DFTMicroagg: a dual-level anonymization algorithm for smart grid data
نویسندگان
چکیده
Abstract The introduction of advanced metering infrastructure (AMI) smart meters has given rise to fine-grained electricity usage data at different levels time granularity. AMI collects high-frequency daily energy consumption that enables utility companies and aggregators perform a rich set grid operations such as demand response, monitoring, load forecasting many more. However, the privacy concerns associated with been raised. Existing studies on anonymization for focused direct application perturbation algorithms, microaggregation, protect consumers. In this paper, we empirically show reliance microaggregation alone is not sufficient data. Therefore, propose DFTMicroagg algorithm provides dual level improve privacy. leverages benefits discrete Fourier transform (DFT) provide additional layer protection. We evaluated our two publicly available datasets millions readings. Experimental results based clustering analysis using k-Means, classification via k-nearest neighbor (kNN) mean hourly forecast Seasonal Auto-Regressive Integrated Moving Average eXogenous (SARIMAX) factors model further proved applicability proposed method. Our approach more flexibility control protection their published
منابع مشابه
Perturbed Anonymization: Two Level Smart Privacy for Lbs Mobile Users
The use of smart mobile devices like tablets, smart phones and navigational gadgets provide most promising communication and better services to mobile users. Location Based Services (LBS) have become very common in recent years. Mobile users submit their location dependent queries to the untrusted LBS server to acquire a particular service. Ideally, user’s personal information such as location ...
متن کاملAn Efficient Layer 2 Routing Algorithm in a Dual-ring Bridged Network for Smart Grid
In a dual-ring bridged network, an RSTP algorithm bridge may send packets to other bridges inefficiently. An RSTP algorithm has only one spanning tree for data communication. A redundant link in a dual-ring bridged network is wasteful and inefficient. Thus, we propose an algorithm that allocates two spanning trees to two separate rings of the dual-ring using PVST (Per VLAN Spanning Tree). After...
متن کاملDesigning a smart algorithm for determining stock exchange signals by data mining
One of the most important problems in modern finance is finding efficient ways to summarize and visualize the stock exchange market. This research proposes a smart algorithm by means of valuable big data that is generated by stock exchange market and different kinds of methodology to present a smart model.In this paper, we investigate relationships between the data and access to their lat...
متن کاملSmart Grid Unit Commitment with Considerations for Pumped Storage Units Using Hybrid GA-Heuristic Optimization Algorithm
A host of technologies has been developed to achieve these aims of the smart grid. Some of these technologies include plug-in electric vehicle, demand response program, energy storage system and renewable distributed generation. However, the integration of the smart grid technologies in the power system operation studies such as economic emission unit commitment problem causes two major challen...
متن کاملAn Optimal Real-time Pricing Algorithm for the Smart Grid: A Bi-level Programming Approach
This paper proposes an improved approach to our previous work [11]. [11] uses Stackelberg game to model the interactions between electricity retailer and its customers and genetic algorithms are used to obtain the Stackelberg Equilibrium (SE). In this paper, we propose a bi-level programming model by considering benefits of the electricity retailer (utility company) and its customer. In the upp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Information Security
سال: 2022
ISSN: ['1615-5262', '1615-5270']
DOI: https://doi.org/10.1007/s10207-022-00612-8