2019 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm) 2019
DOI: 10.1109/smartgridcomm.2019.8909813
|View full text |Cite
|
Sign up to set email alerts
|

Deep Directed Information-Based Learning for Privacy-Preserving Smart Meter Data Release

Abstract: Smart Meters (SMs) are an important component of smart electrical grids, but they have also generated serious concerns about privacy data of consumers. In this paper, we present a general formulation of the privacy-preserving problem in SMs from an information-theoretic perspective. In order to capture the casual time series structure of the power measurements, we employ Directed Information (DI) as an adequate measure of privacy. On the other hand, to cope with a variety of potential applications of SMs data,… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 43 publications
0
8
0
Order By: Relevance
“…This way, the directed information would not put a higher emphasis on information leakage from the past outputs and balances all leakages equally. In the context of smart grid privacy, directed information has been recently used in [125].…”
Section: Smart‐meter Privacy With Demand Shaping and Load Schedulingmentioning
confidence: 99%
“…This way, the directed information would not put a higher emphasis on information leakage from the past outputs and balances all leakages equally. In the context of smart grid privacy, directed information has been recently used in [125].…”
Section: Smart‐meter Privacy With Demand Shaping and Load Schedulingmentioning
confidence: 99%
“…To protect consumers' sensitive information, two main families of SM data privacy enabling techniques have been proposed in the literature: i) SM data manipulation methods [2]- [5]; and ii) demand shaping methods [6]- [12]. In the first family, the SM data are processed and manipulated, e.g., by adding random noise, before sharing that with the UP.…”
Section: Introductionmentioning
confidence: 99%
“…An information-theoretical approach based on distorting useful data was proposed in [1]- [5] where using the Kullback-Leibler(KL) divergence, the privacy risk was quantified as the mutual information between private attribute X and released/shared data Z. In [1] for the Gaussian attributes, they used a numerical procedure (a modification of the steepest descent algorithm) to solve this privacy-distortion trade-off.…”
Section: Introductionmentioning
confidence: 99%
“…The reason could be this fact that generally there is no closed-form solution for the privacy-distortion trade-off. In practical applications, there are several cases (such as those related to smart meters [5]) where attributes come from a continuous range but with the non-Gaussian distribution. Therefore, the natural challenge raised here is that how the PPAN model can be applied and evaluated in these cases?…”
Section: Introductionmentioning
confidence: 99%