privacy strategies in smart metering
play

Privacy Strategies in Smart Metering Source: - PowerPoint PPT Presentation

Privacy Strategies in Smart Metering Source: http://abstrusegoose.com/553 Tobias Klenze: Privacy Strategies in Smart Metering 1 Privacy Strategies in Smart Metering Tobias Klenze Chair for Network Architectures and Services Department for


  1. Privacy Strategies in Smart Metering Source: http://abstrusegoose.com/553 Tobias Klenze: Privacy Strategies in Smart Metering 1

  2. Privacy Strategies in Smart Metering Tobias Klenze Chair for Network Architectures and Services Department for Computer Science Technische Universit¨ at M¨ unchen June 13, 2014 Tobias Klenze: Privacy Strategies in Smart Metering 2

  3. Outline 1 Smart Meters Real-time data aggregation 2 Billing protocols 3 Conclusions 4 Tobias Klenze: Privacy Strategies in Smart Metering 3

  4. Outline 1 Smart Meters Real-time data aggregation 2 Billing protocols 3 Conclusions 4 Tobias Klenze: Privacy Strategies in Smart Metering 4

  5. What’s a “Smart Meter”? Normal Meter Smart Meter Kristoferb, CC-BY-SA 3.0 EVB Energy, CC-BY-SA 3.0 Tobias Klenze: Privacy Strategies in Smart Metering 5

  6. (Supposed) Advantages of Smart Meters Smart Meters! What are they good for? 1 Automated billing (no physical inspections) 2 Complex tariffs (e.g. electricity costs more in peak times) 3 “Smart” devices take tariffs into account 4 Grid / plant management – forecasting of consumption demand 5 Leak detection Tobias Klenze: Privacy Strategies in Smart Metering 6

  7. Smart Meter Deployment EU directive: 80% deployment by 2020. Investments: 3.15 billion Euro in the EU already. Smart Meters will come to you as well Tobias Klenze: Privacy Strategies in Smart Metering 7

  8. Smart Meter Deployment EU directive: 80% deployment by 2020. Investments: 3.15 billion Euro in the EU already. Smart Meters will come to you as well Tobias Klenze: Privacy Strategies in Smart Metering 7

  9. The Problem: High-frequency data Readings intervals Normal Meters: once per month. Low frequency, no problem Smart Meters: once per 15 minutes. High frequency, problematic Tobias Klenze: Privacy Strategies in Smart Metering 8

  10. The Problem: High-frequency data Readings intervals Normal Meters: once per month. Low frequency, no problem Smart Meters: once per 15 minutes. High frequency, problematic Source: Private Memoirs of a Smart Meter, 2010, Molina-Markham, Shenoy, Prashant et al Tobias Klenze: Privacy Strategies in Smart Metering 8

  11. Outline 1 Smart Meters Real-time data aggregation 2 Billing protocols 3 Conclusions 4 Tobias Klenze: Privacy Strategies in Smart Metering 9

  12. Aggregating real-time data Goal: Provide real-time usage data to grid & utility provider AND respect privacy. Problem: Providers poorly define what data they need. Tobias Klenze: Privacy Strategies in Smart Metering 10

  13. Approaches for real-time data sharing Idea: Preprocess (obfuscate) consumption data. Quantization works well, Down-sampling not as much. Problem: Still some predictions are possible. Idea: Aggregate data of different households (without trusted third party). Tobias Klenze: Privacy Strategies in Smart Metering 11

  14. Approaches for real-time data sharing Idea: Preprocess (obfuscate) consumption data. Quantization works well, Down-sampling not as much. Problem: Still some predictions are possible. Idea: Aggregate data of different households (without trusted third party). Tobias Klenze: Privacy Strategies in Smart Metering 11

  15. Homomorphic encryption Homomorphic encryption = Messing with ciphertext Allows modification of ciphertext yielding meaningful ciphertext. We use: enc ( m 1 ) ∗ enc ( m 2 ) = enc ( m 1 + m 2 ) Tobias Klenze: Privacy Strategies in Smart Metering 12

  16. Protocol flow (1) Record consumption m 1 M 1 Local M 4 M 2 Station M 3 Tobias Klenze: Privacy Strategies in Smart Metering 13

  17. Protocol flow (2) Choose random a j, 1 s.t. m 1 = a 1 , 1 + a 2 , 1 + a 3 , 1 + a 4 , 1 M 1 Local M 4 M 2 Station M 3 Tobias Klenze: Privacy Strategies in Smart Metering 14

  18. Protocol flow (3) For all j enc pk j ( a 1 j ) M 1 Local M 4 M 2 Station M 3 Tobias Klenze: Privacy Strategies in Smart Metering 15

  19. Protocol flow (4) M 1 enc pk j ( a 1 j ) Local M 4 M 2 Station M 3 Tobias Klenze: Privacy Strategies in Smart Metering 16

  20. Protocol flow (5) M 1 Local M 4 M 2 Station For all i , j : enc pk j ( a ij ) M 3 Tobias Klenze: Privacy Strategies in Smart Metering 17

  21. Protocol flow (6) M 1 Local M 4 M 2 Station For all j : � enc pk j ( a ij ) i � = j = enc pk j ( � a ij ) M 3 i � = j Tobias Klenze: Privacy Strategies in Smart Metering 18

  22. Protocol flow (7) M 1 Local M 4 M 2 Station enc pk 3 ( � a i 3 ) i � =3 M 3 Tobias Klenze: Privacy Strategies in Smart Metering 19

  23. Protocol flow (8) M 1 Local M 4 M 2 Station M 3 dec sk 3 enc pk 3 ( � a i 3 ) i � =3 Tobias Klenze: Privacy Strategies in Smart Metering 20

  24. Protocol flow (9) M 1 Local M 4 M 2 Station r 3 := � a i 3 + a 33 i � =3 M 3 Tobias Klenze: Privacy Strategies in Smart Metering 21

  25. Protocol flow (10) M 1 Local M 4 M 2 Station � j r j M 3 Tobias Klenze: Privacy Strategies in Smart Metering 22

  26. Outline 1 Smart Meters Real-time data aggregation 2 Billing protocols 3 Conclusions 4 Tobias Klenze: Privacy Strategies in Smart Metering 23

  27. Privacy-sensitive Billing protocols Security in the protocol is a must Ideally: Allows for different tariffs No centralized trust – neither the consumer can cheat, nor the utility Utility has no direct access on smart meter No physical inspections required → Complex problem but protocols exist. Tobias Klenze: Privacy Strategies in Smart Metering 24

  28. Outline 1 Smart Meters Real-time data aggregation 2 Billing protocols 3 Conclusions 4 Tobias Klenze: Privacy Strategies in Smart Metering 25

  29. Summary & Conclusions Lessons learned: 1 Privacy is a big problem with current smart meters. 2 Protocols for real-time data and secure billing . 3 Privacy in Smart Meters is possible. Tobias Klenze: Privacy Strategies in Smart Metering 26

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend