Menu
Home
Log in / Register

 
Home arrow Computer Science arrow Social Informatics
< Prev   CONTENTS   Next >

6 Related Work

Smart meters report the power consumption of a building e.g. every 15 minutes to the energy provider. However, even this information is sufficient to allow the energy provider an overall footprinting of the household. To circumvent this problem, technologies such as homomorphic encryption are used. The basic idea of such systems is that multiple parties, e.g., the smart meters located in one street, cooperate in order to calculate the sum of consumed power within this street. For the energy provider this information is still sufficient in order to control energy production. Secure multiparty computation using homomorphic encryption [GJ11] now guarantees that neither the individual smart meters nor the energy provider learn about the energy consumption of single households, as all computations are performed on encrypted values. This type of work is an example where privacy can be increased by aggregation.

7 Conclusion and Future Work

Energy management systems (EMS) are needed in smart buildings to decrease energy consumption. However, there is a conflict between the need for finegrained energy measurements and the right on personal privacy of affected persons. We analyzed strategies for designing privacy preservation in systems processing personal data and assessed their applicability on EMS. We then outlined our approach which combines the features of attribute-based encryption to enforce strong access control and of virtualization to gain isolation of processes handling personal data. A first evaluation of our prototype's performance showed that it is easily capable to handle the energy measurements of the installation in our building. Furthermore, a discussion of security features showed the clear advantages of our system compared to a centralized system.

Up to now we addressed mechanisms that increase privacy properties of an EMS. However, to achieve compliance to privacy regulations further properties, such as informing a user and demonstrating the system's abidance to legal requirements need to be addressed, i.e. to have no secret surveillance functions. We plan to address this issue based on our preliminary work on Trusted Computing and attestation technologies [KDC14].

Acknowledgments. This work has been supported by the German Federal Ministry of Education and Research, projects IDEM (grant 01LY1217C) and BaaS (grant 01IS13019G) as well as by the European Commission, FP7 project EINS (grant 288021).

References

[BSW07] Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proc. of the 2007 IEEE Symposium on Security and Privacy (2007)

[Cit12] Citrix Systems Inc., The Xen Project. Website (2012). xen.org/ (last accessed on July 09, 2013)

[Fis07] Fischer, C.: Influencing electricity consumption via consumer feedback. In: Proc. of the ECEEE 2007 Summer Study, June 2007. tips-project.org/download/TIPS DP8 Fischer.pdf (last accessed on July 08, 2014)

[fSI11] International Organization for Standardization (ISO). Energy management systems requirements with guidance for use (iso 50001:2011), June 2011. iso.org/iso/home/standards/management-standards/iso50001. htm (last accessed on September 16, 2014)

[GJ11] Garcia, F.D., Jacobs, B.: Privacy-friendly energy-metering via homomorphic encryption. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol. 6710, pp. 226–238. Springer, Heidelberg (2011)

[Hoe12] Hoepman, J.-H.: Privacy design strategies (2012). arxiv.org/abs/ 1210.6621 (last accessed on July 08, 2014)

[KDC14] Kinkelin, H., Dorner, M., Carle, G.: Lokale Integrit¨atsverifikation von Systemen durch Java Smart Cards. Tagungsband des 24. SmartCard Workshop,

February 2014

[Par95] The European Parliament. Directive 95/46/EC. Website, November 1995. eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:

31995L0046:en:HTML (last accessed on July 08, 2014)

[RW10] Rutkowska, J., Wojtczuk, R.: Qubes OS Architecture Version 0.3. White paper, Invisible Things Lab, January 2010

[SW04] Sahai, A., Waters, B.: Fuzzy identity based encryption. Cryptology ePrint Archive, Report 2004/086 (2004). eprint.iacr.org/2004/086 (last accessed on July 08, 2014)

[SZ11] Amt fu¨r Hochbauten Stadt Zu¨rich: Schlussbericht Nutzerverhalten beim Wohnen. Website (2011). mehralswohnen.ch/fileadmin/ download/1107 Bericht Nutzerverhalten.pdf (last accessed on September 18, 2014)

[V. 09] Bu¨rger, V.: O¨ ko-Institut. Identifikation, Quantifizierung und Systema-

tisierung technischer und verhaltensbedingter Stromeinsparpotenziale privater Haushalte. Study (2009)

 
Found a mistake? Please highlight the word and press Shift + Enter  
< Prev   CONTENTS   Next >
 
Subjects
Accounting
Business & Finance
Communication
Computer Science
Economics
Education
Engineering
Environment
Geography
Health
History
Language & Literature
Law
Management
Marketing
Philosophy
Political science
Psychology
Religion
Sociology
Travel