Privacy-Preserving Mining of Association Rules for Smart Grid

Article Preview

Abstract:

The widespread deployment of smart meters for the modernization of the electricity distribution network has been associated with privacy concerns due to the potentially large number of measurements that reflect the consumers’ behavior. At the same time, how to extract important knowledge from the potentially large of measurements — these measurements are spilt among various parties, has already became a hot topic in the field of data mining. In this paper, we present protocols that can be used to compute meter measurements over defined sets of meters without revealing any additional about the individual meter readings, and address secure mining of association rules. Thus, most of the benefits of the smart grid can be achieved without revealing individual data.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 971-973)

Pages:

1692-1695

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] M. Kantarcioglu and C. Clifton: Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data. IEEE Transaction on Knowledge and Data Engineering, VOL. 16, NO. 9, Sept. (2004).

DOI: 10.1109/tkde.2004.45

Google Scholar

[2] R. Agrawal and R. Srikant: Fast Algorithms for Mining Association Rules. Very Large Data Bases, pp.487-499, 1994, available: http: /www. vldb. org/dblp/db/conf/vldb/vldb94-487. html.

Google Scholar

[3] D.W. -L. Cheung, J. Han, V. Ng, A.W. -C. Fu, and Y. Fu. A Fast Distributed Algorithm for Mining Association Rules. Parallel and Distributed Information Systems, (PDIS '96), pp.31-42, (1996).

DOI: 10.1109/pdis.1996.568665

Google Scholar

[4] G. Henkelman, G. Johannesson and H. Jónsson, in: Theoretical Methods in Condencsed Phase Chemistry, edited by S.D. Schwartz, volume 5 of Progress in Theoretical Chemistry and Physics, chapter, 10, Kluwer Academic Publishers (2000).

Google Scholar

[5] A.C. Yao: Protocol for Secure Computation. In proceeding of the 23rd Annual IEEE symposium on Foundation of Computer Science, 1982, pp.160-164.

Google Scholar

[6] O. Goldreich: Secure Multiparty Computation, (working draft). September 1998, available from: http: /www. wisdom. weizmann. ac. il/~oded/PSBookFrag/enc. ps.

Google Scholar