Please use this identifier to cite or link to this item:
Title: Comparative Analysis of Load-Shaping-Based Privacy Preservation Strategies in a Smart Grid
Authors: Kement, Cihan Emre
Gültekin, Hakan
Tavlı, Bülent
Girici, Tolga
Uludağ, Süleyman
Keywords: Goal programming
load shaping
mixed-integer programming (MIP)
mixed-integer quadratic programming (MIQP)
multiobjective programming
nonintrusive load monitoring (NILM)
renewable energy
smart grid
Issue Date: Dec-2017
Publisher: IEEE-Inst Electrical Electronics Engineers Inc
Source: Kement, C. E., Gultekin, H., Tavli, B., Girici, T., & Uludag, S. (2017). Comparative analysis of load-shaping-based privacy preservation strategies in a smart grid. IEEE Transactions on Industrial Informatics, 13(6), 3226-3235.
Abstract: A key enabler for the smart grid is the fine-grained monitoring of power utilization. Although such a mechanism is helpful in the optimization of the whole electricity generation, distribution, and consumption cycle, it also creates opportunities for the potential adversaries in deducing the activities and habits of the subscribers. In fact, by utilizing the standard and readily available tools of nonintrusive load monitoring (NILM) techniques on the metered electricity data, many details of customers' personal lives can be easily discovered. Therefore, prevention of such adversarial exploitations is of utmost importance for privacy protection. One strong privacy preservation approach is the modification of the metered data through the use of on-site storage units in conjunction with renewable energy resources. In this study, we introduce a novel mathematical programming framework to model eight privacy-enhanced power-scheduling strategies inspired and elicited from the literature. We employ all the relevant techniques for the modification of the actual electricity utilization (i.e., on-site battery, renewable energy resources, and appliance load moderation). Our evaluation framework is the first in the literature, to the best of our knowledge, for a comprehensive and fair comparison of the load-shaping techniques for privacy preservation. In addition to the privacy concerns, we consider monetary cost and disutility of the users in our objective functions. Evaluation results show that privacy preservation strategies in the literature differ significantly in terms of privacy, cost, and disutility metrics.
ISSN: 1551-3203
Appears in Collections:Elektrik ve Elektronik Mühendisliği Bölümü / Department of Electrical & Electronics Engineering
Endüstri Mühendisliği Bölümü / Department of Industrial Engineering
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection

Show full item record

CORE Recommender


checked on Dec 29, 2022


checked on Feb 4, 2023

Page view(s)

checked on Feb 6, 2023

Google ScholarTM



Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.