Skip to main content
Log in

De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Various security threats exist in the smart grid environment due to the fact that information and communication technology are grafted onto an existing power grid. In particular, smart metering data exposes a variety of information such as users’ life patterns and devices in use, and thereby serious infringement on personal information may occur. Therefore, we are in a situation where a de-identification algorithm suitable for metering data is required. Hence, this paper proposes a new de-identification method for metering data. The proposed method processes time information and numerical information as de-identification data, respectively, so that pattern information cannot be analyzed by the data. In addition, such a method has an advantage that a query such as a direct range search and aggregation processing in a database can be performed even in a de-identified state for statistical processing and availability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Shargal M, Houseman D (2009) The big picture of your coming smart grid. Smart Grid News 1(1):1–2

    Google Scholar 

  2. Park N, Kim M (2014) Implementation of load management application system using smart grid privacy policy in energy management service environment. Clust Comput 17(3):653–664

    Article  Google Scholar 

  3. Park N, Kang N (2015) Mutual authentication scheme in secure internet of things Technology for Comfortable Lifestyle. Sensors 16(1):1–16

    Article  Google Scholar 

  4. Sung DK, Song N-O, Ko KS, Cha J, Bae KY, Jang H (2013) Convergence of power system technology and information communication Technology in Smart Grid. Commun Kor Inf Sci Soc 31(3):10–21

    Google Scholar 

  5. Park N (2013) UHF/HF dual-band integrated mobile RFID/NFC linkage method for mobile device-based business application. J KICS 38(10):841–851

    Article  Google Scholar 

  6. Park N (2011) Implementation of terminal middleware platform for mobile RFID computing. Int J Ad Hoc Ubiquitous Comput 8(4):205–219

    Article  Google Scholar 

  7. Rusitschka S, Eger K, Gerdes C (2010) Smart grid data cloud: A model for utilizing cloud computing in the smart grid domain. 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm) 1(1):483–488

    Article  Google Scholar 

  8. Park N, Kwak J, Kim S, Won D, Kim H (2006) WIPI mobile platform with secure service for mobile RFID network environment. In: Shen HT, Li J, Li M, Ni J, Wang W (eds) Advanced web and network technologies, and applications, APWeb 2006 (Lecture notes in computer science), vol 3842. Springer, Heidelberg, pp 741–748

  9. Quinn EL (2009) Privacy and the new energy infrastructure. Soc Sci Resear Netw (SSRN) 1(1):1–43. https://doi.org/10.2139/ssrn.1370731

    Google Scholar 

  10. Namje Park, Hongxin Hu, Qun Jin (2016) Security and privacy mechanisms for sensor middleware and application in internet of things (IoT). Int J Distri Sens Netw 2016:1–3. https://doi.org/10.1155/2016/2965438

    Google Scholar 

  11. Agrawal R, et al (2004) Order preserving encryption for numeric data. Proceedings of the 2004 ACM SIGMOD international conference on management of data. ACM

  12. Lee D, Park N (2016) Geocasting-based synchronization of almanac on the maritime cloud for distributed smart surveillance. J Supercomput 73(3):1103–1118

    Article  Google Scholar 

  13. Park N (2014) Design and implementation of mobile VTS middleware for efficient IVEF service. J KICS 39C(6):466–475

    Article  Google Scholar 

  14. Choi D, Lee Y (2014) Privacy protection Technology for Public Information Open & sharing. J KIISE : Comput Syst Theory 41(3):109–115

    Google Scholar 

  15. Park H-A (2012) Dong Hoon lee, Taik Yeong Chung,"comprehensive study on security and privacy requirements for retrieval system over encrypted database". J Kor Inst Inf Sec Cryptol 22(3):621–635

    Google Scholar 

  16. Park N (2010) The implementation of open embedded S/W platform for secure mobile RFID reader. J Kor Inst Commun Inf Sci 35(5B):785–793

    Google Scholar 

  17. Lee D, Park N (2016) A proposal of SH-tree based data synchronization method for secure maritime cloud. J Kor Inst Inf Sec Cryptol 26(4):929–940

    Google Scholar 

  18. Park N, Bang H-C (2016) Mobile middleware platform for secure vessel traffic system in IoT service environment. Sec Commun Netw 9(6):500–512

    Article  Google Scholar 

  19. Kim D, Lee H (2015) Personal information de-Idenification trends based on big data. Rev Kor Soc Internet Inf 16(2):15–22

    Google Scholar 

  20. NIST (2014) Guidelines for smart grid cybersecurity, volume 2 - privacy and the smart grid. U.S. Department of Commerce, pp 291-473

  21. Lee D, Park N, (2017) “Electronic identity information hiding methods using a secret sharing scheme in multimedia-centric internet of things environment”, personal and ubiquitous computing, https://doi.org/10.1007/s00779-017-1017-1

  22. Park N (2014) Implementation of inter-VTS data exchange format protocol based on mobile platform for next-generation vessel traffic service system. Inf Int Interdisciplinary J 17(10A):4847–4856

    Google Scholar 

Download references

Acknowledgements

This work was supported by Institute for Information & communications Technology Promotion(IITP) grant funded by the Korea government(MSIT)[2017-0-00207, Development of Cloud-based Intelligent Video Security Incubating Platform] and this research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education(NRF-2016R1D1A3A03918513).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Namje Park.

Additional information

This article is part of the Topical Collection: Special Issue on Convergence P2P Cloud Computing

Guest Editor: Jung-Soo Han

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, D., Park, N., Kim, G. et al. De-identification of metering data for smart grid personal security in intelligent CCTV-based P2P cloud computing environment. Peer-to-Peer Netw. Appl. 11, 1299–1308 (2018). https://doi.org/10.1007/s12083-018-0637-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-018-0637-1

Keywords

Navigation