The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January/February (2010 vol.8)
pp: 11-20
Deirdre K. Mulligan , University of California, Berkeley
Mikhail A. Lisovich , Cornell University
ABSTRACT
Current and upcoming demand-response systems provide increasingly detailed power-consumption data to utilities and a growing array of players angling to assist consumers in understanding and managing their energy use. The granularity of this data, as well as new players' entry into the energy market, creates new privacy concerns. The detailed per-household consumption data that advanced metering systems generate reveals information about in-home activities that such players can mine and combine with other readily available information to discover more about occupants' activities. The authors explore the technological aspects of this claim, focusing on the ways in which personally identifying information can be collected and repurposed. Their results show that, even with relatively unsophisticated hardware and data-extraction algorithms, some information about occupant behavior can be estimated with a high degree of accuracy. The authors propose a disclosure metric to aid in quantifying the impact of data collection on in-home privacy and construct an example metric for their experiment.
INDEX TERMS
NG-SCADA, protection, privacy
CITATION
Deirdre K. Mulligan, Mikhail A. Lisovich, "Inferring Personal Information from Demand-Response Systems", IEEE Security & Privacy, vol.8, no. 1, pp. 11-20, January/February 2010, doi:10.1109/MSP.2010.40
REFERENCES
1. "2008 Assessment of Demand Response and Advanced Metering," staff report, Dec. 2008; www.ferc.gov/legal/staff-reports12-08-demand-response.pdf .
2. J.I. Lerner and D.K. Mulligan, "Taking the 'Long View' on the Fourth Amendment: Stored Records and the Sanctity of the Home," Stanford Technology Law Rev. 3, 2008; http:/certs.aeptechlab.com.
3. United States v. Miller, US Reports, vol. 425, 1976, p. 435.
4. Kyllo v. United States, US Reports, vol. 533, 2000, p. 27.
5. Smart Grid Cybersecurity Strategy and Requirements, US Nat'l Inst. for Standards and Technology, 2009; http://csrc.nist.gov/publications/drafts/ nistir-7628draft-nistir-7628.pdf.
6. "Assigned Comissioner and Administrative Law Judge's Joint Ruling Inviting Comments on Proposed Policies and Findings Pertaining to the Smart Grid Policies Established by the Energy Information and Security Act of 2007," Calif. Public Utilities Commission, Sept. 2009; http://docs.cpuc.ca.gov/efile/RULINGS/107583.pdf.
7. "Advanced Metering Infrastructure (AMI)," Electrical Power Research Inst., Feb. 2007; www.ferc.gov/EventCalendar/Files20070423091846-EPRI%20-%20Advanced%20Metering.pdf .
8. C. Laughman et al., "Power Signature Analysis," IEEE Power and Energy Magazine, vol. 1, no. 2, 2003, pp. 56–63.
9. "Single Point End-Use Energy Disaggregation (SPEED) Marketing Brochure," 2001; www.enetics.com/downloadsSPEED Brochure.pdf.
10. D.K. Mulligan et al., "Privacy and the Law in Demand Response Energy Systems," Samuelson Law, Technology, and Public Policy Clinic, 2006; www.truststc.org/pubs/36Jones_PrivacyAndLawInDemandResponse.pdf.
11. J. Smith, "APD Pot Hunters are Data Mining at AE," Nov. 2007; www.austinchronicle.com/gyrobase/Issuestory?oid=oid%3A561535.
12. H. Nissenbaum, "Privacy as Contextual Integrity," Washington Law Rev., vol. 79, no. 1, 2004, pp. 119–158.
13. H. Surden, "Structural Rights in Privacy," SMU Law Rev., vol. 60, 2007, pp. 1605–1629.
14. L. Lessig, Code: And Other Laws of Cyberspace, Version 2.0, 2nd ed., Basic Books, 2006.
15. M.L.A.P. Jun Han and A. Jain, "Don't Sweat Your Privacy: Using Humidity to Detect Human Presence," Proc. 5th Int'l Workshop on Privacy in UbiComp (UbiPriv 07), 2007; http://sparrow.ece.cmu.edu/group/pubhan_jain_luk_perrig_privacy.pdf.
16. M. Baranski and V. Jurgen, "Genetic Algorithm for Pattern Detection in NIALM Systems," Proc. IEEE Int'l Conf. Systems, Man and Cybernetics, IEEE Press, vol. 4, 2004, pp. 3462–3468.
17. M. Baranski and V. Jurgen, "Detecting Patterns of Appliances from Total Load Data Using a Dynamic Programming Approach," Proc. IEEE 4th Int'l Conf. Data Mining (ICDM 04), IEEE Press, 2004, pp. 327–330.
18. S. Drenker and A. Kader, "Nonintrusive Monitoring of Electric Loads," Proc. IEEE Computer Applications in Power, Dec. 1999, pp. 47–51.
19. P. Subrahmanyam et al., Network Security Architecture for Demand Response/Sensor Networks, tech. report, Calif. Energy Commission, Public Interest Research Group, Jan. 2008.
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool