Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach

    Research output: Contribution to journalArticlepeer-review

    32 Scopus citations

    Abstract

    Smart meters are integral to demand response in emerging smart grids, by reporting the electricity consumption of users to serve application needs. But reporting real-time usage information for individual households raises privacy concerns. Existing techniques to guarantee differential privacy (DP) of smart meter users either are not fault tolerant or achieve (possibly partial) fault tolerance at high communication overheads. In this paper, we propose a fault-tolerant protocol for smart metering that can handle general communication failures while ensuring DP with significantly improved efficiency and lower errors compared with the state of the art. Our protocol handles fail-stop faults proactively by using a novel design of future ciphertexts, and distributes trust among the smart meters by sharing secret keys among them. We prove the DP properties of our protocol and analyze its advantages in fault tolerance, accuracy, and communication efficiency relative to competing techniques. We illustrate our analysis by simulations driven by real-world traces of electricity consumption.

    Original languageEnglish
    Article number7106571
    Pages (from-to)1661-1674
    Number of pages14
    JournalIEEE/ACM Transactions on Networking
    Volume24
    Issue number3
    DOIs
    StatePublished - Jun 2016

    Funding

    This work was supported in part by Singapore's Agency for Science, Technology, and Research (ASTAR) under the Human-Centered Cyber-Physical Systems program, in part by Singapore MOE under award SUTD-ZJU-RES-01-2013, in part by U.S. NSF under award CNS-0963715, and in part by China NSFC under award 61429301.

    Keywords

    • Data privacy
    • information security

    Fingerprint

    Dive into the research topics of 'Privacy-Assured Aggregation Protocol for Smart Metering: A Proactive Fault-Tolerant Approach'. Together they form a unique fingerprint.

    Cite this