Smart Meter Data Privacy: A Survey

Slides:



Advertisements
Similar presentations
World Class Standards Smart Grids ETSI Strategic Topic Philippe Lucas © ETSI All rights reserved ETSI Smart Grid workshop, June 14th 2010.
Advertisements

Web Services Security Requirements Stephen T. Whitlock Security Architect Boeing.
I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
UCAIug HAN SRS v2.0 Summary August 12, Scope of HAN SRS in the NIST conceptual model.
TRUST Fall Meeting November , 2010 │Stanford, California A Privacy-Aware Architecture For Demand Response Systems Steve Wicker, Bob Thomas School.
1 Programa de Engenharia Elétrica - PEE/COPPE/UFRJ Universidade Federal do Rio de Janeiro A Review of Anomalies Detection Schemes for Smart Grids Andrés.
Daisuke Mashima and Arnab Roy Fujitsu Laboratories of America, Inc. Privacy Preserving Disclosure of Authenticated Energy Usage Data.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring Hsiao-Ying Lin National Chiao Tung University Joint work with.
K.U.Leuven George Danezis 1 and Alfredo Rial 1,2 Privacy-Preserving Smart Metering 1 Microsoft Research Cambridge 2 KULeuven ESAT/SCD/COSIC – IBBT, Belgium.
Privacy-Preserving Data Aggregation in Smart Metering Systems Mi Wen Shanghai University of Electric Power 8/8/2015 Zekeriya Erkin,
Model Driven Security Framework for Definition of Security Requirements for SOA Based Applications Authors: Muhammad Qaisar Saleem, Jafreezal Jaafar, and.
Future of Smart Metering Kansas Renewable Energy & Energy Efficiency Conference September 26, 2007.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy Authors: C. Lambrinoudakis,
Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack.
Andrea Ricci - ISIS Brussels, 12 April 2012 Smart Grids: Overview of the study and main challenges 1.
© Synergetics Portfolio Security Aspecten.
Listen to Your Meters! Pradeep Murthy SunTec Business Solutions.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
JEMMA: an open platform for a connected Smart Grid Gateway GRUPPO TELECOM ITALIA MAS2TERING Smart Grid Workshop Brussels, September Strategy &
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
BY: A. Mahmood, M. N. Ullah, S. Razzaq, N. Javaid, A. Basit, U. Mustafa, M. Naeem COMSATS Institute of Information Technology, Islamabad, Pakistan.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Presentation of Capabilities contact information Kevin Monte de Ramos (888)
Intelligent Home Scenario Group Name: WG1 Source: KETI, ETRI, SK Telecom, nTels, KCA, Kaonmedia Meeting Date: dd Agenda Item: Discussion.
Privacy Issues in Smart Grid R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
OpenHAN SRS v1.95 Overview June 8, OpenHAN SRS v Introduction  OpenHAN area of focus within the NIST conceptual model.
BY: A. Mahmood, I. Khan, S. Razzaq, N. Javaid, Z. Najam, N. A. Khan, M. A. Rehman COMSATS Institute of Information Technology, Islamabad, Pakistan.
A Smart Metering Scenario Jorge Cuellar, Jan Stijohann, Santiago Suppan Siemens AG.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
Daisuke Mashima Fujitsu Laboratories of America, Inc. Sunnyvale, CA Copyright 2015 Fujitsu Laboratories of America Authenticated Down-sampling for Privacy-preserving.
Customer-centric Energy Usage Data Management for Balancing Tradeoff of Benefit and Privacy Daisuke Mashima, Ph.D. Fujitsu Laboratories of America (Sunnyvale,
Presented by Edith Ngai MPhil Term 3 Presentation
Eric Peirano BRIDGE Support Team, Technofi
Cryptography: an overview
Grid Computing Security Mechanisms: the state-of-the-art
STRIDE to a secure Smart Grid in a hybrid cloud
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Hardware Cryptographic Coprocessor
Module 8: Securing Network Traffic by Using IPSec and Certificates
World-Leading Research with Real-World Impact!
System Control based Renewable Energy Resources in Smart Grid Consumer
Survey on Security and Energy Efficiency in the Cloud Computing Environment Wei Wu.
Seraphim : A Security Architecture for Active Networks
Cyber Security and Privacy Issues in Smart Grids Presenter: Hongwei Li.
SECURITY MECHANISM & E-COMMERCE
Security in ebXML Messaging
RFID Security & Privacy at both Physical and System Levels - Presentation to IoT-GSI 26th August 2011 Robert H. Deng & Yingjiu Li School of Information.
PLUG-N-HARVEST ID: H2020-EU
2018/7/28 GridMonitoring: Secured Sovereign Blockchain based Monitoring on Smart Grid Authors: Jian-Bin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
Cryptography: an overview
2018/7/28 GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid Authors: Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah,
Group Meeting Ming Hong Tsai Date :
Module 8: Securing Network Traffic by Using IPSec and Certificates
AAA: A Survey and a Policy- Based Architecture and Framework
Pradeep Murthy SunTec Business Solutions
Online Data Collection: Ethics
An Overview of Security Issues in Sensor Network
Attribute-Based Access Control (ABAC)
ELEC-E Smart Grid Smart Meters and Security Issues
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Presentation transcript:

Smart Meter Data Privacy: A Survey Authors: Muhammad Rizwan Asghar, György Dán, Daniele Miorandi, Imrich Chlamtac Source: IEEE Communications Surveys & Tutorials, Vol. 19, pp. 2820-2835, 27 Jun 2017 Speaker: KaiFan Chien Date: 3/16/2019

Outline Introduction Smart Meter Data and Privacy Requirements of Privacy and Security Privacy Protection for Smart Meter Data under the Trusted Operator Model Service-Specific Privacy Protection Under the Non-Trusted Operator Model Conclusions

Introduction(1/2) Smart grid Smart meters Demand response Real-time Optimise the supply of electricity Primary sources of data

Introduction(2/2) Data collected by smart meters may also serve for invading consumers’ privacy. In this survey Regulatory and policy context Overview of state-of-the-art solutions Provide recommendations Billing Operations Alue-added services

Smart Meter Data and Privacy(1/4) Automated meters and smart meters Consumption of electric energy with a variable time granularity Meter Data Management System (MDMS) Receive pricing information and load control commands Exchange information with smart home appliances Intervals of 15 minutes

Smart Meter Data and Privacy(2/4) Different domains of the smart metering infrastructure Customer Communication MDMS Data

Smart Meter Data and Privacy(3/4) Billing, Operations, and Value-Added Services Billing  Not be real-time Operations  Real-time The second use of smart meter data State Estimation (SE) / Volt and Var Control (VVC) / Fault Location, Isolation and Service Restoration (FLISR) Value-Added Services  Real-time or Batch

Smart Meter Data and Privacy(4/4) Automated and smart meters collect personal data. Greveler et al. fine enough measurements could reveal consumers’ interests as well

Requirements of Privacy and Security(1/4) Privacy legislation for smart meter data EU Data are necessary Cannot be used for a different purpose NIST

Requirements of Privacy and Security(2/4) Two notions of privacy Cryptographic privacy Statistical privacy Differential privacy k -anonymity

Requirements of Privacy and Security(3/4) Requirements for privacy-preserving protocols for smart meter data management Confidentiality Integrity Authenticity Non-Repudiation Auditability

Requirements of Privacy and Security(4/4) Preserving privacy depends significantly on the attacker model Honest-but-curious, also called semi-honest Malicious attacker

Privacy Protection for Smart Meter Data under the Trusted Operator Model(1/4) Summary of the problems, existing solutions and remaining research issues under the trusted operator model

Privacy Protection for Smart Meter Data under the Trusted Operator Model(2/4) Tamper-resistance of smart meters Trusted Platform Module (TPM) Electricity theft McLaughlin, Podkuiko and McDaniel describe methods, including password extraction and storage tampering Automated meters for electricity and for gas were recently found tampered within the U.K

Privacy Protection for Smart Meter Data under the Trusted Operator Model(3/4) Data confidentiality and trust models Public Key Infrastructure (PKI) Baumeister investigated what PKI architecture would be most suitable to meet the requirements Main issue with the PKI is efficient certificate revocation By adding random noise to the data ???

Privacy Protection for Smart Meter Data under the Trusted Operator Model(4/4) Consent and Access Control Mandatory Access Control (MAC). Discretionary Access Control (DAC). Role-Based Access Control (RBAC). eXtensible Access Control Markup Language (XACML) Data Integrity and Auditing

Service-Specific Privacy Protection Under the Non-Trusted Operator Model(1/5) Summary of the issues, privacy-preserving solutions and research directions discussed

Service-Specific Privacy Protection Under the Non-Trusted Operator Model(2/5) Provides a detailed comparative analysis of privacy-preserving solutions for smart meter data Are (c)onfidentiality (i)ntegrity (AUTH)etication No(NM)alleability No(NR)epudiation (AUD)itability (ANO)onymity (SY)bil Attack Billing (BL) Operations (OP) Value-Added Services (VAS)

Service-Specific Privacy Protection Under the Non-Trusted Operator Model(3/5) Privacy-Preserving Billing Filtering With Energy Storage for Statistical Privacy The energy storage protects customers’ privacy by hiding the use of individual appliances Secure Computation for Cryptographic Privacy Jawurek et al. propose a scheme based on Pedersen commitments Non-Interactive Zero-Knowledge proof (NIZK) Anonymous credential system

Service-Specific Privacy Protection Under the Non-Trusted Operator Model(4/5) Privacy-preserving operations With a trusted third party Aggregation algorithms for cryptographic privacy Without a trusted third party Homomorphic encryption Providing Statistical Privacy Privacy Economics

Service-Specific Privacy Protection Under the Non-Trusted Operator Model(5/5) Value-Added Services Demand-response Identifying appliance level anomalies Optimise the electricity consumption of a household

Conclusions Privacy-preserving meter data delivery and management Meter data collection for the three application areas Billing Operations Alue-added services Trusted Operator Model and non-Trusted Operator Model