Universally utility-maximizing privacy mechanisms
Proceedings of the forty-first annual ACM symposium on Theory of computing
Inferring Personal Information from Demand-Response Systems
IEEE Security and Privacy
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Differentially private aggregation of distributed time-series with transformation and encryption
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Communications of the ACM
Private memoirs of a smart meter
Proceedings of the 2nd ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Building
Privacy-friendly aggregation for the smart-grid
PETS'11 Proceedings of the 11th international conference on Privacy enhancing technologies
Privacy-friendly energy-metering via homomorphic encryption
STM'10 Proceedings of the 6th international conference on Security and trust management
Smart metering de-pseudonymization
Proceedings of the 27th Annual Computer Security Applications Conference
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
A Novel Method to Construct Taxonomy Electrical Appliances Based on Load Signaturesof
IEEE Transactions on Consumer Electronics
Smart meter aggregation via secret-sharing
Proceedings of the first ACM workshop on Smart energy grid security
Hi-index | 0.00 |
Real-time statistics on smart meter consumption data must preserve consumer privacy and tolerate smart meter failures. Existing protocols for this private distributed aggregation model suffer from various drawbacks that disqualify them for application in the smart energy grid. Either they are not fault-tolerant or if they are, then they require bi-directional communication or their accuracy decreases with an increasing number of failures. In this paper, we provide a protocol that fixes these problems and furthermore, supports a wider range of exchangeable statistical functions and requires no group key management. A key-managing authority ensures the secure evaluation of authorized functions on fresh data items using logical time and a custom zero-knowledge proof providing differential privacy for an unbounded number of statistics calculations. Our privacy-preserving protocol provides all the properties that make it suitable for use in the smart energy grid.