@inproceedings{6e7edea5baf243e088ca2acc136be8c2,
title = "Hierarchical key management for multi-resolution load data representation",
abstract = "It has been shown that information about a consumer's actions, beliefs and preferences can be extracted from high resolution load data. This information can be used in ways that violate consumer privacy. In order to increase consumer control over this information, it has been suggested that load data be represented in multiple resolutions, with each resolution secured with a different key. To make this approach work in the real-world, a suitable key management needs to be employed. In this paper, we consider a combination of multi-resolution load data representation with hierarchical key management. Emphasis is placed on a privacy-aware design that gives the end-user the freedom to decide which entity is allowed to access user related data and at what granularity. {\textcopyright} 2014 IEEE.",
keywords = "Consumer privacy, End users, Hierarchical key management, High resolution, Key management, Multiple resolutions, Privacy aware, Real-world",
author = "C.D. Peer and D. Engel and S.B. Wicker",
note = "Conference code: 110040 Cited By :6 Export Date: 14 December 2023 References: A national assessment of demand response potential (2009) Staff Report, Federal Energy Regulatory Commission, , http://www.ferc.gov/legal/staff-reports/06-09-demand-response.pdf, June; Lisovich, M., Wicker, S., Privacy concerns in upcoming residential and commercial demand-response systems (2008) Clemson University Power Systems Conference 2008. Clemson University, , March; http://www.truststc.org/pubs/332.html; Hart, G., Nonintrusive appliance load monitoring (1992) Proceedings of the IEEE, 80 (12), pp. 1870-1891. , Dec; Eibl, G., Engel, D., Influence of data granularity on nonintrusive appliance load monitoring (2014) Proceedings of the Second ACM Workshop on Information Hiding and Multimedia Security (IH\&MMSec '14), pp. 147-151. , http://doi.acm.org/10.1145/2600918.2600920, Salzburg, Austria: ACM; Erkin, Z., Troncoso-Pastoriza, J., Lagendijk, R., Perez-Gonzalez, F., Privacy-preserving data aggregation in smart metering systems: An overview (2013) Signal Processing Magazine, 30 (2), pp. 75-86. , IEEE; Engel, D., Wavelet-based load profile representation for smart meter privacy (2013) Proceedings IEEE PES Innovative Smart Grid Technologies (ISGT'13), pp. 1-6. , Washington, D.C., USA, Feb; Wicker, S., Thomas, R., A privacy-Aware architecture for demand response systems (2011) Proceedings 44th Hawaii International Conference on System Sciences (hicss'11), pp. 1-9. , Jan; Long, X., Tipper, D., Qian, Y., An advanced key management scheme for secure smart grid communications (2013) Proceedings IEEE International Conference on Smart Grid Communications (SmartGrid-Comm'13), pp. 504-509. , Oct; Smith, S., Cryptographic scalability challenges in the smart grid (extended abstract) (2012) Proceedings IEEE PES Innovative Smart Grid Technologies (ISGT'12), pp. 1-3. , Jan; Baumeister, T., Adapting PKI for the smart grid (2011) Proceedings IEEE International Conference on Smart Grid Communications (SmartGrid-Comm'11), pp. 249-254. , Oct; Smart grid cybersecurity strategy, architecture, and high-level requirements (2013) NISTIR 7628 Guidelines for Smart Grid Cybersecurity, 1. , NIST,National Institute of Standards and Technology, U.S. Department of Commerce; Buchmann, J., Karatsiolis, E., Wiesmaier, A., (2013) Introduction to Public Key Infrastructures, , http://dx.doi.org/10.1007/978-3-642-40657-75, Springer Berlin Heidelberg; Blake-Wilson, S., Nystrom, M., Hopwood, D., Mikkelsen, J., Wright, T., Transport layer security (tls) extensions (2006) IETF Request for Comments, (4366). , http://www.ietf.org/rfc/rfc4366, April; Lamport, L., Password authentication with insecure communication (1981) Commun. ACM, 24 (11), pp. 770-772. , http://doi.acm.org/10.1145/358790.358797, Nov; Haller, N., The s/key one-Time password system (1995) IETF Request for Comments, (1760). , http://www.ietf.org/rfc/rfc1760; Goyal, V., How to re-initialize a hash chain (2004) Cryptology EPrint Archive, Report 2004/097; Imaizumi, S., Fujiyoshi, M., Kiya, H., Aoki, N., Kobayashi, H., A key derivation scheme for hierarchical access control to JPEG2000 coded images (2012) Advances in Image and Video Technology, Ser. Lecture Notes in Computer Science, 7088, pp. 180-191. , http://dx.doi.org/10.1007/978-3-642-25346-117, Y.-S. Ho, Ed. Springer Berlin Heidelberg; Wu, Y., Ma, D., Deng, R.-H., Progressive protection of JPEG2000 codestreams (2004) International Conference on Image Processing (ICIP '04), 5, pp. 3447-3450. , Oct 5; Asghar, M., Ghanbari, M., Cryptographic keys management for h.264/scalable coded video security (2011) 8th International Isc Conference on Information Security and Cryptology (iscisc'11), pp. 83-86. , Sept; Arkko, J., Carrara, E., Lindholm, F., Naslund, M., Norrman, K., Mikey: Multimedia internet keying (2004) Ietf Request for Comments, (3830). , http://tools.ietf.org/html/rfc3830; Dierks, T., Rescorla, E., The transport layer security (tls) protocol version 1.2 (2008) IETF Request for Comments, , August; Engel, D., Eibl, G., Multi-resolution load curve representation with privacy-preserving aggregation (2013) Proceedings of IEEE Innovative Smart Grid Technologies (ISGT) 2013, pp. 1-5. , Copenhagen, Denmark: IEEE, Oct; 2014 IEEE International Conference on Smart Grid Communications, SmartGridComm 2014, SmartGridComm 2014 ; Conference date: 03-11-2014 Through 06-11-2014",
year = "2015",
doi = "10.1109/SmartGridComm.2014.7007767",
language = "English",
pages = "926--932",
booktitle = "2014 IEEE International Conference on Smart Grid Communications (SmartGridComm)",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",
url = "https://sgc2014.ieee-smartgridcomm.org/index.html",
}