. 1(1), 178–191 (2013)CrossRef Wen, M., Rongxing, L., Zhang, K., Lei, J., Liang, X., Shen, X.: Parq: a privacy-preserving range query scheme over encrypted metering data for smart grid. IEEE Trans. Emerg. Top. Comput. 1(1), 178–191 (2013)CrossRef
49.
Zurück zum Zitat Chang, X., et al.: Aggregate in my way: privacy-preserving data aggregation without trusted authority in ICN. Futur. Gener. Comput. Syst. 111, 107–116 (2020)CrossRef Chang, X., et al.: Aggregate in my way: privacy-preserving data aggregation without trusted authority in ICN. Futur. Gener. Comput. Syst. 111, 107–116 (2020)CrossRef
50.
Zurück zum Zitat Xu, F., Tu, Z., Li, Y., Zhang, P., Fu, X., Jin, D.: Trajectory recovery from ash: user privacy is not preserved in aggregated mobility data. In: Proceedings of the 26th International Conference on World Wide Web, pp. 1241–1250 (2017) Xu, F., Tu, Z., Li, Y., Zhang, P., Fu, X., Jin, D.: Trajectory recovery from ash: user privacy is not preserved in aggregated mobility data. In: Proceedings of the 26th International Conference on World Wide Web, pp. 1241–1250 (2017)
51.
Zurück zum Zitat Yang, L., Chen, X., Zhang, J., Poor, H.V.: Cost-effective and privacy-preserving energy management for smart meters. IEEE Trans. Smart Grid 6(1), 486–495 (2014) Yang, L., Chen, X., Zhang, J., Poor, H.V.: Cost-effective and privacy-preserving energy management for smart meters. IEEE Trans. Smart Grid 6(1), 486–495 (2014)
52.
Zurück zum Zitat Zhang, J., Chen, X., Ng, W.W.Y., Lai, C.S., Lai, L.L.: New appliance detection for nonintrusive load monitoring. IEEE Trans. Ind. Inform. 15(8), 4819–4829 (2019) Zhang, J., Chen, X., Ng, W.W.Y., Lai, C.S., Lai, L.L.: New appliance detection for nonintrusive load monitoring. IEEE Trans. Ind. Inform. 15(8), 4819–4829 (2019)
Metadaten
Titel
Trace Recovery: Attacking and Defending the User Privacy in Smart Meter Data Analytics
verfasst von
Nazim Uddin Sheikh
Zhigang Lu
Hassan Jameel Asghar
Mohamed Ali Kaafar
Copyright-Jahr
2023
DOI
https://doi.org/10.1007/978-3-031-36840-0_14

Premium Partner