A tradeoff between data collection needs and user privacy is of paramount importance in the Smart Grid. This paper proposes a pseudonymization protocol for data gathered by the Smart Metres, which relies on a network infrastructure and a dedicated set of nodes, called privacy preserving nodes. The network privacy is enforced by a separation of duties; the privacy preserving nodes perform data pseudonymization without having access to the measurements, which are masked by means of a secret sharing scheme, while the entities accessing the data recover and relate the plain measurements generated by the same metre along a time window of finite duration but have no access to the metre identities. The paper also provides an evaluation of the security and of the performance of the protocol, comparing it to the two alternative encryption techniques, which mask the measurements by means of the Chaum mixing scheme or of an identity-based proxy re-encryption scheme.

A protocol for metering data pseudonymization in smart grids / Rottondi, C.; Mauri, G.; Verticale, G.. - In: TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES. - ISSN 2161-3915. - ELETTRONICO. - 26:5(2015), pp. 876-892. [10.1002/ett.2760]

A protocol for metering data pseudonymization in smart grids

Rottondi, C.;
2015

Abstract

A tradeoff between data collection needs and user privacy is of paramount importance in the Smart Grid. This paper proposes a pseudonymization protocol for data gathered by the Smart Metres, which relies on a network infrastructure and a dedicated set of nodes, called privacy preserving nodes. The network privacy is enforced by a separation of duties; the privacy preserving nodes perform data pseudonymization without having access to the measurements, which are masked by means of a secret sharing scheme, while the entities accessing the data recover and relate the plain measurements generated by the same metre along a time window of finite duration but have no access to the metre identities. The paper also provides an evaluation of the security and of the performance of the protocol, comparing it to the two alternative encryption techniques, which mask the measurements by means of the Chaum mixing scheme or of an identity-based proxy re-encryption scheme.
File in questo prodotto:
Non ci sono file associati a questo prodotto.
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11583/2723346
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo