On the effectiveness of re-identification attacks and local differential privacy-based solutions for smart meter data
dc.contributor.authorid | 0000-0002-7676-0167 | |
dc.contributor.authorid | N/A | |
dc.contributor.department | Department of Computer Engineering | |
dc.contributor.department | Department of Computer Engineering | |
dc.contributor.kuauthor | Gürsoy, Mehmet Emre | |
dc.contributor.kuauthor | Kaya, Zeynep Sıla | |
dc.contributor.kuprofile | Faculty Member | |
dc.contributor.kuprofile | Undergraduate Student | |
dc.contributor.schoolcollegeinstitute | College of Engineering | |
dc.contributor.schoolcollegeinstitute | College of Engineering | |
dc.contributor.yokid | 330368 | |
dc.contributor.yokid | N/A | |
dc.date.accessioned | 2025-01-19T10:32:22Z | |
dc.date.issued | 2023 | |
dc.description.abstract | Smart meters are increasing the ability to collect, store and share households' energy consumption data. On the other hand, the availability of such data raises novel privacy concerns. Although the data can be de-identified or pseudonymized, a critical question remains: How unique are households' energy consumptions, and is it possible to re-identify households based on partial or imperfect knowledge of their consumption? In this paper, we aim to answer this question, and make two main contributions. First, we develop an adversary model in which an adversary who observes a pseudonymized dataset and knows a limited number of consumption readings from a target household aims to infer which record in the dataset corresponds to the target. We characterize the adversary's knowledge by two parameters: number of known readings and precision of readings. Using experiments conducted on three real-world datasets, we demonstrate that the adversary can indeed achieve high inference rates. Second, we propose a local differential privacy (LDP) based solution for protecting the privacy of energy consumption data. We evaluate the impact of our LDP solution on three datasets using two utility metrics, three LDP protocols, and various parameter settings. Results show that our solution can attain high accuracy and low estimation error under strong privacy guarantees. | |
dc.description.indexedby | WoS | |
dc.description.indexedby | Scopus | |
dc.description.openaccess | hybrid | |
dc.description.publisherscope | International | |
dc.description.sponsors | We gratefully acknowledge the support from The Scientific and Technological Research Council of Turkiye (TUBITAK) under project number 121E303. | |
dc.identifier.doi | 10.5220/0012083300003555 | |
dc.identifier.isbn | 978-989-758-666-8 | |
dc.identifier.issn | 2184-7711 | |
dc.identifier.quartile | N/A | |
dc.identifier.scopus | 2-s2.0-85178562558 | |
dc.identifier.uri | https://doi.org/10.5220/0012083300003555 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14288/26391 | |
dc.identifier.wos | 1072829100009 | |
dc.keywords | Smart meter | |
dc.keywords | Energy consumption | |
dc.keywords | Privacy | |
dc.keywords | Differential privacy | |
dc.keywords | Re-identification Attacks | |
dc.language | en | |
dc.publisher | Scitepress | |
dc.relation.grantno | Scientific and Technological Research Council of Turkiye (TUBITAK) [121E303] | |
dc.source | Proceedings of the 20th International Conference on Security and Cryptography, Secrypt 2023 | |
dc.subject | Computer Science | |
dc.title | On the effectiveness of re-identification attacks and local differential privacy-based solutions for smart meter data | |
dc.type | Conference proceeding |