iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/978-3-319-59870-3_12
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data | SpringerLink
Skip to main content

Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10343))

Included in the following conference series:

Abstract

Privacy-preserving data mining technologies have been studied extensively, and as a general approach, du Pin Calmon and Fawaz have proposed a data distortion mechanism based on a statistical inference attack framework. This theory has been extended by Erdogdu et al. to time-series data and been applied to energy disaggregation of smart-meter data. However, their theory assumes both smart-meter data and sensitive appliance state information are available when applying the privacy-preserving mechanism, which is impractical in typical smart-meter systems where only the total power usage is available. In this paper, we extend their approach to enable the application of a privacy-utility tradeoff mechanism to such practical applications. Firstly, we define a system model which captures both the architecture of the smart-meter system and the practical constraints that the power usage of each appliance cannot be measured individually. This enables us to formalize the tradeoff problem more rigorously. Secondly, we propose a privacy-utility tradeoff mechanism for that system. We apply a linear Gaussian model assumption to the system and thereby reduce the problem of obtaining unobservable information to that of learning the system parameters. Finally, we conduct experiments of applying the proposed mechanism to the power usage data of an actual household. The experimental results show that the proposed mechanism works partly effectively; i.e., it prevents usage analysis of certain types of sensitive appliances while at the same time preserving that of non-sensitive appliances.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    In Recital 7 of the GDPR.

  2. 2.

    Examples of distortion function include the \(L_1\) norm, \(L_2\) norm and more generally \(L_p\) norm.

  3. 3.

    http://www.theowl.com/index.php/energy-monitors/standalone-monitors/owl-usb/.

  4. 4.

    Strictly speaking, the number of appliances used in the household is 18 because a refrigerator is also used. However, it was always ON throughout the data collection and therefore we regarded it as a part of the background noise.

  5. 5.

    http://cvxr.com/cvx/.

References

  1. Alcalá, J., Parson, O., Rogers, A.: Detecting anomalies in activities of daily living of elderly residents via energy disaggregation and cox processes. In: BuildSys 2015. ACM (2015)

    Google Scholar 

  2. Alcalá, J., Ureña, J., Hernández, A.: Activity supervision tool using non-intrusive load monitoring systems. In: ETFA 2015. IEEE (2015)

    Google Scholar 

  3. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  4. Basciftci, Y.O., Wang, Y., Ishwar, P.: On privacy-utility tradeoffs for constrained data release mechanisms. In: ITA 2016. IEEE (2016)

    Google Scholar 

  5. Boyd, S., Vandenberghe, L.: Convex Optimization. Cambridge University Press, Cambridge (2004)

    Book  MATH  Google Scholar 

  6. Boyd, S., Vandenberghe, L., Grant, M.: Advances in convex optimization. In: Chinese Control Conference 2006. IEEE (2006)

    Google Scholar 

  7. Duhigg, C.: How companies learn your secrets. The New York Times Magazine (2012)

    Google Scholar 

  8. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). doi:10.1007/11787006_1

    Chapter  Google Scholar 

  9. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008). doi:10.1007/978-3-540-79228-4_1

    Chapter  Google Scholar 

  10. Eisenberg, B., Sullivan, R.: Why is the sum of independent normal random variables normal? Math. Mag. 81(5), 362–366 (2008)

    MATH  Google Scholar 

  11. Erdogdu, M.A., Fawaz, N.: Privacy-utility trade-off under continual observation. In: ISIT 2015, pp. 1801–1805. IEEE (2015)

    Google Scholar 

  12. Erdogdu, M.A., Fawaz, N., Montanari, A.: Privacy-utility trade-off for time-series with application to smart-meter data. In: AAAI 2015 Workshop on Computational Sustainability (2015)

    Google Scholar 

  13. Ghahramani, Z., Jordan, M.I.: Factorial hidden Markov models. Mach. Learn. 29(2/3), 245–273 (1997)

    Article  MATH  Google Scholar 

  14. Guo, Z., Wang, Z.J., Kashani, A.: Home appliance load modmodel from aggregated smart meter data. IEEE Trans. Power Syst. 30(1), 254–262 (2015)

    Article  Google Scholar 

  15. Hart, G.: Nonintrusive appliance load monitoring. Proc. IEEE 80(12), 1870–1891 (1992)

    Article  Google Scholar 

  16. Kalogridis, G., Denic, S.Z.: Data mining and privacy of personal behaviour types in smart grid. In: ICDMW 2011. IEEE (2011)

    Google Scholar 

  17. Kelly, J., Knottenbelt, W.: Neural NILM: deep neural networks applied to energy disaggregation. In: BuildSys 2015. ACM (2015)

    Google Scholar 

  18. Kim, H., Marwah, M., Arlitt, M., Lyon, G., Han, J.: Unsupervised disaggregation of low frequency power measurements. In: SDM 2011, pp. 747–758. SIAM (2011)

    Google Scholar 

  19. Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: ICDE 2007, pp. 106–115. IEEE (2007)

    Google Scholar 

  20. Li, S., Khisti, A., Mahajan, A.: Privacy-optimal strategies for smart metering systems with a rechargeable battery. In: ACC 2016. IEEE (2016)

    Google Scholar 

  21. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: L-diversity: privacy beyond k-anonymity. In: 22nd International Conference on Data Engineering, ICDE 2006, p. 24. IEEE (2006). doi:10.1109/icde.2006.1

  22. Parson, O., Ghosh, S., Weal, M., Rogers, A.: Non-intrusive load monitoring using prior models of general appliance types. In: AAAI 2012, pp. 356–362 (2012)

    Google Scholar 

  23. Parson, O., Ghosh, S., Weal, M., Rogers, A.: An unsupervised training method for non-intrusive appliance load monitoring. Artif. Intell. 217, 1–19 (2014)

    Article  MATH  Google Scholar 

  24. Pillitteri, V.Y., Brewer, T.L.: Guidelines for smart grid cybersecurity. Internal Report NISTIR 7628 Revision 1, National Institute of Standards and Technology (2014)

    Google Scholar 

  25. du Pin Calmon, F., Fawaz, N.: Privacy against statistical inference. In: Allerton 2012. IEEE (2012)

    Google Scholar 

  26. Quinn, E.L.: Smart metering and privacy: Existing laws and competing policies. SSRN Electron. J. (2009). doi:10.2139/ssrn.1462285

  27. Rajagopalan, S.R., Sankar, L., Mohajer, S., Poor, H.V.: Smart meter privacy: a utility-privacy framework. In: SmartGridComm 2011. IEEE (2011)

    Google Scholar 

  28. Salamatian, S., Zhang, A., du Pin Calmon, F., Bhamidipati, S., Fawaz, N., Kveton, B., Oliveira, P., Taft, N.: Managing your private and public data: Bringing down inference attacks against your privacy. IEEE J. Sel. Top. Sig. Proces. 9(7), 1240–1255 (2015)

    Google Scholar 

  29. Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010–1027 (2001)

    Article  Google Scholar 

  30. Schneier, B.: Data and goliath: The hidden battles to collect your data and control your world. W. W. Norton & Company (2015)

    Google Scholar 

  31. Song, H., Kalogridis, G., Fan, Z.: Short paper: time-dependent power load disaggregation with applications to daily activity monitoring. In: WF-IoT 2014. IEEE (2014)

    Google Scholar 

  32. Sweeney, L.: k-anonymity: A model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  33. Tan, O., Gunduz, D., Poor, H.V.: Increasing smart meter privacy through energy harvesting and storage devices. IEEE J. Sel. Areas Commun. 31(7), 1331–1341 (2013)

    Article  Google Scholar 

  34. Xiao, X., Tao, Y.: m-invariance: towards privacy preserving re-publication of dynamic datasets. In: SIGMOD 2007, pp. 689–700. ACM (2007)

    Google Scholar 

  35. Yang, L., Chen, X., Zhang, J., Poor, H.V.: Cost-effective and privacy-preserving energy management for smart meters. IEEE Trans. Smart Grid 6(1), 486–495 (2015)

    Article  Google Scholar 

  36. Yang, W., Li, N., Qi, Y., Qardaji, W., McLaughlin, S., McDaniel, P.: Minimizing private data disclosures in the smart grid. In: ACM CCS 2012, pp. 415–427. ACM (2012)

    Google Scholar 

  37. Yao, J., Venkitasubramaniam, P.: The privacy analysis of battery control mechanisms in demand response: revealing state approach and rate distortion bounds. IEEE Trans. Smart Grid 6(5), 2417–2425 (2015)

    Article  Google Scholar 

Download references

Acknowledgments

We would like to thank the anonymous referees for their valuable comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mitsuhiro Hattori .

Editor information

Editors and Affiliations

Appendices

A Computability and Convexity of the Optimization Problem

1.1 A.1 Computability

We show that both the objective function (1) and constraint function (2) can be computed respectively and therefore the optimization problem (3) is solvable, assuming \(p_{{\varvec{X}}^*, Y}\) is known.

We start with (1). First note that \({\varvec{X}} \rightarrow Y \rightarrow Z\) forms the Markov chain because the smart-meter data Y depends on the appliance states \({\varvec{X}}\) and the distorted data Z depends on the smart-meter data Y. Then,

$$\begin{aligned} p_{Z | {\varvec{X}}^*} (z | {\varvec{x}}^*) = \int _{\mathcal {Y}} p_{Z|Y}(z|y) p_{Y|{\varvec{X}}^*} (y|{\varvec{x}}^*) dy. \end{aligned}$$
(11)

Here,

$$\begin{aligned} p_{Y|{\varvec{X}}^*} (y|{\varvec{x}}^*) = \frac{p_{{\varvec{X}}^*, Y}({\varvec{x}}^*, y)}{P_{{\varvec{X}}^*}({\varvec{x}}^*)}, \end{aligned}$$
(12)
$$\begin{aligned} P_{{\varvec{X}}^*}({\varvec{x}}^*) = \int _{\mathcal {Y}} p_{{\varvec{X}}^*, Y} ({\varvec{x}}^*, y) dy. \end{aligned}$$
(13)

Also,

$$\begin{aligned} p_{Z} (z) = \sum _{{\varvec{x}}^* \in {\varvec{\mathcal {X}}}^*} P_{{\varvec{X}}^*} ({\varvec{x}}^*) p_{Z | {\varvec{X}}^*} (z | {\varvec{x}}^*). \end{aligned}$$
(14)

Therefore, we can confirm that all the members in (1) can be computed from \(p_{{\varvec{X}}^*, Y}\) and \(p_{Z|Y}\).

As for (2), we can easily confirm the computability by seeing that

$$\begin{aligned} p_{Y}(y) = \sum _{{\varvec{x}}^* \in {\varvec{\mathcal {X}}}^*} p_{{\varvec{X}}^*, Y}({\varvec{x}}^*, y). \end{aligned}$$
(15)

1.2 A.2 Convexity

We additionally note here that (3) is a convex optimization problem. This is because, as with [25], the objective function and the constraint function are convex functions of the optimization variable \(p_{Z|Y}\).

Convex optimization has several desirable properties. From an analytical viewpoint, it is assured that any local minimum is a global minimum and finding a global minimum is therefore reduced to finding a local minimum [5]. From a practical viewpoint, efficient algorithms such as interior-point methods have been proposed, and software libraries are available [6].

B Modification to Discrete Power Data

In Sect. 3.2 we considered the case where the smart-meter data and distorted data are continuous. In practical situations, however, it is possible that the smart-meter data is quantized to discrete levels. Indeed, as we describe in detail in Sect. 4, we use discrete power data in our experiment that has been quantized to a resolution of 7 W. It is therefore required to modify the optimization problem (3) to accommodate such cases. We describe here the discretized version of the optimization problem.

Let \(\tilde{Y} \in \tilde{\mathcal {Y}}\) be a discrete random variable representing the quantized smart-meter data and \(\tilde{Z} \in \tilde{\mathcal {Z}}\) represent the distorted data, where \(\tilde{\mathcal {Y}}\) and \(\tilde{\mathcal {Z}}\) are finite sets. Let \(d: \tilde{Y} \times \tilde{Z} \rightarrow \mathbb {R}^+\) be some distortion function. Then the optimization problem in (3) becomes

$$\begin{aligned} \min _{p_{\tilde{Z}|\tilde{Y}}} I({\varvec{X}}^* ; \tilde{Z}) \quad \text {subject to } E_{\tilde{Y}, \tilde{Z}} [d(\tilde{Y}, \tilde{Z})] \le \delta , \end{aligned}$$
(16)

where

$$\begin{aligned} I({\varvec{X}}^*; \tilde{Z}) = \sum _{{\varvec{x}}^* \in {\varvec{\mathcal {X}}}^*} \sum _{\tilde{z} \in \tilde{\mathcal {Z}}} P_{{\varvec{\mathcal {X}}}} ({\varvec{x}}^*) P_{\tilde{Z}|{\varvec{X}}^*} (\tilde{z}|{\varvec{x}}^*) \log \frac{P_{\tilde{Z}|{\varvec{X}}^*} (\tilde{z}|{\varvec{x}}^*)}{P_{\tilde{Z}} (\tilde{z})}, \end{aligned}$$
(17)
$$\begin{aligned} E_{\tilde{Y}, \tilde{Z}} [d(\tilde{Y}, \tilde{Z})] = \sum _{\tilde{y} \in \tilde{\mathcal {Y}}} \sum _{\tilde{z} \in \tilde{\mathcal {Z}}} P_{\tilde{Z} | \tilde{Y}} (\tilde{z} | \tilde{y}) P_{\tilde{Y}} (\tilde{y}) d(\tilde{y}, \tilde{z}). \end{aligned}$$
(18)

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Hattori, M., Hirano, T., Matsuda, N., Shimizu, R., Wang, Y. (2017). Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data. In: Pieprzyk, J., Suriadi, S. (eds) Information Security and Privacy. ACISP 2017. Lecture Notes in Computer Science(), vol 10343. Springer, Cham. https://doi.org/10.1007/978-3-319-59870-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-59870-3_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-59869-7

  • Online ISBN: 978-3-319-59870-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics