Privacy-Friendly Energy-Metering via Homomorphic Encryption

نویسندگان

  • Flavio D. Garcia
  • Bart Jacobs
چکیده

The first part of this paper discusses developments wrt. smart (electricity) meters (simply called E-meters) in general, with emphasis on security and privacy issues. The second part will be more technical and describes protocols for secure communication with E-meters and for fraud detection (leakage) in a privacy-preserving manner, using a combination of Paillier’s additive homomorphic encryption and additive secret sharing.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture

We propose a privacy-friendly smart metering architecture which is yet flexible enough to serve various future third party energy services. Our secure architecture may be deployed as a cloud service and allows processing of SQL queries on encrypted measurements, providing aggregated results in a most flexible manner. A combination of homomorphic encryption and homomorphic MACs provides confiden...

متن کامل

An efficient privacy-preserving comparison protocol in smart metering systems

In smart grids, providing power consumption statistics to the customers and generating recommendations for managing electrical devices are considered to be effective methods that can help to reduce energy consumption. Unfortunately, providing power consumption statistics and generating recommendations rely on highly privacy-sensitive smart meter consumption data. From the past experience, we se...

متن کامل

Energy Savings in Privacy-Preserving Computation Offloading with Protection by Homomorphic Encryption

This paper investigates energy savings on mobile systems in privacy-preserving computation offloading. Offloading computation-intensive programs to servers can save energy but data must be protected for privacy concerns. The protection schemes must guarantee operations performed on the protected data remain meaningful and the results are still acceptable. The protection cannot require excessive...

متن کامل

Privacy-Preserving Clustering Using Representatives over Arbitrarily Partitioned Data∗

The challenge in privacy-preserving data mining is avoiding the invasion of personal data privacy. Secure computation provides a solution to this problem. With the development of this technique, fully homomorphic encryption has been realized after decades of research; this encryption enables the computing and obtaining results via encrypted data without accessing any plaintext or private key in...

متن کامل

Privacy protection in electronic education based on polymorphic pseudonymization

In [13] Dutch government proposes an identity scheme supporting personal data exchange of pupils with private e-textbook publishers. This design propagates sharing personal numbers of pupils among private parties violating the data minimisation principle in privacy laws. We describe a privacy friendly alternative, giving pupils (and parents) control on exchange of their personal data. Three gen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010