Privacy-Preserving Data Aggregation in Smart Metering Systems Mi Wen Shanghai University of Electric Power 8/8/2015 Zekeriya Erkin,

Slides:



Advertisements
Similar presentations
Trusted Data Sharing over Untrusted Cloud Storage Provider Gansen Zhao, Chunming Rong, Jin Li, Feng Zhang, and Yong Tang Cloud Computing Technology and.
Advertisements

I have a DREAM! (DiffeRentially privatE smArt Metering) Gergely Acs and Claude Castelluccia {gergely.acs, INRIA 2011.
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Secure Multiparty Computations on Bitcoin
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
0 © 2011 Silver Spring Networks. All rights reserved. Building the Smart Grid.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
 Introduction  Benefits of VANET  Different types of attacks and threats  Requirements and challenges  Security Architecture  Vehicular PKI.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring Hsiao-Ying Lin National Chiao Tung University Joint work with.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
1 Authenticated key agreement without using one-way hash functions Harn, L.; Lin, H.-Y. Electronics Letters, Volume: 37 Issue: 10, 10 May 2001 Presented.
1 Key Management in Mobile Ad Hoc Networks Presented by Edith Ngai Spring 2003.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
CMSC 414 Computer and Network Security Lecture 9 Jonathan Katz.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
TCP/IP Protocol Suite 1 Chapter 28 Upon completion you will be able to: Security Differentiate between two categories of cryptography schemes Understand.
3 rd SG13 Regional Workshop for Africa on “ITU-T Standardization Challenges for Developing Countries Working for a Connected Africa” (Livingstone, Zambia,
A Survey of Home Energy Management Systems in Future Smart Grid Communications By Muhammad Ishfaq Khan.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
IOT5_ GISFI # 05, June 20 – 22, 2011, Hyderabad, India 1 Privacy Requirements of User Data in Smart Grids Jaydip Sen Tata Consultancy Services Ltd.
Future of Smart Metering Kansas Renewable Energy & Energy Efficiency Conference September 26, 2007.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
SMART METERING SOLUTIONS TO SHAPE OUR ENERGY FUTURE Empowering the Customer Experience Marketing Executives Conference Cranwell Resort Lenox, Massachusetts.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
1 Privacy-Preserving Distributed Information Sharing Nan Zhang and Wei Zhao Texas A&M University, USA.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Smart Grid Security Challenges Ahmad Alqasim 1. Agenda Problem Statement Power system vs. smart grid Background Information Focus Point Privacy Attack.
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications Rongxing Lu, Xiaohui Liang, Xu Li, Xiaodong Lin, Xuemin.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
Smart Metering and the Smart Grid How does it work and what can it do? Will Chaney 1Energy Awareness Week, 3-8 May 2010.
Cryptography, Authentication and Digital Signatures
Secure two-party computation: a visual way by Paolo D’Arco and Roberto De Prisco.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
WEP Protocol Weaknesses and Vulnerabilities
1 A Randomized Space-Time Transmission Scheme for Secret-Key Agreement Xiaohua (Edward) Li 1, Mo Chen 1 and E. Paul Ratazzi 2 1 Department of Electrical.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Presented by: Sanketh Beerabbi University of Central Florida.
On the Communication Complexity of SFE with Long Output Daniel Wichs (Northeastern) joint work with Pavel Hubáček.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
P2: Privacy-Preserving Communication and Precise Reward Architecture for V2G Networks in Smart Grid P2: Privacy-Preserving Communication and Precise Reward.
Secure Communication between Set-top Box and Smart Card in DTV Broadcasting Authors: T. Jiang, Y. Hou and S. Zheng Source: IEEE Transactions on Consumer.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Outline The key findings What the SGA Summit did Smart City Amsterdam Some more detail on the disrupters – Ecosystem of the Grid – Distributed Generation.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication McCune, J.M., Perrig, A., Reiter, M.K IEEE Symposium on Security and.
Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming Hongbo Liu, Yingying Chen Department of ECE Stevens Institute.
Privacy Issues in Smart Grid R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide.
Key Management Network Systems Security Mort Anvari.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Privacy-Preserving Data Aggregation without Secure Channel: Multivariate Polynomial Evaluation Taeho Jung 1, XuFei Mao 2, Xiang-Yang Li 1, Shao-Jie Tang.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Security of the Internet of Things: perspectives and challenges
Presented by Edith Ngai MPhil Term 3 Presentation
ABYSS : An Architecture for Software Protection
System Control based Renewable Energy Resources in Smart Grid Consumer
“Location Privacy Protection for Smartphone Users”
Smart Meter Data Privacy: A Survey
Presentation transcript:

Privacy-Preserving Data Aggregation in Smart Metering Systems Mi Wen Shanghai University of Electric Power 8/8/2015 Zekeriya Erkin, Juan Ramón Troncoso-Pastoriza,R. (Inald) L. Lagendijk, and Fernando Pérez-González, Privacy-Preserving Data Aggregation in Smart Metering Systems, IEEE SIGNAL PROCESSING MAGAZINE [75] marc h 2013.

Outline 2 Trust Model and Smart Metering Architectures 2 Introduction 31 Four approaches of data aggregation 33 Challenges & Conclusion 34

It is clear that the actions of the residents can be easily tracked by analyzing the smart meter data (gas, water, and electric consumption). Security in smart metering One of the biggest advantages of smart grids compared to traditional energy grids is the ability to remotely read fine-granular measurements from each smart meter, which enables the grid operators to balance load efficiently.

Smart Metering Architectures Security in smart metering: Dutch Parliament in 2009 that rejects the deployment of smart meters due to privacy considerations. Hence, it is a “must” to enforce privacy rights without disrupting the smart grid services like billing and data aggregation. The main idea of Secure signal processing (SSP) is to prevent the untrustworthy entities, including the utility provider, from accessing the private data, while providing tools to process the smart meter measurements, e.g., for billing and data analysis. Cryptographic tools : holomorphic encryption and secure multiparty computation [19]

Smart Metering Architectures Secure billing: The utility provider receives encrypted measurements from the smart meters. Without the decryption key, the utility provider cannot access the content of the encryptions; this guarantees the privacy of the residents. To perform the usual smart grid operations such as billing, the utility provider interacts with the smart meters according to a predefined protocol [24], [17], [15]. Focus : particularly on the computation of aggregated consumption.

Stakeholders in a smart metering scenario 1,Consumers : access to the metered data 2,Smart metering devices: sense the consumed energy 3, Grid operator/supplier: load balancing 4,Communication network:be secured 5,Electricity producer: sells the electricity to customers 6,Aggregator: producing the relevant and needed figures

Smart Metering Architectures  There are two main choices of smart metering architecture: centralized and distributed.  Centralized management, sending the measurements of short periods to a central data storage that acts as a hub (aggregator head).  For small grids, like self-sufficient grids in rural areas, a distributed (or peer-to-peer) energy management is usually adopted.  the meters perform a partial data aggregation themselves (in-network aggregation).

Trust model  Inherent interdependency between trust and privacy: those entities of a smart metering system that are trusted will need no further privacy protection.  untrusted parties can be considered mainly semihonest or malicious.  Consumers suppliers/aggregator  The traditional sealed meters readable only at the customer’s home represented the mutual trust. Access legitimate Data correctness

Trust model  The adoption of smart metering reshapes the trust model depending on the choice of architecture.  Centralized management and data-collection imposes a universal trust on the grid operator(acting as aggregator).  “universal trust” leads to privacy invasion that infringes the data protection directives.  A certain level of decentralization, together with the possibility of collaborative calculations among the meters.

Outline 10 Privacy Model and Smart Metering Architectures 2 Introduction 31 Four approaches of data aggregation 33 Conclusion & Future works 34

11 Goal: solutions should not hinder the ability of the aggregator to calculate the needed GS(t) and, at the same time, avoid the possibility of fraud. Three common assumptions: 1, communication network available. a wired communication link to the utility provider is required, smart meters are also assumed to be able to communicate with each other. 2, The possession of a valid certificate per smart meter 3. the capability of performing cryptographic operations Data aggregation

12 System model: three customers: Alice, Bob, and Charles. Assume that a utility company (UC), which plays the roles of energy producer, grid, and network operator, Four approaches to aggregate Additively homomorphic encryption : pk= sk=. Drawbacks: the same key has to be used. for different smart meters, using the same key for encryption alone does not provide privacy protection.

13 1, Using Holomorphic Encryption and Secret Sharing User : splitting their measurements into random shares, one share for each person: Keeping m 1,t (1) for herself, Alice sends m 1,t (2) and m 1,t (3) to the UC after encrypting them with Bob’s and Charles’ public keys. UC: Drawbacks: it is not scalable. Four approaches to aggregate

14 Four approaches to aggregate

15 2, Using Masking and Brute Forcing (con’t) Four approaches to aggregate There are four protocols that provide different ways for a number of smart meters Diffie-Hellman key exchange based random numbers generation. After verification of the public keys, everyone computes [18] K. Kursawe, G. Danezis, and M. Kohlweiss, “Privacy-friendly aggregation for the smart-grid,” in Privacy Enhanced Technologies Symposium, Waterloo, Canada,2011, pp. 175–191.

16 3, Using Modified Homomorphic Encryption Assume that Alice, Bob, and Charles have three random numbers such that n1 +n2 +n3 =n. In such a case, Alice and the others can encrypt [8] Z. Erkin and G. Tsudik, “Private computation of spatial and temporal power consumption with smart meters,” in Proc. Int. Conf. Applied Cryptography and Network Security, Singapore, 26–29 June 2012, pp. 561–577. An aggregator, anyone in the group, can collect and form the total consumption: Drawbacks: should use the same random number r. The complexity is lower the scheme in [18].

17 4, Using Masking and Differential Privacy the encryption is defined as E pk (m, k, n) =m+k mod n, where m is the measurement, k is the encryption key, and n is a large number. [4] G. Ács and C. Castelluccia, “I have a DREAM! (Differentially PrivatE smart Metering),” in Proc. Information Hiding Conference, 18–20 May 2011, pp. 118–132. The coupling between any two smart meter is bidirectional. They generate a random number, r i,j, and add to their measurements.

18 4, Using Masking and Differential Privacy (con’t) Drawbacks: each smart meter has to share keys with the UC and exchange pseudorandom numbers with many other smart meters. Efficient.

Comparison

Challenges related to security  Malicious parties and tampering semi honest adversarial model, no forge results. unlikely real scenario.  Key management a common requirement that all the encrypted values be produced with the same key to be homomorphically “combinable”. losing authentication and possibility of forgeries. unusual key distribution, like the subkey, shared key. costly strategies like proxy-reencryption or encryption delegation.  Securing billing calculations 20 a posteriori rebates also will make customer feel uncomfortable.

Challenges related to signal processing  Complex utility functions Only summation function GS(t) is too simple. Complex functions including billing with nonlinear tariffs, to more complex statistical calculations related to profiling, load forecasting, state estimation, adaptive frequency estimation, or network modeling.  Accuracy loss There is a direct relationship [7] between the induced noise power (measurement accuracy) and the e level of differential privacy that the mechanism achieves. This tradeoff has to be carefully considered and evaluated for each utility function 21

Conclusion  This paper identifies the privacy problems in smart grids, summarize the recent research on data aggregation, and present an overview of existing research challenges for secure signal processing (SSP).  There is still room for improvement and further research in this area 22

23 Thank you !