Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/1601
Title: | Comparative Analysis of Load-Shaping-Based Privacy Preservation Strategies in a Smart Grid | Authors: | Kement, Cihan Emre Gültekin, Hakan Tavlı, Bülent Girici, Tolga Uludağ, Süleyman |
Keywords: | Goal programming load shaping mixed-integer programming (MIP) mixed-integer quadratic programming (MIQP) multiobjective programming nonintrusive load monitoring (NILM) privacy renewable energy smart grid |
Publisher: | IEEE-Inst Electrical Electronics Engineers Inc | Source: | Kement, C. E., Gultekin, H., Tavli, B., Girici, T., & Uludag, S. (2017). Comparative analysis of load-shaping-based privacy preservation strategies in a smart grid. IEEE Transactions on Industrial Informatics, 13(6), 3226-3235. | Abstract: | A key enabler for the smart grid is the fine-grained monitoring of power utilization. Although such a mechanism is helpful in the optimization of the whole electricity generation, distribution, and consumption cycle, it also creates opportunities for the potential adversaries in deducing the activities and habits of the subscribers. In fact, by utilizing the standard and readily available tools of nonintrusive load monitoring (NILM) techniques on the metered electricity data, many details of customers' personal lives can be easily discovered. Therefore, prevention of such adversarial exploitations is of utmost importance for privacy protection. One strong privacy preservation approach is the modification of the metered data through the use of on-site storage units in conjunction with renewable energy resources. In this study, we introduce a novel mathematical programming framework to model eight privacy-enhanced power-scheduling strategies inspired and elicited from the literature. We employ all the relevant techniques for the modification of the actual electricity utilization (i.e., on-site battery, renewable energy resources, and appliance load moderation). Our evaluation framework is the first in the literature, to the best of our knowledge, for a comprehensive and fair comparison of the load-shaping techniques for privacy preservation. In addition to the privacy concerns, we consider monetary cost and disutility of the users in our objective functions. Evaluation results show that privacy preservation strategies in the literature differ significantly in terms of privacy, cost, and disutility metrics. | URI: | https://ieeexplore.ieee.org/document/7956260 https://hdl.handle.net/20.500.11851/1601 |
ISSN: | 1551-3203 |
Appears in Collections: | Elektrik ve Elektronik Mühendisliği Bölümü / Department of Electrical & Electronics Engineering Endüstri Mühendisliği Bölümü / Department of Industrial Engineering Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
Show full item record
CORE Recommender
SCOPUSTM
Citations
15
checked on Nov 9, 2024
WEB OF SCIENCETM
Citations
17
checked on Nov 9, 2024
Page view(s)
106
checked on Nov 11, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.