On Privacy in Smart Metering Systems with Periodically Time-Varying - - PowerPoint PPT Presentation

on privacy in smart metering systems with periodically
SMART_READER_LITE
LIVE PREVIEW

On Privacy in Smart Metering Systems with Periodically Time-Varying - - PowerPoint PPT Presentation

On Privacy in Smart Metering Systems with Periodically Time-Varying Input Distribution Yu Liu a , Ashish Khisti a , Aditya Mahajan b GlobalSIP Symposium on Privacy and Security 14 Nov, 2017 a University of Toronto b McGill University Smart-meter


slide-1
SLIDE 1

On Privacy in Smart Metering Systems with Periodically Time-Varying Input Distribution

Yu Liua, Ashish Khistia, Aditya Mahajanb

a University of Toronto b McGill University

GlobalSIP Symposium on Privacy and Security 14 Nov, 2017

slide-2
SLIDE 2

Smart-meter privacy–(Liu, Khisti, and Mahajan)

1

Smart Meters empower smart grids

Fine grained consumption measurements are needed for: Time-of-use pricing Demand response . . .

slide-3
SLIDE 3

Smart-meter privacy–(Liu, Khisti, and Mahajan)

1

Smart Meters empower smart grids

Fine grained consumption measurements are needed for: Time-of-use pricing Demand response . . .

slide-4
SLIDE 4

Smart-meter privacy–(Liu, Khisti, and Mahajan)

1

Smart Meters empower smart grids

Fine grained consumption measurements are needed for: Time-of-use pricing Demand response . . .

slide-5
SLIDE 5

Smart-meter privacy–(Liu, Khisti, and Mahajan)

1

Smart Meters empower smart grids

Fine grained consumption measurements are needed for: Time-of-use pricing Demand response . . .

slide-6
SLIDE 6

What is the minimum information leakage rate if consumers obfuscate consumption using a rechargeable battery? What are privacy-optimal battery charging strategies?

slide-7
SLIDE 7

Smart-meter privacy–(Liu, Khisti, and Mahajan)

2

Home Applicances Power Grid Smart Meter Controller Demand: Xt Consumption: Yt

slide-8
SLIDE 8

Smart-meter privacy–(Liu, Khisti, and Mahajan)

2

Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Demand: Xt Consumption: Yt

slide-9
SLIDE 9

Smart-meter privacy–(Liu, Khisti, and Mahajan)

2

Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Battery ( State St) Yt − Xt Demand: Xt Consumption: Yt

slide-10
SLIDE 10

Smart-meter privacy–(Liu, Khisti, and Mahajan)

2

Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Battery ( State St) Yt − Xt Demand: Xt Consumption: Yt

Energy conservation

St+1 = St + Yt − Xt, St ∈ 𝒯 (Size of battery)

slide-11
SLIDE 11

Smart-meter privacy–(Liu, Khisti, and Mahajan)

2

Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Battery ( State St) Yt − Xt Demand: Xt Consumption: Yt

Energy conservation

St+1 = St + Yt − Xt, St ∈ 𝒯 (Size of battery)

Randomized charging strategy

qt(yt | xt, st, yt−1): Choose consumption given history . . .

slide-12
SLIDE 12

Smart-meter privacy–(Liu, Khisti, and Mahajan)

2

Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Battery ( State St) Yt − Xt Demand: Xt Consumption: Yt

Energy conservation

St+1 = St + Yt − Xt, St ∈ 𝒯 (Size of battery)

Randomized charging strategy

qt(yt | xt, st, yt−1): Choose consumption given history . . .

Objective

Choose battery charging strategy 𝐫 = {qt}t≥1 to min lim

T→∞

1 T I

𝐫(XT; YT)

(mutual information rate)

slide-13
SLIDE 13

Smart-meter privacy–(Liu, Khisti, and Mahajan)

3

Why is the problem non-trivial?

𝒴 = 𝒵 = 𝒯 = {0, 1}, PX = [0.5, 0.5] (Binary model) Consv: St + Yt − Xt ∈ 𝒯

slide-14
SLIDE 14

Smart-meter privacy–(Liu, Khisti, and Mahajan)

3

Why is the problem non-trivial?

𝒴 = 𝒵 = 𝒯 = {0, 1}, PX = [0.5, 0.5] (Binary model) Consv: St + Yt − Xt ∈ 𝒯

Empty state St = 0

Xt = 0 ⟹ Yt ∈ {0, 1} Xt = 1 ⟹ Yt = 1

Full state St = 1

Xt = 0 ⟹ Yt = 0 Xt = 1 ⟹ Yt ∈ {0, 1}

slide-15
SLIDE 15

Smart-meter privacy–(Liu, Khisti, and Mahajan)

3

Why is the problem non-trivial?

𝒴 = 𝒵 = 𝒯 = {0, 1}, PX = [0.5, 0.5] (Binary model) Consv: St + Yt − Xt ∈ 𝒯

Empty state St = 0

Xt = 0 ⟹ Yt ∈ {0, 1} Xt = 1 ⟹ Yt = 1

Full state St = 1

Xt = 0 ⟹ Yt = 0 Xt = 1 ⟹ Yt ∈ {0, 1} Consider performance of memoryless policies

slide-16
SLIDE 16

Smart-meter privacy–(Liu, Khisti, and Mahajan)

3

Why is the problem non-trivial?

𝒴 = 𝒵 = 𝒯 = {0, 1}, PX = [0.5, 0.5] (Binary model) Consv: St + Yt − Xt ∈ 𝒯

Empty state St = 0

Xt = 0 ⟹ Yt ∈ {0, 1} Xt = 1 ⟹ Yt = 1

Full state St = 1

Xt = 0 ⟹ Yt = 0 Xt = 1 ⟹ Yt ∈ {0, 1} Consider performance of memoryless policies

Deterministic Memoryless Policy

P(Y|X = 0, S = 0) = [1 0]; P(Y|X = 1, S = 1) = [0 1]: Leakage = 1 (∵ Yt = Xt). P(Y|X = 0, S = 0) = [0 1]; P(Y|X = 1, S = 1) = [1 0]: Leakage ≈ 1 (∵ Yt = 1 − St).

slide-17
SLIDE 17

Smart-meter privacy–(Liu, Khisti, and Mahajan)

3

Why is the problem non-trivial?

𝒴 = 𝒵 = 𝒯 = {0, 1}, PX = [0.5, 0.5] (Binary model) Consv: St + Yt − Xt ∈ 𝒯

Empty state St = 0

Xt = 0 ⟹ Yt ∈ {0, 1} Xt = 1 ⟹ Yt = 1

Full state St = 1

Xt = 0 ⟹ Yt = 0 Xt = 1 ⟹ Yt ∈ {0, 1} Consider performance of memoryless policies

Deterministic Memoryless Policy

P(Y|X = 0, S = 0) = [1 0]; P(Y|X = 1, S = 1) = [0 1]: Leakage = 1 (∵ Yt = Xt). P(Y|X = 0, S = 0) = [0 1]; P(Y|X = 1, S = 1) = [1 0]: Leakage ≈ 1 (∵ Yt = 1 − St).

Randomized Memoryless Policy

P(Y|X = 0, S = 0) = [0.5 0.5]; P(Y|X = 1, S = 1) = [0.5 0.5]: Leakage = 0.5. Is this the best memoryless policy? Is this the optimal policy? How do we evaluate the performance of an arbitrary policy? Need ℙ(XT, YT)?

slide-18
SLIDE 18

Smart-meter privacy–(Liu, Khisti, and Mahajan)

4

Literature overview

Evaluate privacy of specific battery management policies

[Kalogridis et al., 2010] Monte-Carlo evaluation of best-efgort policy [Varodayan Khisti, 2011] Computing performance of battery conditioned stochastic charging policies using BCJR algorithm. [Tan Gündüz Poor, 2012] Generalized results of [Varodayan Khisti] to include models with energy harvesting. [Giulio Gündüz Poor, 2015] Bounds on performance of best-efgort and hide-and-store policies for infjnite battery size.

slide-19
SLIDE 19

Smart-meter privacy–(Liu, Khisti, and Mahajan)

4

Literature overview

Evaluate privacy of specific battery management policies

[Kalogridis et al., 2010] Monte-Carlo evaluation of best-efgort policy [Varodayan Khisti, 2011] Computing performance of battery conditioned stochastic charging policies using BCJR algorithm. [Tan Gündüz Poor, 2012] Generalized results of [Varodayan Khisti] to include models with energy harvesting. [Giulio Gündüz Poor, 2015] Bounds on performance of best-efgort and hide-and-store policies for infjnite battery size.

Dynamic programming decomposition to identify optimal policies

[Yao Venkitasubramanian, 2013] Dynamic program, computable inner and upper bounds. Li Kshiti Mahajan, 2016 Dynamic program, closed form optimal strategy for i.i.d. case.

slide-20
SLIDE 20

Smart-meter privacy–(Liu, Khisti, and Mahajan)

5

[LKM] Main results: Markovian demand

Structure of optimal strategies

Defjne belief state πt(x, s) = ℙ(Xt = x, St = s|Yt−1) Charging strategies of the form qt(yt|xt, st, πt) are optimal.

slide-21
SLIDE 21

Smart-meter privacy–(Liu, Khisti, and Mahajan)

5

[LKM] Main results: Markovian demand

Structure of optimal strategies

Defjne belief state πt(x, s) = ℙ(Xt = x, St = s|Yt−1) Charging strategies of the form qt(yt|xt, st, πt) are optimal.

Dynamic programming decomposition

Let 𝒝 denote the class of conditional distributions on 𝒵 given (𝒴, 𝒯). Suppose there exists a J ∈ ℝ and v∶ 𝒬X,S → ℝ that satisfjes the following: J∗ + v(π) = inf

a∈𝒝 {I(a; π) + ∑ x,s,y

π(x, s)a(y|x, s)v(φ(π, y, a))} Then, J∗ is the minimum leakage rate Let f∗(π) denote the arg min of the RHS and a∗ = f∗(π). Then, J∗ is achieved by the charging policy q∗(y|xt, st, πt) = a∗(y|xt, st) (note a∗ depends on πt)

slide-22
SLIDE 22

Smart-meter privacy–(Liu, Khisti, and Mahajan)

5

[LKM] Main results: Markovian demand

Structure of optimal strategies

Defjne belief state πt(x, s) = ℙ(Xt = x, St = s|Yt−1) Charging strategies of the form qt(yt|xt, st, πt) are optimal.

Dynamic programming decomposition

Let 𝒝 denote the class of conditional distributions on 𝒵 given (𝒴, 𝒯). Suppose there exists a J ∈ ℝ and v∶ 𝒬X,S → ℝ that satisfjes the following: J∗ + v(π) = inf

a∈𝒝 {I(a; π) + ∑ x,s,y

π(x, s)a(y|x, s)v(φ(π, y, a))} Then, J∗ is the minimum leakage rate Let f∗(π) denote the arg min of the RHS and a∗ = f∗(π). Then, J∗ is achieved by the charging policy q∗(y|xt, st, πt) = a∗(y|xt, st) (note a∗ depends on πt) Inspired by the approach used for capacity of Markov channels with feedback (Goldsmith Varaiya 1996, Tatikonda Mitter 2009, Permuter et al 2008) The DP is similar to the DP for POMDPs but the per-step cost is concave rather than linear. v(π) is concave. So, computational approaches for POMDPs work.

slide-23
SLIDE 23

Smart-meter privacy–(Liu, Khisti, and Mahajan)

6

[LKM] Main results: i.i.d. demand

Solution of the dynamic program

J∗ ∶= min

θ∈𝒬S I(S − X; X)

where X ∼ PX and S ∼ θ. Let θ∗ denote the arg min of the RHS. Then, J∗ is the minimum leakage rate

slide-24
SLIDE 24

Smart-meter privacy–(Liu, Khisti, and Mahajan)

6

[LKM] Main results: i.i.d. demand

Solution of the dynamic program

J∗ ∶= min

θ∈𝒬S I(S − X; X)

where X ∼ PX and S ∼ θ. Let θ∗ denote the arg min of the RHS. Then, J∗ is the minimum leakage rate

Optimal strategies

Defjne b∗(y|x, s) = ⎧ ⎨ ⎩ PX(y)θ∗(y + x − s) Normalize if y ∈ 𝒴 and y is feasible 0,

  • therwise

. Then, J∗ is achieved by time-invariant action q∗

t(y|xt, st, πt) = b∗(y|xt, st)

(note b∗ does not depend on πt)

slide-25
SLIDE 25

Smart-meter privacy–(Liu, Khisti, and Mahajan)

7

[LKM] Salient features of the solution

I(S − X; X) is concave in 𝒬𝒯

J∗ and θ∗ may be computed using Blahut-Arimoto algorithm.

Optimal policy is stationary and memoryless

q∗

t(y|xt, st) = b∗(y|xt, st)

(note b∗ does not depend on πt) If St ∼ θ∗, then St+1 ∼ θ∗ and St+1 ⊥ Yt.

Support of consumptions

Even if 𝒵 ⊃ 𝒴, under the optimal policy the support of PY is 𝒴.

slide-26
SLIDE 26

Smart-meter privacy–(Liu, Khisti, and Mahajan)

8

This paper: Periodic Input Distribution

Periodic input

Xodd ∼ Q1(⋅) and Xeven ∼ Q2(⋅). We assume that the input cycles between two distributions (each of length one). Results easily generalize to a larger cycle or staying at each distribution for a difgerent amount of time.

Conceptual diff.

Same as before. The leakage rate is a multi-letter mutual information expression that depends on ℙ(XT, YT).

slide-27
SLIDE 27

Smart-meter privacy–(Liu, Khisti, and Mahajan)

8

This paper: Periodic Input Distribution

Periodic input

Xodd ∼ Q1(⋅) and Xeven ∼ Q2(⋅). We assume that the input cycles between two distributions (each of length one). Results easily generalize to a larger cycle or staying at each distribution for a difgerent amount of time.

Conceptual diff.

Same as before. The leakage rate is a multi-letter mutual information expression that depends on ℙ(XT, YT).

Solution idea

We can use the qualitative properties of the i.i.d. solution to get achievable upper

  • bounds. Compare them with non-achievable lower bounds.
slide-28
SLIDE 28

Smart-meter privacy–(Liu, Khisti, and Mahajan)

9

Achievable scheme and lower bound

Achievable scheme

Arbitrarily restrict attention to periodic policies: For odd time: q1(yt|xt, st) For even time: q2(yt|xt, st) Pick q1 and q2 to ensure invariance condition: St+1 ⊥ Yt. This induces ℙ(St) = PS1 for odd times and PS2 for even times. L∗ ≤ L∞(𝐫) = 1 2I(S1, X1; X1) + 1 2I(S2, X2; X2).

slide-29
SLIDE 29

Smart-meter privacy–(Liu, Khisti, and Mahajan)

9

Achievable scheme and lower bound

Achievable scheme

Arbitrarily restrict attention to periodic policies: For odd time: q1(yt|xt, st) For even time: q2(yt|xt, st) Pick q1 and q2 to ensure invariance condition: St+1 ⊥ Yt. This induces ℙ(St) = PS1 for odd times and PS2 for even times. L∗ ≤ L∞(𝐫) = 1 2I(S1, X1; X1) + 1 2I(S2, X2; X2).

Lower bound

L∗ ≥ 1 2 min

PS1

I(S1 − X1; X1) + 1 2 min

PS2

I(S2 − X2; X2) Same as assuming that the input distribution was Q1 for fjrst T/2 time steps and Q2 as last T/2 time steps.

slide-30
SLIDE 30

Smart-meter privacy–(Liu, Khisti, and Mahajan)

10

Numerical Results

Binary Model

𝒴 = 𝒵 = {0, 1}. Q1 = [0.7 0.3], Q2 = [0.3 0.7]. 1 2 3 4 5 6 0.1 0.2 0.3 0.4 0.5 Battery size Leakage rate lower bound achievable policy

slide-31
SLIDE 31

Smart-meter privacy–(Liu, Khisti, and Mahajan)

11

Numerical Results

Ternary Model

𝒴 = 𝒵 = {0, 1, 2}. Q1 = [0.33 0.33 0.33], Q2 = [0.25 0.5 0.25]. 2 3 4 5 6 0.1 0.2 0.3 0.4 0.5 Battery size Leakage rate lower bound achievable policy

slide-32
SLIDE 32

Smart-meter privacy–(Liu, Khisti, and Mahajan)

11

Numerical Results

Ternary Model

𝒴 = 𝒵 = {0, 1, 2}. Q1 = [0.33 0.33 0.33], Q2 = [0.25 0.5 0.25]. 2 3 4 5 6 0.1 0.2 0.3 0.4 0.5 Battery size Leakage rate lower bound achievable policy

The performance of the proposed policy numerically matches that of the lower bound. Could we show optimality?

slide-33
SLIDE 33

Smart-meter privacy–(Liu, Khisti, and Mahajan)

12

Summary

slide-34
SLIDE 34

Smart-meter privacy–(Liu, Khisti, and Mahajan)

12

Summary

Smart-meter privacy–(Liu, Khisti, and Mahajan)

2

Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Battery ( State St) Yt − Xt Demand: Xt Consumption: Yt

Energy conservation

St+1 = St + Yt − Xt, St ∈ 𝒯 (Size of battery)

Randomized charging strategy

qt(yt | xt, st, yt−1): Choose consumption given history . . .

Objective

Choose battery charging strategy 𝐫 = {qt}t≥1 to min lim

T→∞

1 T I

𝐫(XT; YT)

(mutual information rate)

slide-35
SLIDE 35

Smart-meter privacy–(Liu, Khisti, and Mahajan)

12

Summary

Smart-meter privacy–(Liu, Khisti, and Mahajan)

2

Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Battery ( State St) Yt − Xt Demand: Xt Consumption: Yt

Energy conservation

St+1 = St + Yt − Xt, St ∈ 𝒯 (Size of battery)

Randomized charging strategy

qt(yt | xt, st, yt−1): Choose consumption given history . . .

Objective

Choose battery charging strategy 𝐫 = {qt}t≥1 to min lim

T→∞

1 T I

𝐫(XT; YT)

(mutual information rate) Smart-meter privacy–(Liu, Khisti, and Mahajan)

5

[LKM] Main results: Markovian demand

Structure of optimal strategies

Defjne belief state πt(x, s) = ℙ(Xt = x, St = s|Yt−1) Charging strategies of the form qt(yt|xt, st, πt) are optimal.

Dynamic programming decomposition

Let 𝒝 denote the class of conditional distributions on 𝒵 given (𝒴, 𝒯). Suppose there exists a J ∈ ℝ and v∶ 𝒬X,S → ℝ that satisfjes the following: J∗ + v(π) = inf

a∈𝒝 {I(a; π) + ∑ x,s,y

π(x, s)a(y|x, s)v(φ(π, y, a))} Then, J∗ is the minimum leakage rate Let f∗(π) denote the arg min of the RHS and a∗ = f∗(π). Then, J∗ is achieved by the charging policy q∗(y|xt, st, πt) = a∗(y|xt, st) (note a∗ depends on πt)

slide-36
SLIDE 36

Smart-meter privacy–(Liu, Khisti, and Mahajan)

12

Summary

Smart-meter privacy–(Liu, Khisti, and Mahajan)

2

Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Battery ( State St) Yt − Xt Demand: Xt Consumption: Yt

Energy conservation

St+1 = St + Yt − Xt, St ∈ 𝒯 (Size of battery)

Randomized charging strategy

qt(yt | xt, st, yt−1): Choose consumption given history . . .

Objective

Choose battery charging strategy 𝐫 = {qt}t≥1 to min lim

T→∞

1 T I

𝐫(XT; YT)

(mutual information rate) Smart-meter privacy–(Liu, Khisti, and Mahajan)

5

[LKM] Main results: Markovian demand

Structure of optimal strategies

Defjne belief state πt(x, s) = ℙ(Xt = x, St = s|Yt−1) Charging strategies of the form qt(yt|xt, st, πt) are optimal.

Dynamic programming decomposition

Let 𝒝 denote the class of conditional distributions on 𝒵 given (𝒴, 𝒯). Suppose there exists a J ∈ ℝ and v∶ 𝒬X,S → ℝ that satisfjes the following: J∗ + v(π) = inf

a∈𝒝 {I(a; π) + ∑ x,s,y

π(x, s)a(y|x, s)v(φ(π, y, a))} Then, J∗ is the minimum leakage rate Let f∗(π) denote the arg min of the RHS and a∗ = f∗(π). Then, J∗ is achieved by the charging policy q∗(y|xt, st, πt) = a∗(y|xt, st) (note a∗ depends on πt) Smart-meter privacy–(Liu, Khisti, and Mahajan)

6

[LKM] Main results: i.i.d. demand

Solution of the dynamic program

J∗ ∶= min

θ∈𝒬S I(S − X; X)

where X ∼ PX and S ∼ θ. Let θ∗ denote the arg min of the RHS. Then, J∗ is the minimum leakage rate

Optimal strategies

Defjne b∗(y|x, s) = ⎧ ⎨ ⎩ PX(y)θ∗(y + x − s) Normalize if y ∈ 𝒴 and y is feasible 0,

  • therwise

. Then, J∗ is achieved by time-invariant action q∗

t(y|xt, st, πt) = b∗(y|xt, st)

(note b∗ does not depend on πt)

slide-37
SLIDE 37

Smart-meter privacy–(Liu, Khisti, and Mahajan)

12

Summary

Smart-meter privacy–(Liu, Khisti, and Mahajan)

2

Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Battery ( State St) Yt − Xt Demand: Xt Consumption: Yt

Energy conservation

St+1 = St + Yt − Xt, St ∈ 𝒯 (Size of battery)

Randomized charging strategy

qt(yt | xt, st, yt−1): Choose consumption given history . . .

Objective

Choose battery charging strategy 𝐫 = {qt}t≥1 to min lim

T→∞

1 T I

𝐫(XT; YT)

(mutual information rate) Smart-meter privacy–(Liu, Khisti, and Mahajan)

5

[LKM] Main results: Markovian demand

Structure of optimal strategies

Defjne belief state πt(x, s) = ℙ(Xt = x, St = s|Yt−1) Charging strategies of the form qt(yt|xt, st, πt) are optimal.

Dynamic programming decomposition

Let 𝒝 denote the class of conditional distributions on 𝒵 given (𝒴, 𝒯). Suppose there exists a J ∈ ℝ and v∶ 𝒬X,S → ℝ that satisfjes the following: J∗ + v(π) = inf

a∈𝒝 {I(a; π) + ∑ x,s,y

π(x, s)a(y|x, s)v(φ(π, y, a))} Then, J∗ is the minimum leakage rate Let f∗(π) denote the arg min of the RHS and a∗ = f∗(π). Then, J∗ is achieved by the charging policy q∗(y|xt, st, πt) = a∗(y|xt, st) (note a∗ depends on πt) Smart-meter privacy–(Liu, Khisti, and Mahajan)

6

[LKM] Main results: i.i.d. demand

Solution of the dynamic program

J∗ ∶= min

θ∈𝒬S I(S − X; X)

where X ∼ PX and S ∼ θ. Let θ∗ denote the arg min of the RHS. Then, J∗ is the minimum leakage rate

Optimal strategies

Defjne b∗(y|x, s) = ⎧ ⎨ ⎩ PX(y)θ∗(y + x − s) Normalize if y ∈ 𝒴 and y is feasible 0,

  • therwise

. Then, J∗ is achieved by time-invariant action q∗

t(y|xt, st, πt) = b∗(y|xt, st)

(note b∗ does not depend on πt) Smart-meter privacy–(Liu, Khisti, and Mahajan)

8

This paper: Periodic Input Distribution

Periodic input

Xodd ∼ Q1(⋅) and Xeven ∼ Q2(⋅). We assume that the input cycles between two distributions (each of length one). Results easily generalize to a larger cycle or staying at each distribution for a difgerent amount of time.

Conceptual diff.

Same as before. The leakage rate is a multi-letter mutual information expression that depends on ℙ(XT, YT).

Solution idea

We can use the qualitative properties of the i.i.d. solution to get achievable upper

  • bounds. Compare them with non-achievable lower bounds.
slide-38
SLIDE 38

Smart-meter privacy–(Liu, Khisti, and Mahajan)

12

Summary

Smart-meter privacy–(Liu, Khisti, and Mahajan)

2

Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Battery ( State St) Yt − Xt Demand: Xt Consumption: Yt

Energy conservation

St+1 = St + Yt − Xt, St ∈ 𝒯 (Size of battery)

Randomized charging strategy

qt(yt | xt, st, yt−1): Choose consumption given history . . .

Objective

Choose battery charging strategy 𝐫 = {qt}t≥1 to min lim

T→∞

1 T I

𝐫(XT; YT)

(mutual information rate) Smart-meter privacy–(Liu, Khisti, and Mahajan)

5

[LKM] Main results: Markovian demand

Structure of optimal strategies

Defjne belief state πt(x, s) = ℙ(Xt = x, St = s|Yt−1) Charging strategies of the form qt(yt|xt, st, πt) are optimal.

Dynamic programming decomposition

Let 𝒝 denote the class of conditional distributions on 𝒵 given (𝒴, 𝒯). Suppose there exists a J ∈ ℝ and v∶ 𝒬X,S → ℝ that satisfjes the following: J∗ + v(π) = inf

a∈𝒝 {I(a; π) + ∑ x,s,y

π(x, s)a(y|x, s)v(φ(π, y, a))} Then, J∗ is the minimum leakage rate Let f∗(π) denote the arg min of the RHS and a∗ = f∗(π). Then, J∗ is achieved by the charging policy q∗(y|xt, st, πt) = a∗(y|xt, st) (note a∗ depends on πt) Smart-meter privacy–(Liu, Khisti, and Mahajan)

6

[LKM] Main results: i.i.d. demand

Solution of the dynamic program

J∗ ∶= min

θ∈𝒬S I(S − X; X)

where X ∼ PX and S ∼ θ. Let θ∗ denote the arg min of the RHS. Then, J∗ is the minimum leakage rate

Optimal strategies

Defjne b∗(y|x, s) = ⎧ ⎨ ⎩ PX(y)θ∗(y + x − s) Normalize if y ∈ 𝒴 and y is feasible 0,

  • therwise

. Then, J∗ is achieved by time-invariant action q∗

t(y|xt, st, πt) = b∗(y|xt, st)

(note b∗ does not depend on πt) Smart-meter privacy–(Liu, Khisti, and Mahajan)

8

This paper: Periodic Input Distribution

Periodic input

Xodd ∼ Q1(⋅) and Xeven ∼ Q2(⋅). We assume that the input cycles between two distributions (each of length one). Results easily generalize to a larger cycle or staying at each distribution for a difgerent amount of time.

Conceptual diff.

Same as before. The leakage rate is a multi-letter mutual information expression that depends on ℙ(XT, YT).

Solution idea

We can use the qualitative properties of the i.i.d. solution to get achievable upper

  • bounds. Compare them with non-achievable lower bounds.

Smart-meter privacy–(Liu, Khisti, and Mahajan)

9

Achievable scheme and lower bound

Achievable scheme

Arbitrarily restrict attention to periodic policies: For odd time: q1(yt|xt, st) For even time: q2(yt|xt, st) Pick q1 and q2 to ensure invariance condition: St+1 ⊥ Yt. This induces ℙ(St) = PS1 for odd times and PS2 for even times. L∗ ≤ L∞(𝐫) = 1 2I(S1, X1; X1) + 1 2I(S2, X2; X2).

Lower bound

L∗ ≥ 1 2 min

PS1

I(S1 − X1; X1) + 1 2 min

PS2

I(S2 − X2; X2) Same as assuming that the input distribution was Q1 for fjrst T/2 time steps and Q2 as last T/2 time steps.

slide-39
SLIDE 39

Smart-meter privacy–(Liu, Khisti, and Mahajan)

12

Summary

Smart-meter privacy–(Liu, Khisti, and Mahajan)

2

Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Battery ( State St) Yt − Xt Demand: Xt Consumption: Yt

Energy conservation

St+1 = St + Yt − Xt, St ∈ 𝒯 (Size of battery)

Randomized charging strategy

qt(yt | xt, st, yt−1): Choose consumption given history . . .

Objective

Choose battery charging strategy 𝐫 = {qt}t≥1 to min lim

T→∞

1 T I

𝐫(XT; YT)

(mutual information rate) Smart-meter privacy–(Liu, Khisti, and Mahajan)

5

[LKM] Main results: Markovian demand

Structure of optimal strategies

Defjne belief state πt(x, s) = ℙ(Xt = x, St = s|Yt−1) Charging strategies of the form qt(yt|xt, st, πt) are optimal.

Dynamic programming decomposition

Let 𝒝 denote the class of conditional distributions on 𝒵 given (𝒴, 𝒯). Suppose there exists a J ∈ ℝ and v∶ 𝒬X,S → ℝ that satisfjes the following: J∗ + v(π) = inf

a∈𝒝 {I(a; π) + ∑ x,s,y

π(x, s)a(y|x, s)v(φ(π, y, a))} Then, J∗ is the minimum leakage rate Let f∗(π) denote the arg min of the RHS and a∗ = f∗(π). Then, J∗ is achieved by the charging policy q∗(y|xt, st, πt) = a∗(y|xt, st) (note a∗ depends on πt) Smart-meter privacy–(Liu, Khisti, and Mahajan)

6

[LKM] Main results: i.i.d. demand

Solution of the dynamic program

J∗ ∶= min

θ∈𝒬S I(S − X; X)

where X ∼ PX and S ∼ θ. Let θ∗ denote the arg min of the RHS. Then, J∗ is the minimum leakage rate

Optimal strategies

Defjne b∗(y|x, s) = ⎧ ⎨ ⎩ PX(y)θ∗(y + x − s) Normalize if y ∈ 𝒴 and y is feasible 0,

  • therwise

. Then, J∗ is achieved by time-invariant action q∗

t(y|xt, st, πt) = b∗(y|xt, st)

(note b∗ does not depend on πt) Smart-meter privacy–(Liu, Khisti, and Mahajan)

8

This paper: Periodic Input Distribution

Periodic input

Xodd ∼ Q1(⋅) and Xeven ∼ Q2(⋅). We assume that the input cycles between two distributions (each of length one). Results easily generalize to a larger cycle or staying at each distribution for a difgerent amount of time.

Conceptual diff.

Same as before. The leakage rate is a multi-letter mutual information expression that depends on ℙ(XT, YT).

Solution idea

We can use the qualitative properties of the i.i.d. solution to get achievable upper

  • bounds. Compare them with non-achievable lower bounds.

Smart-meter privacy–(Liu, Khisti, and Mahajan)

9

Achievable scheme and lower bound

Achievable scheme

Arbitrarily restrict attention to periodic policies: For odd time: q1(yt|xt, st) For even time: q2(yt|xt, st) Pick q1 and q2 to ensure invariance condition: St+1 ⊥ Yt. This induces ℙ(St) = PS1 for odd times and PS2 for even times. L∗ ≤ L∞(𝐫) = 1 2I(S1, X1; X1) + 1 2I(S2, X2; X2).

Lower bound

L∗ ≥ 1 2 min

PS1

I(S1 − X1; X1) + 1 2 min

PS2

I(S2 − X2; X2) Same as assuming that the input distribution was Q1 for fjrst T/2 time steps and Q2 as last T/2 time steps. Smart-meter privacy–(Liu, Khisti, and Mahajan)

10

Numerical Results

Binary Model

𝒴 = 𝒵 = {0, 1}. Q1 = [0.7 0.3], Q2 = [0.3 0.7]. 1 2 3 4 5 6 0.1 0.2 0.3 0.4 0.5 Battery size Leakage rate lower bound achievable policy

slide-40
SLIDE 40

Smart-meter privacy–(Liu, Khisti, and Mahajan)

12

Summary

Smart-meter privacy–(Liu, Khisti, and Mahajan)

2

Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Battery ( State St) Yt − Xt Demand: Xt Consumption: Yt

Energy conservation

St+1 = St + Yt − Xt, St ∈ 𝒯 (Size of battery)

Randomized charging strategy

qt(yt | xt, st, yt−1): Choose consumption given history . . .

Objective

Choose battery charging strategy 𝐫 = {qt}t≥1 to min lim

T→∞

1 T I

𝐫(XT; YT)

(mutual information rate) Smart-meter privacy–(Liu, Khisti, and Mahajan)

5

[LKM] Main results: Markovian demand

Structure of optimal strategies

Defjne belief state πt(x, s) = ℙ(Xt = x, St = s|Yt−1) Charging strategies of the form qt(yt|xt, st, πt) are optimal.

Dynamic programming decomposition

Let 𝒝 denote the class of conditional distributions on 𝒵 given (𝒴, 𝒯). Suppose there exists a J ∈ ℝ and v∶ 𝒬X,S → ℝ that satisfjes the following: J∗ + v(π) = inf

a∈𝒝 {I(a; π) + ∑ x,s,y

π(x, s)a(y|x, s)v(φ(π, y, a))} Then, J∗ is the minimum leakage rate Let f∗(π) denote the arg min of the RHS and a∗ = f∗(π). Then, J∗ is achieved by the charging policy q∗(y|xt, st, πt) = a∗(y|xt, st) (note a∗ depends on πt) Smart-meter privacy–(Liu, Khisti, and Mahajan)

6

[LKM] Main results: i.i.d. demand

Solution of the dynamic program

J∗ ∶= min

θ∈𝒬S I(S − X; X)

where X ∼ PX and S ∼ θ. Let θ∗ denote the arg min of the RHS. Then, J∗ is the minimum leakage rate

Optimal strategies

Defjne b∗(y|x, s) = ⎧ ⎨ ⎩ PX(y)θ∗(y + x − s) Normalize if y ∈ 𝒴 and y is feasible 0,

  • therwise

. Then, J∗ is achieved by time-invariant action q∗

t(y|xt, st, πt) = b∗(y|xt, st)

(note b∗ does not depend on πt) Smart-meter privacy–(Liu, Khisti, and Mahajan)

8

This paper: Periodic Input Distribution

Periodic input

Xodd ∼ Q1(⋅) and Xeven ∼ Q2(⋅). We assume that the input cycles between two distributions (each of length one). Results easily generalize to a larger cycle or staying at each distribution for a difgerent amount of time.

Conceptual diff.

Same as before. The leakage rate is a multi-letter mutual information expression that depends on ℙ(XT, YT).

Solution idea

We can use the qualitative properties of the i.i.d. solution to get achievable upper

  • bounds. Compare them with non-achievable lower bounds.

Smart-meter privacy–(Liu, Khisti, and Mahajan)

9

Achievable scheme and lower bound

Achievable scheme

Arbitrarily restrict attention to periodic policies: For odd time: q1(yt|xt, st) For even time: q2(yt|xt, st) Pick q1 and q2 to ensure invariance condition: St+1 ⊥ Yt. This induces ℙ(St) = PS1 for odd times and PS2 for even times. L∗ ≤ L∞(𝐫) = 1 2I(S1, X1; X1) + 1 2I(S2, X2; X2).

Lower bound

L∗ ≥ 1 2 min

PS1

I(S1 − X1; X1) + 1 2 min

PS2

I(S2 − X2; X2) Same as assuming that the input distribution was Q1 for fjrst T/2 time steps and Q2 as last T/2 time steps. Smart-meter privacy–(Liu, Khisti, and Mahajan)

10

Numerical Results

Binary Model

𝒴 = 𝒵 = {0, 1}. Q1 = [0.7 0.3], Q2 = [0.3 0.7]. 1 2 3 4 5 6 0.1 0.2 0.3 0.4 0.5 Battery size Leakage rate lower bound achievable policy