Nothing Special   »   [go: up one dir, main page]

skip to main content
article

An efficient privacy-preserving comparison protocol in smart metering systems

Published: 01 December 2016 Publication History

Abstract

In smart grids, providing power consumption statistics to the customers and generating recommendations for managing electrical devices are considered to be effective methods that can help to reduce energy consumption. Unfortunately, providing power consumption statistics and generating recommendations rely on highly privacy-sensitive smart meter consumption data. From the past experience, we see that it is essential to find scientific solutions that enable the utility providers to provide such services for their customers without damaging customers' privacy. One effective approach relies on cryptography, where sensitive data is only given in the encrypted form to the utility provider and is processed under encryption without leaking content. The proposed solutions using this approach are very effective for privacy protection but very expensive in terms of computation and communication. In this paper, we focus on an essential operation for designing a privacy-preserving recommender system for smart grids, namely comparison, that takes two encrypted values and outputs which one is greater than the other one. We improve the state-of-the-art comparison protocol based on Homomorphic Encryption in terms of computation and communication by 56 and 25 %, respectively, by introducing algorithmic changes and data packing. As the smart meters are very limited devices, the overall improvement achieved is promising for the future deployment of such cryptographic protocols for enabling privacy enhanced services in smart grids.

References

[1]
GP Verbong, S Beemsterboer, F Sengers, Smart grids or smart users? Involving users in developing a low carbon electricity economy. Energy Policy. 52:, 117---125 (2013).
[2]
I Lampropoulos, G Vanalme, W Kling, in Proceedings of Innovative Smart Grid Technologies Conference Europe (ISGT Europe). A methodology for modeling the behavior of electricity prosumers within the smart grid (IEEE PESGothenburg, 2010), pp. 1---8.
[3]
T Jackson, Motivating Sustainable Consumption: A Review of Evidence on Consumer Behaviour and Behavioural Change: a Report to the Sustainable Development Research Network (Centre for Environmental Strategy, University of Surrey, 2005).
[4]
S Van Dam, Smart energy management for households. A+BE | Architecture and the Built Environment. 3(5), 1---334 (2013).
[5]
A Spagnolli, N Corradi, L Gamberini, E Hoggan, G Jacucci, C Katzeff, L Broms, L Jönsson, Eco-Feedback on the go: motivating energy awareness. IEEE Comput.44(5), 38---45 (2011).
[6]
PC Honebein, RF Cammarano, C Boice, Building a social roadmap for the smart grid. Electr. J.24(4), 78---85 (2011).
[7]
V Giordano, F Gangale, G Fulli, MS Jiménez, I Onyeji, A Colta, I Papaioannou, A Mengolini, C Alecu, T Ojala, et al., Smart Grid Projects in Europe: Lessons Learned and Current Developments (Publications Office of the European Union, Luxembourg, 2011).
[8]
J Liu, Y Xiao, S Li, W Liang, C Chen, Cyber security and privacy issues in smart grids. IEEE Commun. Surv. Tutor.14(4), 981---997 (2012).
[9]
P McDaniel, S McLaughlin, Security and privacy challenges in the smart grid. IEEE Sec Privacy. 7:, 75---77 (2009).
[10]
FG Marmol, C Sorge, O Ugus, GM Pérez, Do not snoop my habits: preserving privacy in the smart grid. IEEE Commun. Mag.50(5), 166---172 (2012).
[11]
K Birman, M Jelasity, R Kleinberg, E Tremel, Building a secure and privacy-preserving smart grid. ACM SIGOPS Oper. Syst. Rev.49(1), 131---136 (2015).
[12]
Z Erkin, G Tsudik, in Applied Cryptography and Network Security (ACNS 2012), Vol. 7341 of Lecture Notes in Computer Science. Private computation of spatial and temporal power consumption with smart meters (Springer, 2012), pp. 561---577.
[13]
K Kursawe, G Danezis, M Kohlweiss, in Proceedings of the 11th international conference on Privacy enhancing technologies, PETS'11. Privacy-friendly aggregation for the smart-grid (Springer-VerlagBerlin, Heidelberg, 2011), pp. 175---191. http://dl.acm.org/citation.cfm?id=2032162.2032172.
[14]
C Efthymiou, G Kalogridis, in First IEEE International Conference on Smart Grid Communications. Smart grid privacy via anonymization of smart metering data (IEEE, 2010), pp. 238---243.
[15]
I Damgard, M Geisler, M Kroigard, A correction to `efficient and secure comparison for on-line auctions'. Int. J. Appl. Cryptogr.1(4), 323---324 (2009).
[16]
T Veugen, F Blom, S de Hoogh, Z Erkin, Secure comparison protocols in the semi-honest model. IEEE J. Sel. Top. Signal Process.9(7), 1217---1228 (2015).
[17]
Z Erkin, M Franz, J Guajardo, S Katzenbeisser, I Lagendijk, T Toft, in Privacy Enhancing Technologies (PET'09), Vol. 5672 of LNCS. Privacy-preserving face recognition (Springer, 2009), pp. 235---253.
[18]
T Veugen, in IEEE Workshop on Information Forensics and Security. Improving the DGK comparison protocol (IEEE WIFSTenerife, 2012), pp. 49---54.
[19]
JR Troncoso-Pastoriza, S Katzenbeisser, MU Celik, AN Lemma, in ACM Workshop on Multimedia and Security. A secure multidimensional point inclusion protocol (ACM, 2007), pp. 109---120.
[20]
T Bianchi, A Piva, M Barni, Composite signal representation for fast and storage-efficient processing of encrypted signals. IEEE Trans. Inf. Forensics Sec.5(1), 180---187 (2010).
[21]
M Barni, T Bianchi, D Catalano, Raimondo Di M, R Donida Labati, et al., in ACM Proceedings of the 12th ACM workshop on Multimedia and security. Privacy-Preserving Fingercode Authentication, (2010), pp. 231---240.
[22]
MRT Beye, Z Erkin, RL Lagendijk, in Proc. in IEEE Workshop on Information Forensics and Security (WIFS'11). Efficient privacy preserving k-means clustering in a three-party setting, (2011), pp. 1---6.
[23]
Z Erkin, T Veugen, T Toft, RL Lagendijk, Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Trans. Inf. Forensics Sec.7(3), 1053---1066 (2012).
[24]
P Paillier, in Eurocrypt '99. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes (Springer, 1999), pp. 223---238.
[25]
I Damgård, M Geisler, M KrØigaard, in Australasian Conference on Information Security and Privacy (ACISP'07), Vol. 4586 of LNCS. Efficient and secure comparison for on-line auctions (Springer, 2007), pp. 416---430.
[26]
Cyber Security Group, SeComLib Secure Computation Library. http://cybersecurity.tudelft.nl. Accessed 2013.

Cited By

View all
  • (2024)An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison AlgorithmIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334824619(2258-2272)Online publication date: 1-Jan-2024
  • (2024)Extremely Efficient and Privacy-Preserving MAX/MIN Protocol Based on Multiparty Computation in Big DataIEEE Transactions on Consumer Electronics10.1109/TCE.2024.336045570:1(3042-3055)Online publication date: 31-Jan-2024
  • (2023)Practical Verifiable & Privacy-Preserving Double AuctionsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3600190(1-9)Online publication date: 29-Aug-2023
  • Show More Cited By
  1. An efficient privacy-preserving comparison protocol in smart metering systems

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image EURASIP Journal on Information Security
        EURASIP Journal on Information Security  Volume 2016, Issue 1
        December 2016
        333 pages
        ISSN:1687-4161
        EISSN:1687-417X
        Issue’s Table of Contents

        Publisher

        Hindawi Limited

        London, United Kingdom

        Publication History

        Published: 01 December 2016

        Author Tags

        1. Homomorphic encryption
        2. Privacy
        3. Recommender system
        4. Secure comparison
        5. Smart metering

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 14 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)An Efficient and Scalable FHE-Based PDQ Scheme: Utilizing FFT to Design a Low Multiplication Depth Large-Integer Comparison AlgorithmIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334824619(2258-2272)Online publication date: 1-Jan-2024
        • (2024)Extremely Efficient and Privacy-Preserving MAX/MIN Protocol Based on Multiparty Computation in Big DataIEEE Transactions on Consumer Electronics10.1109/TCE.2024.336045570:1(3042-3055)Online publication date: 31-Jan-2024
        • (2023)Practical Verifiable & Privacy-Preserving Double AuctionsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3600190(1-9)Online publication date: 29-Aug-2023
        • (2021)Privacy-preserving policy evaluation in multi-party access controlJournal of Computer Security10.3233/JCS-20000729:6(613-650)Online publication date: 1-Jan-2021
        • (2019)Privacy-Preserving Multi-Party Access ControlProceedings of the 18th ACM Workshop on Privacy in the Electronic Society10.1145/3338498.3358643(1-13)Online publication date: 11-Nov-2019
        • (2018)Secure Fixed-point Division for Homomorphically Encrypted OperandsProceedings of the 13th International Conference on Availability, Reliability and Security10.1145/3230833.3233272(1-10)Online publication date: 27-Aug-2018
        • (2018)Secure Equality Testing Protocols in the Two-Party SettingProceedings of the 13th International Conference on Availability, Reliability and Security10.1145/3230833.3230866(1-10)Online publication date: 27-Aug-2018

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media