Review on privacy protection approaches in smart meter
-
摘要: 随着智能电网和通信技术的发展,智能电表的普及应用受到越来越多的重视.一方面,智能电表为用户合理用电和电力公司有效供电、高效收费带来了便利,而另一方面细粒度的智能电表数据泄露用户用电行为等敏感信息,用户隐私泄露也成为最大的安全威胁.主要从智能电表端的身份隐私保护技术和数据隐私保护技术两个方面来综述国内外相关研究.对比分析了现有隐私保护技术的隐私保护强度、计算开销、传输开销等;提炼了智能电表仍然面临的安全与隐私挑战,并探讨了该领域未来的研究趋势与方向.Abstract: With the development of the smart grid and communication technologies, smart meters have attracted increasing attentions. On the one hand, smart meters brought considerable convenience for users with better electricity consumption management and power companies effective power supply and efficient billing; on the other hand, it raised security threat that finegrained smart meter data could reveal users private information. This paper conducted a thorough survey on existing solutions mainly from identity privacy protection approach and data privacy protection approach. We deeply compared their privacyrelated factors, such as the strength of privacy protection, computational overhead, transmission overhead. Finally, we investigated the remaining challenges to protect user privacy in smart meter and discussed plausible and promising trends and directions for future research.
-
[1] [1]GELLINGS C W. The smart grid: enabling energy efficiency and demand response[M]. Lilburn GA: Fairmont Press, 2009.[2]路保辉,马永红.智能电网AMI 通信系统及其数据安全策略研究[J].电网技术,2013, 37(8): 22442249.[3]厦门毅仁信息技术有限公司.智能小区水表、电表、气表、热力表能耗计量远程集中抄表系统[R/OL].(20140323)[20150601].http://www.gongkong.com/webpage/news/201403/2014032309333700001.htm[4]田秀霞,高明,王晓玲,等.数据库服务——安全与隐私保护[J].软件学报,2010,21(5):9911006.[5]FOUDA M M, FADLULLAH Z M, KATO N, et al. A lightweight message authentication scheme for smart grid communications[J]. IEEE Transactions on Smart Grid, 2011, 2(4): 675685.[6]FOUDA M M, FADLULLAH Z M, KATO N, et al. Towards a lightweight message authentication mechanism tailored for smart grid communications[C]//Proceedings of the IEEE International Conferrance on Information Networking. Shanghai, 2011: 10181023.[7]ELISA B, KENJI T. Identity management concepts, technologies, and systems[M]. Boston: Artech House, 2011.[8]刘薇.智能电能表数据安全防护技术探讨[J].电源技术应用,2013(6):404.[9]王耀辉,金海燕,朱莉. 基于用户隐私保护的智能电表设计[J].黑龙江科技信息,2014(7):7375.[10]春波绿影.电力线载波自动抄表系统智能电表之自动抄表主流方案盘点[R/OL].(20130128)[20150601].http://www.elecfans.com/dianyuan/306612_4.html[11]LI F, LUO B, LIU P. Secure Information Aggregation for Smart Grids Using Homomorphic Encryption[C]//Proceedings of the 1st IEEE International Conference on Smart Grid Communication. Gaithersburg, MD, 2010: 327332.[12]CHEUNG J C L, CHIM T W, YIU S M, et al. Credentialbased privacypreserving power request scheme for smart grid network[C]//Proceedings of the IEEE Global Telecommunications Conference. Houston, 2011: 15.[13]CHAUMM D. Blind signatures for untraceable payments[C]//Proceedings of CRYPTO′82 Conference on Advances in Cryptology. California USA: Springer Berlin Heidelberg, 1982: 199203.[14]YU C M, CHEN C Y, KUO S Y, et al. Privacypreserving power request in smart grid networks [J]. IEEE Systems Journal, 2014, 8(2): 441449.[15]LIN X, LU R, ZHU H, et al. ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks[C]//Proceedings of the IEEE ICC. Glasgow, 2007: 12471253.[16]CHIM T W, YIU S M, LUCAS C K, et al. PASS: Privacypreserving authentication scheme for smart grid network[C]//Proceedings of the IEEE International Conference on Smart Grid Communications. Brussels, 2011: 196201.[17]CHIM T W, YIU S M, HUI L C K, et al. PRGA: Privacypreserving recording & gatewayassisted authentication of power usage information for smart Grid[J]. IEEE Transactions on Dependable and Secure Computing, 2015, 12(1): 8597.[18]KALISKI B, STADDON J. RSA Cryptography Specifications Version 2.0[M].[s.l]: The Internet Society, 1998. [19]LEE S, BONG J, SHIN S, et al. A security mechanism of smart grid AMI network through smart device mutual authentication[C]//Proceedings of 2014 IEEE International Conference on Information Networking. Phuket, 2014: 592595.[20]EFTHMIOU C, KALOGRIDIS G. Smart grid privacy via anonymization of smart metering data[C]//Proceedings of the 1st IEEE International Conference on Smart Grid Communications. Gaithersburg, MD, 2010: 238243.[21]BELLARE M, GOLDREICH O. On defining proofs of knowledge[C]//Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer Berlin Heidelberg, 1992: 390420. [22]MARKHAM M M, SHENOY P, FU F, et al. Private memoirs of a smart meter[C]//Proceedings of the 2010 ACM BuildSys International Conference on Embedded Systems for EnergyEfficient Buildings. Zurich: ACM, 2010: 6166.[23]RIAL A, DANEZIS G. PrivacyPreserving Smart Metering[C]//Highlights of the Information Security Solutions Europe 2012 Conference. Europe: Springer Berlin Heidelberg, 2012: 105115.[24]SCHNORR C. Efficient signature generation for smart cards[J]. Journal of Cryptology, 1991, 4(3):239252.[25]CHAUM D, PEDERSEN T. Wallet databases with observers[C]//Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology. California, USA: Springer Berlin Heidelberg, 1993:89105.[26]OKAMOTO T. An efficient divisible electronic cash scheme[C]//Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology. California, USA: Springer Berlin Heidelberg, 1995: 438451.[27]BOOUDOT F. Efficient proofs that a committed number lies in an interval[C]//Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques. Bruges, Belgium: Springer Berlin Heidelberg, 2000: 431444.[28]CRAMER R, DAMGARD I, SCHOENMAKERS B. Proofs of partial knowledge and simplified design of witness hiding protocols[C]//Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology. California, USA: Springer Berlin Heidelberg, 1994: 174187.[29]FIAT A, SHAMIR A. How to prove yourself: Practical solutions to identification and signature problems[C]//Proceedings of the Advances in Cryptology. [s.l.]: Springer Berlin Heidelberg, 1987: 186194.[30]ERKIN Z, TRONCOSOPPASTORIZA J R, LAGENDIJK R L, et al. Privacypreserving data aggregation in smart metering systems: an overview[J]. IEEE Signal Processing Society, 2013, 30(2): 7586.[31]PAILLIER P. Publickey cryptosystems based on composite degree residuosity classes[C]//Proceedings of the 17th International Conference on Theory Application Cryptographic Techniques. Prague, Czech Republic: Springer Berlin Heidelberg, 1999: 223238.[32]ERKIN Z, TSUDIK G. Private computation of spatial and temporal power consumption with smart meters[C]//Proceedings of the International Conference on Applied Cryptography and Network Security. Singapore: Springer Berlin Heidelberg, 2012: 561577.[33]GARCIA F D, JACOBS B. Privacyfriendly energymetering via homomorphic encryption[C]//Proceedings of the 6th Workshop on Security and Trust Management. Athens, Greece: Springer Berlin Heidelberg, 2010: 226238. [34]KURSAWE K, DANEZIS G, KOHLWEISS M. Privacyfriendly aggregation for the smartgrid[C]//Proceedings of the 11th International Symposium on Privacy Enhancing Technologies. Waterloo, Canada: Springer Berlin Heidelberg, 2011: 175191.[35]CS G, CASTELLUCCIA C. I have a DREAM! (differentially private smart metering)[C]//Proceedings of the 13th international conference on Information hiding. [s.l.]: Springer Berlin Heidelberg, 2011: 118132.[36]DWORK C, MCSHERRY F, NISSIM K, et al. Calibrating noise to sensitivity in private data analysis[C]//Proceedings of the 3rd Theory of Cryptography Conference. New York: Springer Berlin Heidelberg, 2006: 265284.[37]DWORK C. Differential privacy: A survey of results[C]//Proceedings of the 3rd International Conference on Theory and Applications of Models of Computation. Xi’an China: Springer Berlin Heidelberg, 2008: 119.[38]RASTAGI V, NATH S. Differentially private aggregation of distributed timeseries with transformation and encryption[C]//Proceedings of the 2010 ACM SIGMOD International Conference on Management of data. Indiana: ACM, 2010: 611.[39]VARODAYAN D. KHISTI A. Smart meter privacy using a rechargeable battery: minimizing the rate of information leakage[C]//Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing. Prague: Czech Republic, 2011: 19321935.[40]KALOGRIDIS G, EFTHYMIOOU C, DENIC S, et al. Privacy for smart meters: towards undetectable appliance load signatures[C]//Proceedings of the IEEE International Conference on Smart Grid Communications. Gaithersburg, MD, 2010: 232237.[41]ARNOLD D M, LOELIGER H A, VONTOBEL P O, et al. Simulationbased computation of information rates for channels with memory[J]. IEEE Transactions on Information Theory, 2006, 52(8): 34983508.[42]TIAN X X, SHA C F, WANG X L, et al. Privacy preserving query processing on secret share based data storage[C]//Proceedings of the 16th International Conference on Database Systems for Advanced Applications(DASFAA 2011). Hong Kong China: LNCS6587, 2011: 108122.[43]任梦吟,毛琪琦,马婷,等.基于云计算的智能电表用户表单隐私保护.智能电网,2014(4): 123128.[44]国家电力公司称将在2015年建成全国统一的联合电网[J].中国石油和化工, 2001, (3):11.[45]TIAN X X, HUANG L, WANG Y, et al. DualAcE: finegrained dual access control enforcement with multiprivacy guarantee in DaaS[J]. Security and Communication Networks, 2014, 8(8): 14941508.[46]林稼弘.泓格发表新式智能型WebBased电表集中器[R/OL].(20140219)[20150601].http://gbwww.digitimes.com.tw/tw/iac/shwnws.asp?cat=10&cat1=10&cnlid=19&id=368253.
点击查看大图
计量
- 文章访问数: 863
- HTML全文浏览量: 62
- PDF下载量: 816
- 被引次数: 0