Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2966986.2980089guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Privacy protection via appliance scheduling in smart homes

Published: 07 November 2016 Publication History

Abstract

Smart grid, managed by intelligent devices, have demonstrated great potentials to help residential customers to optimally schedule and manage the appliances' energy consumption. Due to the fine-grained power consumption information collected by smart meter, the customers' privacy becomes a serious concern. Combined with the effects of fake guideline electricity price, this paper focuses an on-line appliance scheduling design to protect customers' privacy in a cost-effective way, while taking into account the influences of non-schedulable appliances' operation uncertainties. We formulate the problem by minimizing the expected sum of electricity cost and achieving acceptable privacy protection. Without knowledge of future electricity consumptions, an on-line scheduling algorithm is proposed based on the only current observations by using a stochastic dynamic programming technique. The simulation results demonstrate the effectiveness of the proposed algorithm using real-world data.

6. References

[3]
C.-C. Chang and C.-J. Lin. Libsvm: a library for support vector machines, ACM Transactions on Intelliaent Systems and Technology, 2 (3): 27. 2011.
[4]
Z. Chen and L. Wu. Residential appliance dr energy management with electric privacy protection by online stochastic optimization. IEEE Transactions on, Smart. Grid, 4 (4): 1861–1869. 2013.
[5]
G. Kalogridis C. Efthymiou S. Z. Denic T. A. Lewis, and R. Cepeda. Privacy for smart meters: Towards undetectable appliance load signatures. In IEEE International Conference on Smart Grid Communications, pages 232–237, 2010.
[6]
Y. Liu, S. Hu, and T.-Y. Ho. Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design, pages 183–190, 2014.
[7]
S. McLaughlin P. Mc Daniel and W. Aiello. Protecting consumer privacy from electric load monitoring. In Proceedings of the 18th ACM conference on Computerand communications security, pages 87–98. ACM, 2011.
[8]
A.-H. Mohsenian-Rad, V. W. Wong J. Jatskevich, R. Schober, and A. Leon-Garcia. Autonomous demand-side management based game-theoretic energy consumption scheduling for the future smart grid. IEEE transactions on Smart Grid, 1 (3): 320–331, 2010.
[9]
A. Molina-Markham P. Shenoy, K. Fu, E. Cecchet, and D. Irwin. Private memoirs of a smart meter. In ACM workshop on embedded sensing systems for enenyy-eficiency in building, pages 61–66, 2010.
[10]
P. Palensky and D. Dietrich. Demand side management: Demand response, intelligent energy systems, and smart loads. IEEE transactions on industrial informatics, 7 (3): 381–3882011.
[11]
E. L. Quinn. Smart metering and privacy: Existing laws and competing policies. Available at SSRN 1462285, 2009.
[12]
L. Sankar S. R. Rajagopalan, and S. Mohajer. Smart meter privacy: A theoretical framework. IEEE Transactions on Smart Grid, 4 (2): 837–846, 2013.
[13]
A. J. Smola and B. Schölkopf. A tutorial on support vector regression. Statistics and computing, 14 (3): 199–222, 2004.
[14]
O. Tan, D. Gunduz, and H. V. Poor. Increasing smart meter privacy through energy harvesting and storage devices. IEEE Journal on Selected Areas in Communications, 31 (7): 1331–1341, 2013.
[15]
U. Thissen, R. Van Brakel, A. De Weijer, W. Melssen, and L. Buydens. Using support vector machines for time series prediction. Chemometrics and intelligent laboratory systems, 69 (1): 35–49, 2003.
[16]
C.-H. Wu, J.-M. Ho, and D.-T. Lee. Travel-time prediction with support vector regression. IEEE transactions on intelligent transportation systems, 5 (4): 276–281, 2004.
[17]
L. Yang, X. Chen, J. Zhang, and H. V. Poor. Cost-effective and privacy-preserving energy management for smart meters. IEEE Transactions on Smart Grid, 6 (1): 486–495 2015.
[18]
Y. Yuan, Z. Li, and K. Ren. Modeling load redistribution attacks in power systems. IEEE Transactions on Smart Grid, 2 (2): 382–390, 2011.
[19]
S. Yue, J. Chen, Y. Gu, C. Wu, and Y. Shi. Dual-priciIlg policy for controller-side strategies in demand side management. In IEEE International Conference on Smart Grid Communications, pages 357–362, 2011.

Cited By

View all
  • (2022)Security of Building Automation and Control SystemsComputers and Security10.1016/j.cose.2021.102527112:COnline publication date: 3-Jan-2022
  • (2020)Applying Privacy-Aware Policies in IoT Devices Using Privacy Metrics2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)10.1109/CCCI49893.2020.9256605(1-5)Online publication date: 3-Nov-2020
  • (2019)Privacy-Aware Cost-Effective Scheduling Considering Non-Schedulable Appliances in Smart Home2019 IEEE International Conference on Embedded Software and Systems (ICESS)10.1109/ICESS.2019.8782440(1-8)Online publication date: Jun-2019
  • Show More Cited By

Index Terms

  1. Privacy protection via appliance scheduling in smart homes
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD)
    Nov 2016
    946 pages

    Publisher

    IEEE Press

    Publication History

    Published: 07 November 2016

    Permissions

    Request permissions for this article.

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Security of Building Automation and Control SystemsComputers and Security10.1016/j.cose.2021.102527112:COnline publication date: 3-Jan-2022
    • (2020)Applying Privacy-Aware Policies in IoT Devices Using Privacy Metrics2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI)10.1109/CCCI49893.2020.9256605(1-5)Online publication date: 3-Nov-2020
    • (2019)Privacy-Aware Cost-Effective Scheduling Considering Non-Schedulable Appliances in Smart Home2019 IEEE International Conference on Embedded Software and Systems (ICESS)10.1109/ICESS.2019.8782440(1-8)Online publication date: Jun-2019
    • (2018)User Perceptions of Smart Home IoT PrivacyProceedings of the ACM on Human-Computer Interaction10.1145/32744692:CSCW(1-20)Online publication date: 1-Nov-2018
    • (2018)HiveProceedings of the ACM on Human-Computer Interaction10.1145/32744202:CSCW(1-26)Online publication date: 1-Nov-2018
    • (2018)Alexa, Are You Listening?Proceedings of the ACM on Human-Computer Interaction10.1145/32743712:CSCW(1-31)Online publication date: 1-Nov-2018
    • (2018)Synthesizing quotient lensesProceedings of the ACM on Programming Languages10.1145/32367752:ICFP(1-29)Online publication date: 30-Jul-2018
    • (2018)Analytics for the Internet of ThingsACM Computing Surveys10.1145/320494751:4(1-36)Online publication date: 25-Jul-2018
    • (2018)Combating Coordinated Pricing Cyberattack and Energy Theft in Smart Home Cyber-Physical SystemsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems10.1109/TCAD.2017.271778137:3(573-586)Online publication date: Mar-2018
    • (2017)Designing Low-Complexity Heavy-Traffic Delay-Optimal Load Balancing SchemesProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/31544981:2(1-30)Online publication date: 19-Dec-2017
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media