Privacy-preserving Data-aggregation for Internet-of-things in Smart Grid



Similar documents
Approaches for privacy-friendly Smart Metering: Architecture using homomorphic encryption and homomorphic MACs

Privacy-Preserving Aggregation of Time-Series Data

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Big Data - Security and Privacy

Aircloak Analytics: Anonymized User Data without Data Loss

NSF Workshop on Big Data Security and Privacy

Secure Computation Martin Beck

preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

DATA MINING - 1DL360

Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

ZQL. a cryptographic compiler for processing private data. George Danezis. Joint work with Cédric Fournet, Markulf Kohlweiss, Zhengqin Luo

Privacy & Security of Mobile Cloud Computing (MCC)

Challenges of Data Privacy in the Era of Big Data. Rebecca C. Steorts, Vishesh Karwa Carnegie Mellon University November 18, 2014

A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

Big Data Big Security Problems? Ivan Damgård, Aarhus University

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

Associate Prof. Dr. Victor Onomza Waziri

CS346: Advanced Databases

Big data coming soon... to an NSI near you. John Dunne. Central Statistics Office (CSO), Ireland

(Big) Data Anonymization Claude Castelluccia Inria, Privatics

METER DATA MANAGEMENT FOR THE SMARTER GRID AND FUTURE ELECTRONIC ENERGY MARKETPLACES

Lecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads

Aircloak Anonymized Analytics: Better Data, Better Intelligence

Wireless Sensor Networks Chapter 14: Security in WSNs

ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT

Information Technology Policy

Data Integrity Check using Hash Functions in Cloud environment

Cryptography: Authentication, Blind Signatures, and Digital Cash

Computer Security (EDA263 / DIT 641)

CPSC 467b: Cryptography and Computer Security

Cloud Data Storage Services Considering Public Audit for Security

Cloud and Mobile Computing

Journal of Electronic Banking Systems

Secure Large-Scale Bingo

An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud

RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES

PRIVACY PRESERVING PUBLIC AUDITING FOR SECURED DATA STORAGE IN CLOUD USING BLOCK AUTHENTICATION CODE

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

Paillier Threshold Encryption Toolbox

Security and Privacy in Big Data, Blessing or Curse?

SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS

Global Soft Solutions JAVA IEEE PROJECT TITLES

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt University of Zurich

VoteID 2011 Internet Voting System with Cast as Intended Verification

A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

How do we define cloud computing?

Victor Shoup Avi Rubin. Abstract

Teradata and Protegrity High-Value Protection for High-Value Data

Computing on Encrypted Data

IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT

Integrating the customer experience through unifying software - The Microsoft Vision

Lecture 9 - Message Authentication Codes

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

Lecture 7: Privacy and Security in Mobile Computing. Cristian Borcea Department of Computer Science NJIT

White Paper. The Definition of Persona Data: Seeing the Complete Spectrum

Ausgrid Privacy Policy

V1.4. Spambrella Continuity SaaS. August 2

IoT Security Platform

Enabling Public Auditing for Secured Data Storage in Cloud Computing

Privacy in e-ticketing & e-identity

Digital Identity Management

Secure cloud access system using JAR ABSTRACT:

3-6 Toward Realizing Privacy-Preserving IP-Traceback

IJCSIET-ISSUE5-VOLUME1-SERIES1 Page 1

Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage

E-Democracy and e-voting

Application Design and Development

Elevating Data Center Performance Management

Enabling the SmartGrid through Cloud Computing

DATA MINING - 1DL105, 1DL025

Transcription:

Privacy-preserving Data-aggregation for Internet-of-things in Smart Grid Aakanksha Chowdhery Postdoctoral Researcher, Microsoft Research ac@microsoftcom Collaborators: Victor Bahl, Ratul Mahajan, Frank Mcsherry, Abhradeep Thakurta

Smart meters/devices in home Utility/ Third Party Measure fine-grained energy use Collected data transmitted by smart meter & aggregated at Energy data center data consumer: utility/third party

Smart meter data enables Billing - with time-of-use pricing Fraud detection Demand response Load monitoring and forecasting Power outage notifications Energy Efficiency analysis & optimization etc 3

Privacy Concerns 4

Privacy Concerns What can your smart meter tell? - Did you leave late for work? - Did you leave your child home alone? - Were you home during your sick leave? - Did you watch the game last night? (Molina-Markham et al, Private Memoirs of Smart Meters, BuildSys 10) 5

Privacy Concerns Energy Industry maximize revenues Third-party companies - target marketing material eg building & insulation Hackers real-time mass surveillance, burglary Data Privacy compromised if leak personally identifiable information/attributes 6

Current Privacy Policies Under Fair Information Practice Principles at Federal Detailed readings - sensitive Requires consumer awareness & consent California Public Utilities protect smart meter data (rulings in 2011 & April 2014) Utilities can t sell customer s personal/consumption data Third parties can t use it for secondary commercial use 7

Pseudo-nymizing smart meter data Separate consumption trace & household identity 8

Naïve Pseudo-nymizing is fragile Correlate two data sources overlapping in time Attack: Linking by anomaly Jawurek et al, Smart Metering de-pseudonymization, ACSAC 2011 9

Privacy-enhancing Technologies Prevent privacy violations before they occur Pseudo-nymizing Trusted third party Aggregates Adds noise (differential privacy) Cryptographic computation 10

System Model Smart Meter 1 Smart Meter 2 query Utility/ Third Party Smart Meter N Energy Data Center: Private/Public Cloud 11

Trusted third party aggregates Smart Meter 1 Smart Meter 2 Energy Data Center Smart Meter N Trusted link Gateway/ Aggregator query Utility/ Third Party Gateway aggregates the high-frequency readings No private data items sent, yet some individual identifiable 12

Trusted third party adds noise Smart Meter 1 Smart Meter 2 Energy Smart Meter N Trusted link Gateway/ Aggregator Add noise Data Center query Utility/ Third Party Differential privacy - add random noise to aggregate 13

Differential privacy (intuition) A mechanism is differentially private if every output is produced with similar probability whether any given input is included or not A B C Similar output distributions F(x) F(x) A B C D Bounded risk for D if she includes her data! Cynthia Dwork Differential Privacy ICALP 2006 14

Achieving differential privacy A simple differentially private mechanism Smart Meter 1 Smart Meter 2 Smart Meter N Trusted link Gateway/ Aggregator Tell me f(x) f(x)+noise Utility/ Third Party How much noise should one add? 15

Achieving differential privacy Function sensitivity (intuition): Maximum effect of any single input on the output Aim: Need to conceal this effect to preserve privacy Example: Computing the aggregate mean of the readings has low sensitivity Any single user s reading does not affect the final mean by too much Calculating the maximum reading has high sensitivity 16

Achieving differential privacy Function sensitivity (intuition): Maximum effect of any single input on the output Aim: Need to conceal this effect to preserve privacy Example: SUM over input elements drawn from [0, M] X 1 X 2 X 3 X 4 SUM Sensitivity = M Max effect of any input element is M 17

Achieving differential privacy A simple differentially private mechanism Smart Meter 1 Smart Meter 2 Smart Meter N Trusted link Gateway/ Aggregator Tell me f(x) f(x)+noise Intuition: Noise needed to mask the effect of a single input Utility/ Third Party 18

Privacy-enhancing Technologies Prevent privacy violations before they occur Pseudo-nymizing Trusted third party Aggregates Adds noise (differential privacy) Cryptographic computation 19

Cryptographic Computation Strongest privacy/security guarantee Aggregate via homomorphic encryption The product of encryptions of two messages is an encryption of the sum of the two messages Paillier cryptosystem - additively homomorphic Enables spatial/temporal aggregation Erkin et al Private computation of spatial and temporal power consumption with smart meters, ACNS 2012 20

Cryptographic Computation Smart Meter 1 Smart Meter 2 One Paillier public key Each smart meter encrypts Gateway/ Aggregator Smart Meter N Aggregator combines the encrypted readings Can decrypt the sum of readings Can t decrypt the individual (modified Paillier scheme) Erkin et al Private computation of spatial and temporal power consumption with smart meters, ACNS 2012 21

Cryptographic Computation Time-of-use pricing & billing require individual meter readings? Integrity certify meter readings and bill calculations? 22

Cryptographic Computation Rial et al Privacy- Preserving Smart Metering; WPES 2011 23

Cryptographic Computation Time-of-use pricing & billing require individual meter readings? No use homomorphic encryption Integrity certify meter readings and billing calculations Use zero-knowledge proof Smart meter proves to the utility (the verifier) that the reading and calculation is true, Doesn t reveal individual readings Rial et al Privacy-Preserving Smart Metering; WPES 2011 24

Recap: Privacy-enhancing Technologies Smart Meter 1 Smart Meter 2 Gateway/ Aggregator Energy Data Center Smart Meter N query Utility/ Third Party Pseudo-nymizing Trusted third party aggregates & adds noise Cryptographic computation 25

Implementation Overheads Smart meter: low computation power & memory No overhead with Pseudo-nymizing & trusted third party Additional computation/hardware for cryptographic Communication bandwidth Pseudo-nymizing < Trusted third party <= Cryptographic Computation at the aggregator Increases with the complexity of the protocol Scalability 26

Conclusions Smart-meter data can be privacy intrusive Personally identifiable information Time granularity matters Anonymizing the readings is not sufficient Privacy-enhancing technologies can prevent privacy violations before they occur Trusted third party can aggregate the data & add noise using differential privacy Cryptographic computation enables verifiable spatiotemporal aggregations 27

THANK YOU! 28