Smart Meter Privacy by sankar, Rajgopalan, Mohajer, Vincent CSE 898AB Privacy Enhancing Technologies Dr. Murtaza Jadliwala Presented by Viswa Chaitanya.

Slides:



Advertisements
Similar presentations
Management and Control of Domestic Smart Grid Technology IEEE Transactions on Smart Grid, Sep Albert Molderink, Vincent Bakker Yong Zhou
Advertisements

Aggregating local image descriptors into compact codes
Sampling and Pulse Code Modulation
Onur G. Guleryuz & Ulas C.Kozat DoCoMo USA Labs, San Jose, CA 95110
June 4, 2015 On the Capacity of a Class of Cognitive Radios Sriram Sridharan in collaboration with Dr. Sriram Vishwanath Wireless Networking and Communications.
EE360 – Lecture 3 Outline Announcements: Classroom Gesb131 is available, move on Monday? Broadcast Channels with ISI DFT Decomposition Optimal Power and.
Fundamental limits in Information Theory Chapter 10 :
A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 3, MAY.
Matched Filters By: Andy Wang.
Xinqiao LiuRate constrained conditional replenishment1 Rate-Constrained Conditional Replenishment with Adaptive Change Detection Xinqiao Liu December 8,
Review of Probability.
Entropy and some applications in image processing Neucimar J. Leite Institute of Computing
Formatting and Baseband Modulation
Isolated-Word Speech Recognition Using Hidden Markov Models
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
Mathematical Preliminaries. 37 Matrix Theory Vectors nth element of vector u : u(n) Matrix mth row and nth column of A : a(m,n) column vector.
Course Review for Final ECE460 Spring, Common Fourier Transform Pairs 2.
EE 6332, Spring, 2014 Wireless Communication Zhu Han Department of Electrical and Computer Engineering Class 11 Feb. 19 th, 2014.
Additive Data Perturbation: the Basic Problem and Techniques.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: ML and Simple Regression Bias of the ML Estimate Variance of the ML Estimate.
Superposition encoding A distorted version of is is encoded into the inner codebook Receiver 2 decodes using received signal and its side information Decoding.
CHAPTER 5 SIGNAL SPACE ANALYSIS
University of Houston Cullen College of Engineering Electrical & Computer Engineering Capacity Scaling in MIMO Wireless System Under Correlated Fading.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
A Flexible New Technique for Camera Calibration Zhengyou Zhang Sung Huh CSPS 643 Individual Presentation 1 February 25,
1  The Problem: Consider a two class task with ω 1, ω 2   LINEAR CLASSIFIERS.
MaskIt: Privately Releasing User Context Streams for Personalized Mobile Applications SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference.
1  Problem: Consider a two class task with ω 1, ω 2   LINEAR CLASSIFIERS.
1 Source Coding and Compression Dr.-Ing. Khaled Shawky Hassan Room: C3-222, ext: 1204, Lecture 10 Rate-Distortion.
Doc.: IEEE /1398r0 Submission November 2014 Slide 1 Shiwen He, Haiming Wang Preamble Sequence for IEEE aj (45GHz) Authors/contributors:
Spectrum Sensing In Cognitive Radio Networks
1 EE571 PART 3 Random Processes Huseyin Bilgekul Eeng571 Probability and astochastic Processes Department of Electrical and Electronic Engineering Eastern.
Week Aug-24 – Aug-29 Introduction to Spatial Computing CSE 5ISC Some slides adapted from the book Computing with Spatial Trajectories, Yu Zheng and Xiaofang.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Random Processes Gaussian and Gauss-Markov processes Power spectrum of random processes and white processes.
Rate Distortion Theory. Introduction The description of an arbitrary real number requires an infinite number of bits, so a finite representation of a.
Chance Constrained Robust Energy Efficiency in Cognitive Radio Networks with Channel Uncertainty Yongjun Xu and Xiaohui Zhao College of Communication Engineering,
Definition of the Hidden Markov Model A Seminar Speech Recognition presentation A Seminar Speech Recognition presentation October 24 th 2002 Pieter Bas.
Optimization-based Cross-Layer Design in Networked Control Systems Jia Bai, Emeka P. Eyisi Yuan Xue and Xenofon D. Koutsoukos.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
Biointelligence Laboratory, Seoul National University
Stochastic Process - Introduction
Speech Enhancement Summer 2009
Compressive Coded Aperture Video Reconstruction
LINEAR CLASSIFIERS The Problem: Consider a two class task with ω1, ω2.
Hidden Markov Models.
Computing and Compressive Sensing in Wireless Sensor Networks
Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband.
Orthogonal Subspace Projection - Matched Filter
System Control based Renewable Energy Resources in Smart Grid Consumer
CH 8. Image Compression 8.1 Fundamental 8.2 Image compression models
2018/9/16 Distributed Source Coding Using Syndromes (DISCUS): Design and Construction S.Sandeep Pradhan, Kannan Ramchandran IEEE Transactions on Information.
Scalar Quantization – Mathematical Model
Random Noise in Seismic Data: Types, Origins, Estimation, and Removal
Propagating Uncertainty In POMDP Value Iteration with Gaussian Process
Presenter: Xudong Zhu Authors: Xudong Zhu, etc.
Preamble Sequence for aj(45GHz)
STOCHASTIC HYDROLOGY Random Processes
Bayesian Nonparametric Matrix Factorization for Recorded Music
Foundation of Video Coding Part II: Scalar and Vector Quantization
CONTEXT DEPENDENT CLASSIFICATION
EE513 Audio Signals and Systems
Spread Spectrum Watermarking
NONLINEAR AND ADAPTIVE SIGNAL ESTIMATION
Information Theoretical Analysis of Digital Watermarking
Test Data Compression for Scan-Based Testing
NONLINEAR AND ADAPTIVE SIGNAL ESTIMATION
NON-NEGATIVE COMPONENT PARTS OF SOUND FOR CLASSIFICATION Yong-Choon Cho, Seungjin Choi, Sung-Yang Bang Wen-Yi Chu Department of Computer Science &
Link Performance Models for System Level Simulations in LC
Presentation transcript:

Smart Meter Privacy by sankar, Rajgopalan, Mohajer, Vincent CSE 898AB Privacy Enhancing Technologies Dr. Murtaza Jadliwala Presented by Viswa Chaitanya Kanakam

 Definition  Recent news on Smart Meter  Previous Work  Proposed Work  Related Work  Author's Contribution  Notations  Model  Utility and Privacy Metric  Privacy Preserving Mapping  Utility-Privacy Trade-off  Privacy Preserving Spectral water filling  Illustrations  Conclusion  Remark  Future Work Presentation Outline

Smart Grid Smart Meter Load Signature Libraries :- Unique consumption pattern intrinsic to each individual electrical appliance. Definitions

 2012 FBI warns smart meter Hacking may cost Utility companies $400 Million a year.  US power grid being hit with increasing Hacking Attacks as Smart Meter Deployment continues  Stuxnet-style attack on US smart grid could cost government $1 trillion Recent news about Smart Meter

 Attack is considered to be the possibility of inferring appliance usage from load data with the help of load signature libraries.  Solution :- Energy Storage Devices  Flaws :-  Is detection of usage pattern the only loss  what extent proposed solution withstand  Only assurance but no guarantees Previous Work

 Goal :- To provide a framework to accommodate both Privacy and Utility  Work:- To decouple the collected data from the personal actions of consumer.  Model :- A formal framework is designed for smart meter time-series data and metrics for utility and privacy of data. A hidden Markov model is proposed on that describing states of appliances which is in turn modelled as real valued correlated Gaussian random Variables Proposed Work

 Trusted escrow Service  Neighbourhood-level aggregation  Differential Privacy over aggregate queries  NILL to mask NALM Related Work

 Notations:-  H k,j – Random Variables.  h k,j – Random Variable realizations (observed values).  X n – n-length vector.  X – Matrix (I - Identity matrix).  N(µ n, ∑) – n variable real Gaussian distribution with mean µ n and covariance ∑.  (x) + -- max(x,0)  I(.;.) – Mutual Information  h(.) – Differential Entropy Author's Work

 M be the total number of appliances in the residency  Each device has two states (On/Off), so 2 M state appliance are possible at a time instant.  S(K) = { 0,1, ….., 2 M-1 } is state variable at k th time instant  X(k) is the meter measurement variable at k th time instant. Model

A Hidden Markov Model(HMM) is observed between the state and measurement X k-1 – S(k) – X(k) forms a Markov chain S(k) – S(k-1) – S k-1 forms a Markov chain HMM is characterized by the following parameters  Initial state distribution  State transition matrix  Conditional distribution

Observations of HMM in this model reveal that:- State S remains unchanged for a continuous period of time In that time, each appliance that is in ON state generates a sequence of random measurement characteristic of appliance Author assumes that when an appliance is in the ONstate, its power consumption pattern is approximately Gaussian.

State S can have both continuous and intermittent appliance S = (S i, S c ) G n c (S c ) and G n i (S i ) denote the length n Gaussian distributed time sequence for states S c and S i respectively which are independent of each other. Length n is chosen such that the memory effects of each state are contained within the sequence.

Measurements in Vector Notation as:- X n (S)= G n c (S c ) + G n i (S i )+ Z n Z n is a Gaussian noise vector The covariance matrix R x of X n (S) is a Toeplitz matrix with autocorrelation entries. {E} n j,k=1 = [R x (|j-k| mod n)] j,k=1 n which is non zero for all k<=m<n This circular n-block correlated sequence is decomposed into n independent Gaussian measurements subject to same distortion and leakage constraints using Discrete Fourier Transform (T is a DFT matrix)

 Data is captured as a sequence of n load measurements and compressed to transmit over finite channel  Compressed data should be perturbed in such a way it still holds desired level of fidelity  Utility metric proposed is an average distance distortion function between original and perturbed data.  Privacy metric measures the difficulty of inferring private information leaked by the appliance state via meter measurements  The privacy loss is quantified as a result of revealing perturbed data via the mutual information between the two data sequences Utility and Privacy Metrics

 Hard to transmit the measured data over the limited bandwidth hence mapping is done into a quantized sequence  Privacy-preserving mapping also needs to ensure that a minimal amount of information can be inferred about the personal habits of consumer.  Encoding :- F E : x n (s) → M = {1,2, ….., 2 n,R }  Decoding :- F D : M → x^ n  Distortion Leakage Privacy Preserving Mapping

 Utility-privacy trade-off region T is set of all pairs (D,L) to which a coding scheme satisfying the distortion and leakage functions.  The classical rate-distortion theory, constraint is on the number M of encoded sequences such that the rate I bits per entry of the sequence is bounded as M ≤ 2 n(R+€).  The aim then is to determine the infimum R(D) of all rates that are achievable for a desired distortion D.  Minimize the number of correlated sequence leaked from the revealed sequence X ^n  This paper focus on leakage constraint and not the rate constraint due to tractability Utility-Privacy Trade-off Region

If an additional constraint on minimizing the encoding rate is included, the minimal achievable rate for a desired distortion is The revealed measurements leak information about the appliance state which in turn can lead to a significant set of inferences, model focus directly on problem of minimizing the leakage of specific states via the revealed data.

 Suppressing specific appliance signatures requires detection of the appliance states in the meter by using an external algorithm.  Intermittent signals are the once that can be the source for revealing personal data, thus aim is to minimize the leakage. Privacy Preserving Spectral Water- filling

The first term in min function is for the non-negative leakage and the second term is a result of optimization, is lagrangian variable satisfying distortion constraint, it Is viewed as a waterlevel such that only that portion of the spectrum is revealed which is strictly above than this. The minimal Leakage is given as

Where

Illustrations  It models the continues and intermittent appliance load sequences in Gauss-Markov processes with an auto-correlation function given by The power spectral density of this process is

 The framework proposed allows to quantify the utility –privacy trade-off in smart meter.  This model captures dynamic nature of appliance states and smooth continual nature of the measurements via a hidden markov model and Gaussian measures.  The distortion acts as a filter in suppressing the intermittent appliance signal i.e. signals which are less than certain threshold Conclusion

 This model focus on only data loss through intermittent appliance signals but did not provide the data loss through power consumption variability by non-intermittent appliances Remark

 Applying the model on measured data to validate whether filter eliminates signatures of intermittent devices to desired degree,  Apply and demonstrate the power of these concepts in a practical context  Develop a appliance-agnostic privacy-guarantees based on detecting changes in energy patterns that are characteristic of personal habits Future Work

Questions ?

Thank You