• Corpus ID: 27630992

On the Privacy-Cost Tradeoff of Battery Control Mechanisms in Demand Response : Selective Information Protection

  title={On the Privacy-Cost Tradeoff of Battery Control Mechanisms in Demand Response : Selective Information Protection},
  author={J. Yao and P. Venkitasubramaniam},
Perfect knowledge of a user’s power consumption profile by a utility is a violation of privacy and can be detrimental to the successful implementation of demand response systems. It has been shown that an in-home energy storage system which provides a viable means to achieve the cost savings of instantaneous electricity pricing without inconvenience can also be used to maintain the privacy of a user’s power profile. The optimization of the tradeoff between privacy and cost savings that can be… 

Figures from this paper

The Privacy Analysis of Battery Control Mechanisms in Demand Response: Revealing State Approach and Rate Distortion Bounds
Numerical results show that the proposed algorithm performs close to the upper bound demonstrating its efficacy, and is shown to be applicable even when users only desire partial information protection, such as presence/absence of activity or specific appliances they wish to hide.
Information-Theoretic Security in Stochastic Control Systems
This paper investigates two broad challenges in information security in cyber-physical systems (CPSs): preventing retrieval of internal physical system information through monitored external cyber flows, and limiting the modification of physical system functioning through compromised cyber flows.


On the privacy-cost tradeoff of an in-home power storage mechanism
  • J. Yao, P. Venkitasubramaniam
  • Computer Science
    2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton)
  • 2013
A fundamental tradeoff between how much privacy can be provided to individual consumers by a finite capacity battery and the cost savings that can be achieved assuming a zero tolerance for delay is studied using a Markov process model for user's demands and instantaneous electricity prices.
Optimal privacy-preserving energy management for smart meters
It is shown that the proposed online control algorithm can optimally control the battery operations to protect the smart meter data privacy and cut down the electricity bill, without the knowledge of the statistics of the time-varying load requirement and the electricity price processes.
Smart meter privacy: A utility-privacy framework
Using tools from information theory, a new framework is presented that abstracts both the privacy and the utility requirements of smart meter data and shows that the optimal utility-and-privacy preserving solution requires filtering out frequency components that are low in power.
Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage
  • D. Varodayan, A. Khisti
  • Computer Science
    2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
  • 2011
It is shown that stochastic battery policies can leak 26% less information than a so-called best-effort algorithm (that holds the output load constant whenever possible) and the technique is extended to more realistic models of the battery system.
Privacy for Smart Meters: Towards Undetectable Appliance Load Signatures
Smart grid privacy encompasses the privacy of information extracted by analysing smart metering data. In this paper, we suggest that home electrical power routing can be used to moderate the home's
Smart Grid Privacy via Anonymization of Smart Metering Data
The method described in this paper provides a 3rd party escrow mechanism for authenticated anonymous meter readings which are difficult to associate with a particular smart meter or customer.
Private memoirs of a smart meter
It is shown that even without a priori knowledge of household activities or prior training, it is possible to extract complex usage patterns from smart meter data using off-the-shelf statistical methods.
Secure Information Aggregation for Smart Grids Using Homomorphic Encryption
A distributed incremental data aggregation approach, in which data aggregation is performed at all smart meters involved in routing the data from the source meter to the collector unit, which is especially suitable for smart grids with repetitive routine data aggregation tasks.
Communication theory of secrecy systems
  • C. Shannon
  • Mathematics, Computer Science
    Bell Syst. Tech. J.
  • 1949
A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
REDD : A Public Data Set for Energy Disaggregation Research
The Reference Energy Disaggregation Data Set (REDD), a freely available data set containing detailed power usage information from several homes, is presented, aimed at furthering research on energy disaggregation.