2014
DOI: 10.1007/978-3-319-10329-7_6
|View full text |Cite
|
Sign up to set email alerts
|

Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…Meter data aggregation (across the time horizon and/or across different meters) is one of the popular queries that the utility company can mainly use for customer billing, creating strategies for mitigating peak demand, and/or creating cost-effective plans for balancing the supply and demand. Other queries included 1) perturbating individual timeseries metered profile [54][55][56][57][58], 2) spectral analysis [59,60], and 3) state estimation in distribution network [61].…”
Section: Local (Distributed) and Non-interactive Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…Meter data aggregation (across the time horizon and/or across different meters) is one of the popular queries that the utility company can mainly use for customer billing, creating strategies for mitigating peak demand, and/or creating cost-effective plans for balancing the supply and demand. Other queries included 1) perturbating individual timeseries metered profile [54][55][56][57][58], 2) spectral analysis [59,60], and 3) state estimation in distribution network [61].…”
Section: Local (Distributed) and Non-interactive Modelsmentioning
confidence: 99%
“…The former implementation mostly focuses on protecting the individual lifestyle embedded in the time dependent energy consumption data where the privacy can be threatened by NILM attack. Some of the previous studies [54][55][56][57][58][59][60] focused specifically on perturbing the timeseries data by adding noise in each time stamp to hide the underlying privacy in the time dependent data stream. For example, Pöhls and Karwe [54] proposed a -differential privacy algorithm to obfuscate the energy usage pattern of a household.…”
Section: Private Meter Including Differential Privacy Combined With E...mentioning
confidence: 99%
“…A number of RS schemes have been presented since the introduction of redactable signatures [11,30]. Most of the general constructions are based on traditional digital signature schemes [3][4][5][6][7][14][15][16][17][18][19][25][26][27]29]. Specifically, the constructions in [11,13,24,30] are based on RSA algorithms, and their security depends on the complexity of large number decomposition.…”
Section: Related Workmentioning
confidence: 99%
“…Redactable signatures have found wide applications in scenarios such as electronic health records systems, social networks, and smart grids. Privacy is a concern on authenticated data publish [3,14,15,17,25,29].…”
Section: Introductionmentioning
confidence: 99%
“…If the subsequent changes stay within those authorised changes, then the signature is still valid and the recipient can verify that no unauthorised changes have happened, thus verifies a reduced integrity, but a much higher one compared to the failed classical signature. For example, this cryptographic tool was used in [71] to set the limit of perturbation on energy consumption values from a Smart Metering Gateway that could be added by a privacy gateway. It also allowed the privacy gateway to inform the user of the allowed changes, i.e., alert if the allowed noise level is too low and thus too fine-grained data is requested.…”
Section: Authenticity Preserving But Privacy-enhancing Processingmentioning
confidence: 99%