on privacy in smart metering systems with periodically
play

On Privacy in Smart Metering Systems with Periodically Time-Varying - PowerPoint PPT Presentation

On Privacy in Smart Metering Systems with Periodically Time-Varying Input Distribution Yu Liu a , Ashish Khisti a , Aditya Mahajan b GlobalSIP Symposium on Privacy and Security 14 Nov, 2017 a University of Toronto b McGill University Smart-meter


  1. On Privacy in Smart Metering Systems with Periodically Time-Varying Input Distribution Yu Liu a , Ashish Khisti a , Aditya Mahajan b GlobalSIP Symposium on Privacy and Security 14 Nov, 2017 a University of Toronto b McGill University

  2. Smart-meter privacy–(Liu, Khisti, and Mahajan) 1 Smart Meters empower smart grids Fine grained consumption measurements are needed for: Time-of-use pricing Demand response . . .

  3. Smart-meter privacy–(Liu, Khisti, and Mahajan) 1 Smart Meters empower smart grids Fine grained consumption measurements are needed for: Time-of-use pricing Demand response . . .

  4. Smart-meter privacy–(Liu, Khisti, and Mahajan) 1 Smart Meters empower smart grids Fine grained consumption measurements are needed for: Time-of-use pricing Demand response . . .

  5. Smart-meter privacy–(Liu, Khisti, and Mahajan) 1 Smart Meters empower smart grids Fine grained consumption measurements are needed for: Time-of-use pricing Demand response . . .

  6. What is the minimum information leakage rate if consumers obfuscate consumption using a rechargeable battery? What are privacy-optimal battery charging strategies?

  7. Smart-meter privacy–(Liu, Khisti, and Mahajan) 2 Home Applicances Power Grid Smart Meter Controller Demand: X t Consumption: Y t

  8. Smart-meter privacy–(Liu, Khisti, and Mahajan) 2 Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Demand: X t Consumption: Y t

  9. Smart-meter privacy–(Liu, Khisti, and Mahajan) 2 Home Applicances Power Grid Smart Meter Controller Evesdropper/ Adversory Battery ( State S t ) Demand: X t Consumption: Y t Y t − X t

  10. Smart-meter privacy–(Liu, Khisti, and Mahajan) 2 Energy conservation Consumption: Y t Demand: X t ( State S t ) Battery Adversory Evesdropper/ Controller Smart Meter Grid Power Applicances Home Y t − X t S t+1 = S t + Y t − X t , S t ∈ 𝒯 (Size of battery)

  11. Smart-meter privacy–(Liu, Khisti, and Mahajan) Adversory Randomized charging strategy Energy conservation Consumption: Y t Demand: X t ( State S t ) 2 Battery Evesdropper/ Controller Smart Meter Grid Power Applicances Home Y t − X t S t+1 = S t + Y t − X t , S t ∈ 𝒯 (Size of battery) q t (y t | x t , s t , y t−1 ) : Choose consumption given history . . .

  12. Smart-meter privacy–(Liu, Khisti, and Mahajan) Demand: X t 𝐫 (X T ; Y T ) 1 T→∞ min lim Objective Randomized charging strategy Energy conservation 2 Consumption: Y t ( State S t ) Smart Meter Home Applicances Power Grid (mutual information rate) Controller Evesdropper/ Adversory Battery Y t − X t S t+1 = S t + Y t − X t , S t ∈ 𝒯 (Size of battery) q t (y t | x t , s t , y t−1 ) : Choose consumption given history . . . Choose battery charging strategy 𝐫 = {q t } t≥1 to T I

  13. Smart-meter privacy–(Liu, Khisti, and Mahajan) 3 Why is the problem non-trivial? (Binary model) 𝒴 = 𝒵 = 𝒯 = {0, 1} , P X = [0.5, 0.5] Consv: S t + Y t − X t ∈ 𝒯

  14. Smart-meter privacy–(Liu, Khisti, and Mahajan) 3 Why is the problem non-trivial? (Binary model) 𝒴 = 𝒵 = 𝒯 = {0, 1} , P X = [0.5, 0.5] Consv: S t + Y t − X t ∈ 𝒯 Empty state S t = 0 Full state S t = 1 X t = 0 ⟹ Y t ∈ {0, 1} X t = 0 ⟹ Y t = 0 X t = 1 ⟹ Y t = 1 X t = 1 ⟹ Y t ∈ {0, 1}

  15. Smart-meter privacy–(Liu, Khisti, and Mahajan) 3 Why is the problem non-trivial? (Binary model) Consider performance of memoryless policies 𝒴 = 𝒵 = 𝒯 = {0, 1} , P X = [0.5, 0.5] Consv: S t + Y t − X t ∈ 𝒯 Empty state S t = 0 Full state S t = 1 X t = 0 ⟹ Y t ∈ {0, 1} X t = 0 ⟹ Y t = 0 X t = 1 ⟹ Y t = 1 X t = 1 ⟹ Y t ∈ {0, 1}

  16. Smart-meter privacy–(Liu, Khisti, and Mahajan) 3 Why is the problem non-trivial? (Binary model) Consider performance of memoryless policies Deterministic Memoryless Policy 𝒴 = 𝒵 = 𝒯 = {0, 1} , P X = [0.5, 0.5] Consv: S t + Y t − X t ∈ 𝒯 Empty state S t = 0 Full state S t = 1 X t = 0 ⟹ Y t ∈ {0, 1} X t = 0 ⟹ Y t = 0 X t = 1 ⟹ Y t = 1 X t = 1 ⟹ Y t ∈ {0, 1} P(Y|X = 0, S = 0) = [1 0] ; P(Y|X = 1, S = 1) = [0 1] : Leakage = 1 ( ∵ Y t = X t ). P(Y|X = 0, S = 0) = [0 1] ; P(Y|X = 1, S = 1) = [1 0] : Leakage ≈ 1 ( ∵ Y t = 1 − S t ).

  17. Smart-meter privacy–(Liu, Khisti, and Mahajan) 3 Is this the optimal policy? Is this the best memoryless policy? P(Y|X = 0, S = 0) = [0.5 0.5] ; P(Y|X = 1, S = 1) = [0.5 0.5] : Leakage = 0.5 . Randomized Memoryless Policy Deterministic Memoryless Policy Consider performance of memoryless policies How do we evaluate the performance of an arbitrary policy? Need ℙ (X T , Y T ) ? Why is the problem non-trivial? (Binary model) 𝒴 = 𝒵 = 𝒯 = {0, 1} , P X = [0.5, 0.5] Consv: S t + Y t − X t ∈ 𝒯 Empty state S t = 0 Full state S t = 1 X t = 0 ⟹ Y t ∈ {0, 1} X t = 0 ⟹ Y t = 0 X t = 1 ⟹ Y t = 1 X t = 1 ⟹ Y t ∈ {0, 1} P(Y|X = 0, S = 0) = [1 0] ; P(Y|X = 1, S = 1) = [0 1] : Leakage = 1 ( ∵ Y t = X t ). P(Y|X = 0, S = 0) = [0 1] ; P(Y|X = 1, S = 1) = [1 0] : Leakage ≈ 1 ( ∵ Y t = 1 − S t ).

  18. Smart-meter privacy–(Liu, Khisti, and Mahajan) 4 Literature overview Evaluate privacy of specific battery management policies [Kalogridis et al., 2010] Monte-Carlo evaluation of best-efgort policy [Varodayan Khisti, 2011] Computing performance of battery conditioned [Tan Gündüz Poor, 2012] Generalized results of [Varodayan Khisti] to include models with energy harvesting. [Giulio Gündüz Poor, 2015] Bounds on performance of best-efgort and hide-and-store policies for infjnite battery size. stochastic charging policies using BCJR algorithm.

  19. Smart-meter privacy–(Liu, Khisti, and Mahajan) 4 Literature overview Evaluate privacy of specific battery management policies [Kalogridis et al., 2010] Monte-Carlo evaluation of best-efgort policy [Varodayan Khisti, 2011] Computing performance of battery conditioned [Tan Gündüz Poor, 2012] Generalized results of [Varodayan Khisti] to include models with energy harvesting. [Giulio Gündüz Poor, 2015] Bounds on performance of best-efgort and hide-and-store policies for infjnite battery size. Dynamic programming decomposition to identify optimal policies [Yao Venkitasubramanian, 2013] Dynamic program, computable inner and upper bounds. Li Kshiti Mahajan, 2016 Dynamic program, closed form optimal strategy for i.i.d. case. stochastic charging policies using BCJR algorithm.

  20. Smart-meter privacy–(Liu, Khisti, and Mahajan) 5 [LKM] Main results: Markovian demand Structure of optimal strategies Charging strategies of the form q t (y t |x t , s t , π t ) are optimal. Defjne belief state π t (x, s) = ℙ (X t = x, S t = s|Y t−1 )

  21. Smart-meter privacy–(Liu, Khisti, and Mahajan) Then, [LKM] Main results: Markovian demand Structure of optimal strategies Charging strategies of the form q t (y t |x t , s t , π t ) are optimal. Dynamic programming decomposition Let 𝒝 denote the class of conditional distributions on 𝒵 given (𝒴, 𝒯) . 5 q ∗ (y|x t , s t , π t ) = a ∗ (y|x t , s t ) x,s,y π(x, s)a(y|x, s)v(φ(π, y, a))} Defjne belief state π t (x, s) = ℙ (X t = x, S t = s|Y t−1 ) Suppose there exists a J ∈ ℝ and v∶ 𝒬 X,S → ℝ that satisfjes the following: J ∗ + v(π) = inf a∈𝒝 {I(a; π) + ∑ J ∗ is the minimum leakage rate Let f ∗ (π) denote the arg min of the RHS and a ∗ = f ∗ (π) . Then, J ∗ is achieved by the charging policy (note a ∗ depends on π t )

  22. Smart-meter privacy–(Liu, Khisti, and Mahajan) x,s,y is concave rather than linear. The DP is similar to the DP for POMDPs but the per-step cost Permuter et al 2008) with feedback (Goldsmith Varaiya 1996, Tatikonda Mitter 2009, Inspired by the approach used for capacity of Markov channels q ∗ (y|x t , s t , π t ) = a ∗ (y|x t , s t ) Then, 5 π(x, s)a(y|x, s)v(φ(π, y, a))} Dynamic programming decomposition Let 𝒝 denote the class of conditional distributions on 𝒵 given (𝒴, 𝒯) . Charging strategies of the form q t (y t |x t , s t , π t ) are optimal. Structure of optimal strategies [LKM] Main results: Markovian demand v(π) is concave. So, computational approaches for POMDPs work. Defjne belief state π t (x, s) = ℙ (X t = x, S t = s|Y t−1 ) Suppose there exists a J ∈ ℝ and v∶ 𝒬 X,S → ℝ that satisfjes the following: J ∗ + v(π) = inf a∈𝒝 {I(a; π) + ∑ J ∗ is the minimum leakage rate Let f ∗ (π) denote the arg min of the RHS and a ∗ = f ∗ (π) . Then, J ∗ is achieved by the charging policy (note a ∗ depends on π t )

  23. Smart-meter privacy–(Liu, Khisti, and Mahajan) 6 [LKM] Main results: i.i.d. demand Solution of the dynamic program J ∗ ∶= min θ∈𝒬 S I(S − X; X) where X ∼ P X and S ∼ θ . Let θ ∗ denote the arg min of the RHS. Then, J ∗ is the minimum leakage rate

  24. Smart-meter privacy–(Liu, Khisti, and Mahajan) ⎩ t (y|x t , s t , π t ) = b ∗ (y|x t , s t ) q ∗ . otherwise 0, if y ∈ 𝒴 and y is feasible Normalize P X (y)θ ∗ (y + x − s) ⎨ 6 ⎧ Defjne b ∗ (y|x, s) = Optimal strategies Solution of the dynamic program [LKM] Main results: i.i.d. demand J ∗ ∶= min θ∈𝒬 S I(S − X; X) where X ∼ P X and S ∼ θ . Let θ ∗ denote the arg min of the RHS. Then, J ∗ is the minimum leakage rate Then, J ∗ is achieved by time-invariant action (note b ∗ does not depend on π t )

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend