Britain's smart meter programme: A case study in privacy by design
@article{Brown2013BritainsSM, title={Britain's smart meter programme: A case study in privacy by design}, author={Ian Brown}, journal={International Review of Law, Computers \& Technology}, year={2013}, volume={28}, pages={172 - 184} }
Following requirements in the 1996 EU Energy Efficiency Directive, member states are developing programmes to encourage the installation of ‘smart’ power meters that record much larger quantities of data about power usage than traditional meters. These data can reveal a great deal of information about individual household activity, leading privacy regulators to call for privacy to be ‘designed in’ to these systems. The British smart metering programme has given some attention to this privacy by…
36 Citations
Identifying consumer requirements as an antidote to resistance to smart meters
- Business, EngineeringIEEE PES Innovative Smart Grid Technologies, Europe
- 2014
Energy efficiency has been the primary motivation for the introduction of smart meters. But current smart metering projects are facing barriers to adoption from consumers, arising from the failure of…
The legislative initiatives for smart metering as a precondition to zero energy: the case of Greece
- Engineering
- 2015
Energy efficiency is an integral part of the European energy strategy and the introduction of a sound legal framework is of utmost importance for the success of this policy. The building sector…
Information Feedback, Behaviour and ‘Smart Meters’: Using behavioural economics to improve our knowledge about the potential effectiveness of Smart Meters to use electricity efficiently
- Engineering
- 2014
As part of the development of the European electricity grid, the EU has decided that ‘Smart Meters’ should be installed in 80% of the households of the EU by 2020. It is expected that this will lead…
Legal Protection of Personal Data in Smart Grid and Smart Metering Systems from the European Perspective
- Engineering
- 2015
Smart grids are slowly becoming the future of worldwide energy generation and distribution and they promise, among other things, numerous environmental, and energy efficiency benefits to society. At…
Regulating intersectional activity: privacy and energy efficiency, laws and technology
- Law
- 2017
ABSTRACT Using a case study, this paper explores the extent to which one area of law (privacy and data protection) can intersect with, and be challenged by, proposals for delivery of another goal –…
Security and Privacy in Smart Grid Demand Response Systems
- Computer ScienceSmartGridSec
- 2014
This paper builds on the preliminary work in this field to define a set of security and privacy goals for DR systems and to identify appropriate and realistic adversary models and presents a preliminary proposal for an enhanced architecture which includes a trusted third party based on approaches and technologies from the field of Trusted Computing.
Conducting a Smarter Grid: Reflecting on the Power and Security Behind Smart Grids with Foucault
- Engineering
- 2016
A smart grid is about the delivery of power, but there is power in and behind a smart grid as well. This chapter takes stock of the current debate and the power relations behind smart grids by…
Privacy Risk Analysis
- Computer SciencePrivacy Risk Analysis
- 2016
This book is an excellent resource for anyone developing and/or currently running a risk analysis as it defines the notions, requirements, and main steps of conducting a privacy risk analysis.
Towards an integrated privacy protection framework for IoT: contextualising regulatory requirements with industry best practices
- Computer ScienceLiving in the Internet of Things (IoT 2019)
- 2019
This paper lays the foundations for the future development of a framework for addressing privacy issues for IoT applications based on both the experimental analysis of data flows on an IoT Smart Home testbed and a systematic analysis of other frameworks.
Privacy Harm Analysis: A Case Study on Smart Grids
- Computer Science2016 IEEE Security and Privacy Workshops (SPW)
- 2016
This work provides a clear relationship among harms, feared events, privacy weaknesses and risk sources and describes their use in the analysis of smart grid systems, laying the foundation for a more systematic and rigorous approach to privacy risk assessment.
References
SHOWING 1-10 OF 28 REFERENCES
Smart Metering and Privacy in Europe: Lessons from the Dutch Case
- EngineeringEuropean Data Protection
- 2013
The Dutch case shows that privacy is a crucial element in smart metering legislation, which has to strike a careful balance between detailed energy metering and privacy protection in the most privacy-sensitive place – the home.
Privacy and the New Energy Infrastructure
- Engineering
- 2009
This article examines the privacy consequences of the diffusion of smart grid and smart metering technologies. It illustrates how high resolution electricity usage information can be used to…
SmartPrivacy for the Smart Grid: embedding privacy into the design of electricity conservation
- Engineering
- 2010
The 2003 blackout in the northern and eastern U.S. and Canada which caused a $6 billion loss in economic revenue is one of many indicators that the current electrical grid is outdated. Not only must…
Beyond Gut Level - Some Critical Remarks on the German Privacy Approach to Smart Metering
- EngineeringEuropean Data Protection
- 2013
The European Directive on common rules for the internal market in electricity (2009/72/EC) requires all member states to “ensure the implementation of intelligent metering systems” in order to foster…
Privacy-Friendly Aggregation for the Smart-Grid
- EngineeringPETS
- 2011
Protocols that can be used to privately compute aggregate meter measurements over defined sets of meters, allowing for fraud and leakage detection as well as network management and further statistical processing of meter measurements, without revealing any additional information about the individual meter readings are presented.
Engineering Privacy
- Computer ScienceIEEE Transactions on Software Engineering
- 2009
The paper uses a three-layer model of user privacy concerns to relate them to system operations and examine their effects on user behavior, and develops guidelines for building privacy-friendly systems.
Government Access to Private-Sector Data in the United Kingdom
- Political Science, Computer Science
- 2012
The most plausible means for systematic UK government access to private-sector data is through voluntary agreements with the operators of systems and databases. This was how Internet Service…
Privacy-preserving smart metering
- Computer ScienceISSE
- 2012
This work proposes a privacy-preserving protocol for general calculations on fine-grained meter readings, while keeping the use of tamper evident meters to a strict minimum, and allows users to perform and prove the correctness of computations based on readings on their own devices.
ARTICLE 29 Data Protection Working Party
- Political Science
- 2013
At its plenary meeting on 12 and 13 July 2010, the European Data Protection Authorities (the Article 29 Working Party [WP29]) discussed the data protection and privacy implications of the…
Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.
- Political Science
- 1996
(1) Whereas the objectives of the Community, as laid down in the Treaty, as amended by the Treaty on European Union, include creating an ever closer union among the peoples of Europe, fostering…