171,391 research outputs found
Smart Meter Privacy: A Utility-Privacy Framework
End-user privacy in smart meter measurements is a well-known challenge in the
smart grid. The solutions offered thus far have been tied to specific
technologies such as batteries or assumptions on data usage. Existing solutions
have also not quantified the loss of benefit (utility) that results from any
such privacy-preserving approach. Using tools from information theory, a new
framework is presented that abstracts both the privacy and the utility
requirements of smart meter data. This leads to a novel privacy-utility
tradeoff problem with minimal assumptions that is tractable. Specifically for a
stationary Gaussian Markov model of the electricity load, it is shown that the
optimal utility-and-privacy preserving solution requires filtering out
frequency components that are low in power, and this approach appears to
encompass most of the proposed privacy approaches.Comment: Accepted for publication and presentation at the IEEE SmartGridComm.
201
Smart Meter Privacy with an Energy Harvesting Device and Instantaneous Power Constraints
A smart meter (SM) periodically measures end-user electricity consumption and
reports it to a utility provider (UP). Despite the advantages of SMs, their use
leads to serious concerns about consumer privacy. In this paper, SM privacy is
studied by considering the presence of an energy harvesting device (EHD) as a
means of masking the user's input load. The user can satisfy part or all of
his/her energy needs from the EHD, and hence, less information can be leaked to
the UP via the SM. The EHD is typically equipped with a rechargeable energy
storage device, i.e., a battery, whose instantaneous energy content limits the
user's capability in covering his/her energy usage. Privacy is measured by the
information leaked about the user's real energy consumption when the UP
observes the energy requested from the grid, which the SM reads and reports to
the UP. The minimum information leakage rate is characterized as a computable
information theoretic single-letter expression when the EHD battery capacity is
either infinite or zero. Numerical results are presented for a discrete binary
input load to illustrate the potential privacy gains from the existence of a
storage device.Comment: To be published in IEEE ICC201
Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints
Developments of seamless mobile services are faced with two broad challenges, systems security and user privacy - access to wireless systems is highly insecure due to the lack of physical boundaries and, secondly, location based services (LBS) could be used to extract highly sensitive user information. In this paper, we describe our work on developing systems which exploit location information to enhance security and services under privacy constraints. We describe two complimentary methods which we have developed to track node location information within production University Campus Networks comprising of large numbers of users. The location data is used to enhance security and services. Specifically, we describe a method for creating geographic firewalls which allows us to restrict and enhance services to individual users within a specific containment area regardless of physical association. We also report our work on LBS development to provide visualization of spatio-temporal node distribution under privacy considerations
- …