Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/1601
Title: Comparative Analysis of Load-Shaping-Based Privacy Preservation Strategies in a Smart Grid
Authors: Kement, Cihan Emre
Gültekin, Hakan
Tavlı, Bülent
Girici, Tolga
Uludağ, Süleyman
Keywords: Goal programming
load shaping
mixed-integer programming (MIP)
mixed-integer quadratic programming (MIQP)
multiobjective programming
nonintrusive load monitoring (NILM)
privacy
renewable energy
smart grid
Publisher: IEEE-Inst Electrical Electronics Engineers Inc
Source: Kement, C. E., Gultekin, H., Tavli, B., Girici, T., & Uludag, S. (2017). Comparative analysis of load-shaping-based privacy preservation strategies in a smart grid. IEEE Transactions on Industrial Informatics, 13(6), 3226-3235.
Abstract: A key enabler for the smart grid is the fine-grained monitoring of power utilization. Although such a mechanism is helpful in the optimization of the whole electricity generation, distribution, and consumption cycle, it also creates opportunities for the potential adversaries in deducing the activities and habits of the subscribers. In fact, by utilizing the standard and readily available tools of nonintrusive load monitoring (NILM) techniques on the metered electricity data, many details of customers' personal lives can be easily discovered. Therefore, prevention of such adversarial exploitations is of utmost importance for privacy protection. One strong privacy preservation approach is the modification of the metered data through the use of on-site storage units in conjunction with renewable energy resources. In this study, we introduce a novel mathematical programming framework to model eight privacy-enhanced power-scheduling strategies inspired and elicited from the literature. We employ all the relevant techniques for the modification of the actual electricity utilization (i.e., on-site battery, renewable energy resources, and appliance load moderation). Our evaluation framework is the first in the literature, to the best of our knowledge, for a comprehensive and fair comparison of the load-shaping techniques for privacy preservation. In addition to the privacy concerns, we consider monetary cost and disutility of the users in our objective functions. Evaluation results show that privacy preservation strategies in the literature differ significantly in terms of privacy, cost, and disutility metrics.
URI: https://ieeexplore.ieee.org/document/7956260
https://hdl.handle.net/20.500.11851/1601
ISSN: 1551-3203
Appears in Collections:Elektrik ve Elektronik Mühendisliği Bölümü / Department of Electrical & Electronics Engineering
Endüstri Mühendisliği Bölümü / Department of Industrial Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection

Show full item record



CORE Recommender

SCOPUSTM   
Citations

15
checked on Apr 13, 2024

WEB OF SCIENCETM
Citations

17
checked on Jan 20, 2024

Page view(s)

68
checked on Apr 15, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.