An algorithmic method for tampering-proof and privacy-preserving smart metering

Dongsheng Li, Yingying Zhao, Yawen Zhang, Qin Lv, Li Shang

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

Abstract

The fast-growing smart meter installation enables utility providers to better track and manage the electricity use of end customers. However, the adoption of smart meter faces several challenges. In particular, collecting fine-grained electricity usage data raises privacy concerns by end customers; and the possibility of data manipulation by malicious customers threatens the data integrity for utility providers. In this article, a tampering-proof and privacy-preserving smart metering method is proposed. The proposed work consists of a new secure multi-party computation method to protect customer privacy and detect malicious data manipulation during real-time data aggregation of smart meter applications. Theoretical analysis proves that privacy preservation for customers and data tamper-proof for utility providers can be guaranteed. Experiments using real-world data demonstrate that the proposed work significantly improves the computation efficiency over a state-of-the-art homomorphic encryption based privacy-preserving smart metering approach, with minimal communication and storage overhead.
Original languageEnglish
Title of host publication 2018 IEEE 16th International Conference on Industrial Informatics (INDIN)
PublisherIEEE
ISBN (Electronic)978-1-5386-4829-2, 978-1-5386-4828-5
ISBN (Print)978-1-5386-4830-8
DOIs
Publication statusPublished - 27 Sept 2018
Event2018 IEEE 16th International Conference on Industrial Informatics (INDIN) - Porto, Portugal
Duration: 18 Jul 201820 Jul 2018

Conference

Conference2018 IEEE 16th International Conference on Industrial Informatics (INDIN)
Country/TerritoryPortugal
CityPorto
Period18/07/1820/07/18

Keywords

  • Encryption
  • Data aggregation
  • Data privacy
  • Real-time systems
  • Smart meters

Fingerprint

Dive into the research topics of 'An algorithmic method for tampering-proof and privacy-preserving smart metering'. Together they form a unique fingerprint.

Cite this