SlideShare a Scribd company logo
1Copyright © 2011 Tata Consultancy Services
Limited
Sensor Data Sensitivity Analysis for Privacy
Negotiation in IoT with focus on Smart Meters
Dr. Arpan Pal
Principal Scientist and Research Head
Innovation Lab, Kolkata
Tata Consultancy Services
With Arijit Ukil and Soma Bandyopadhyay, Innovation Lab, Kolkata
Motivation
Problem Statement
Proposed Approach and Results
Conclusion and Future Work
3
Signal
Processing
Internet-of-Things - towards Intelligent Infrastructure
Sense
Extract
Analyze
Respond
Learn
Monitor
Intelligent
Infra
@Home
@Building
@Vehicle
@Utility
@Mobile
@Store
@Road
“Intelligent” (Cyber) “Infrastructure” (Physical)
APPLICATION SERVICES
BACK-END PLATFORM
INTERNET
GATEWAY
Sense
Extract
Analyze
Respond
Communication
Computing
4
Home Utility Management Solution (HUMS)
Utility
Appliances Smart
Plugs
Intelligent
Gateway
Smart
Meter
Demand Forecasting
Demand Response
Appliance Management
Consumption View
Appliance Scheduling
On-off Control
Social Network
Integration
Consumer Home
Analytics
 Numerous data are going out
 Carries sensitive / private information.
 Disaggregation of per appliance based consumption.
 Better utility: more data granularity: more private info.
 Customer @ Netherlands
 Need to know Appliance Type / make / Model from
aggregated Smart Meter Data
 Disaggregation based NILM
5
Smart Energy Disaggregation: Privacy Concern
 Activity monitoring
 Advantage: Personalized services and recommendation like theft detection,
elderly monitoring (University of Virginia’s ALARMNET, Harvard’s CodeBlue)
 Privacy issue: Leads to private data (smart meter data) leakage, Activity at Home
becomes known – can lead to various privacy leakage –especially for consumption
behaviours that are anomalous w.r.t aggregate behaviour (intra-day, intra-week,
intra-month, intra-customer)
[1] [www.winlab.rutgers.edu/~gruteser/papers/fp023-roufPS.pdf
[1]
6
Privacy Negotiation – Need for Sensitivity Analysis
• Helps Users to get a better understanding of privacy leakage from the
data they are sharing – is it worth the utility provided by the application?
• Help in comparing similar utility applications from privacy perspective
• Tune Privacy preservation adaptively before sharing data to applications
Privacy
Utility
Privacy
Preservation
Tool
Sensitivity
Analysis
Motivation
Problem Statement
Proposed Approach and Results
Conclusion and Future Work
8
Sensitivity Detection and Analysis
 Privacy as a function of sensitivity detection and analysis
 Explores intrinsic statistical properties of smart meter data
(time-series data) for sensitivity analysis and detection
 Information theoretic model for privacy measurement
 Works on generic time-series data
9
Privacy Analyzer in Smart Energy Management
PPDM: Privacy preserving data mining,
one of privacy enhancing methods [2]
× Only Anonymization does not help,
need to analyze the diversity also [3]
× Existing Diversity algorithms like l-
diversity are computationally heavy –
cannot suite IoT real-time requirement
× Existing diversity algorithms can work
on quasi-identifiers in sensor
metadata and not on the real sensor
data
 Unless we work on the sensor data, we
cannot get fine-grain privacy
negotiation control – need sensitivity
analysis
[2] M. Hamblen. “Privacy algorithms: Technology-based protections could make personal data impersonal”. Computerworld, Oct. 14
2002.
[3] Ashwin Machanavajjhala et. al., “ℓ-Diversity: Privacy Beyond k-Anonymity”, www.cs.cornell.edu/~vmuthu/research/ldiversity.pdf
10
State of the Art – Sensitivity Analysis of Smart Meter Data
Intrusive monitoring
 Application-specific monitoring through dedicated hardware: using The Energy
detective (TED) [4], battery-based load obfuscation [5].
× Need Dedicated Hardware
× Need Training – Supervised Learning
Non-intrusive monitoring
× Supervised NILM using disaggregation [8]
Our Goal
 Improvement in NILM based Sensitivity Analysis for Privacy Negotiation as
compared to available privacy measures
× Z-score [6]: 3-sigma based analysis – very high false negatives
× Modified z-score [7]: high false negatives
[4] A. Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, D. Irwin, "Private memoirs of a smart meter," ACM BuildSys, pp. 61 - 66, 2010.
[5] W. Yang, N. Li, Y. Qi, Wahbeh Qardaji, Stephen McLaughlin, Patrick McDaniel," Minimizing Private Data Disclosures in the Smart
Grid," ACM CCS, pp. 415-427, 2012.
[6] R. Rao, S. Akella, G. Guley, "Power Line Carrier (PLC) Signal Analysis of Smart Meters for Outlier Detection," IEEE SmartGridComm,
pp. 291 - 296, 2011.
[7] R. M. Nascimento, et al., Outliers’ Detection and Filling Algorithms for Smart Metering Centers ," IEEE PES , pp.1 - 6, 2012.
[8] K. Srinivasarengan, Y.G. Goutam, M.G. Chandra, and S. Kadhe, "A Framework for Non Intrusive Load Monitoring Using Bayesian
Inference," IEEE IMIS, pp. 427 423, 2013.
Motivation
Problem
Proposed Approach and Results
Conclusion and Future Work
12
Proposed Sensitivity Detection Algorithm
1. Find kurtosis to understand spread of distribution of meter data
2. If kurtosis < 3: use Hampel [9] identifier for detecting sensitivity points
 Minimizes masking effect through outlier processing – reduces false negatives
3. Else: use modified Rosner [10] filter for sensitivity detection
 Minimizes swamping effect through iterative backward testing - reduces false
positives
 Modification in backward testing criteria through fitting in student-t
distribution
4. Compute Sensitivity Density by normalizing within given time period under
consideration
5. Privacy Negotiation using the Sensitivity Density
 Additional application specific parameter tuning – sampling resolution, block
size
[9] Hampel: H. Liu, S. Shah, W. Jiang, "On-line outlier detection and data cleaning," Elsevier Computers and Chemical
Engineering, pp. 1635–1647, 2004.
[10] Rosner: B. Rosner, “On the Detection of Many Outliers.” Technometrics, vol. 17, pp. 221–227, 1975.
13
Sensitivity Detection - Results
[11] Experimented with REDD dataset (Z. Kolter, and M, J. Johnson, "REDD: A public data set for energy disaggregation
research," SustKDD, 2011) of 24 hour, 1 Hz sampling
Proposed Scheme Proposed Scheme
14
Privacy Gain Analysis: Results
Privacy gain w.r.t. NILM [8]
Privacy gain w.r.t. supervised learning [4]
Proposed Scheme
Proposed Scheme
15
Privacy Breach Attack Analysis
Privacy
Quantification
Sensitivity
detection
Privacy
Preservation
Privacy Breach Attack
with Disaggregation
Algorithm (NILM)
Smart meter
data
Privacy Preserved
Data Out
Privacy Breach
Attack Success
Count
16
Privacy Breach Attack: Results
Privacy Analyzer successfully
defends leaking of fridge and
high power appliance signature.
[12] Submitted in Infocom 2014, IPSN 2014
[13] Two patent filing under progress
Motivation
Problem
Proposed Approach and Results
Conclusion and Future Work
18
Conclusion
 Sensitivity detection with higher accuracy: minimal false positive
and negative alarms.
 Privacy-utility trade-off with low power appliance detection
capability while fridge and high power appliance detection
suppressed.
 Cost-effective compared to supervised learning based schemes,
which require additional hardware like TED (The Energy
Detector). Assuming a household has around 10 electrical
appliances; using TED 5000-C costs more than 2000 USD.
 No additional infrastructure, non-invasive: high scalability,
maintainability.
19
Future Work
 Further Reduce Computational Complexity
 Improve Privacy Quantification Calculation
 Sensitivity analysis through learning of collective energy usage
pattern: Detection of sensitivity considering large set of smart
meter data from number of households.
– Detection of Unusual Pattern across days / months / seasons /
consumers
Thank You
arpan.pal@tcs.com

More Related Content

What's hot

Neural Networks Hardware Accelerators (An Introduction)
Neural Networks Hardware Accelerators (An Introduction)Neural Networks Hardware Accelerators (An Introduction)
Neural Networks Hardware Accelerators (An Introduction)
Hamidreza Bolhasani
 
SKG-2013, Beijing, China, 03 October 2013
SKG-2013, Beijing, China, 03 October 2013SKG-2013, Beijing, China, 03 October 2013
SKG-2013, Beijing, China, 03 October 2013
Charith Perera
 
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
Amélie Gyrard
 
Internet of Things: Concepts and Technologies
Internet of Things: Concepts and TechnologiesInternet of Things: Concepts and Technologies
Internet of Things: Concepts and Technologies
PayamBarnaghi
 
Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...
PayamBarnaghi
 
Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things
PayamBarnaghi
 
Discovering Things and Things’ data/services
Discovering Things and  Things’ data/servicesDiscovering Things and  Things’ data/services
Discovering Things and Things’ data/services
PayamBarnaghi
 
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Amélie Gyrard
 
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
IoT-Lite:  A Lightweight Semantic Model for the Internet of ThingsIoT-Lite:  A Lightweight Semantic Model for the Internet of Things
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
PayamBarnaghi
 
Internet of things
Internet of thingsInternet of things
Internet of things
K.Mohamed Faizal
 
How to make data more usable on the Internet of Things
How to make data more usable on the Internet of ThingsHow to make data more usable on the Internet of Things
How to make data more usable on the Internet of Things
PayamBarnaghi
 
Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things
PayamBarnaghi
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things Applications
Amélie Gyrard
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Amélie Gyrard
 
Making Smarter Systems with IoT and Analytics
Making Smarter Systems with IoT and AnalyticsMaking Smarter Systems with IoT and Analytics
Making Smarter Systems with IoT and Analytics
WSO2
 
IoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approachesIoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approaches
Bart Jonkers
 
Semantic IoT Semantic Inter-Operability Practices - Part 2
Semantic IoT Semantic Inter-Operability Practices - Part 2Semantic IoT Semantic Inter-Operability Practices - Part 2
Semantic IoT Semantic Inter-Operability Practices - Part 2
iotest
 
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
LeMeniz Infotech
 
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew TuckerCloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Lew Tucker
 
Internet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealthInternet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealth
PayamBarnaghi
 

What's hot (20)

Neural Networks Hardware Accelerators (An Introduction)
Neural Networks Hardware Accelerators (An Introduction)Neural Networks Hardware Accelerators (An Introduction)
Neural Networks Hardware Accelerators (An Introduction)
 
SKG-2013, Beijing, China, 03 October 2013
SKG-2013, Beijing, China, 03 October 2013SKG-2013, Beijing, China, 03 October 2013
SKG-2013, Beijing, China, 03 October 2013
 
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
A Unified Semantic Engine for Internet of Things and Smart Cities: From Senso...
 
Internet of Things: Concepts and Technologies
Internet of Things: Concepts and TechnologiesInternet of Things: Concepts and Technologies
Internet of Things: Concepts and Technologies
 
Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...Internet of Things for healthcare: data integration and security/privacy issu...
Internet of Things for healthcare: data integration and security/privacy issu...
 
Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things Semantic technologies for the Internet of Things
Semantic technologies for the Internet of Things
 
Discovering Things and Things’ data/services
Discovering Things and  Things’ data/servicesDiscovering Things and  Things’ data/services
Discovering Things and Things’ data/services
 
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
Enrich Machine-to-Machine Data with Semantic Web Technologies for Cross-Domai...
 
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
IoT-Lite:  A Lightweight Semantic Model for the Internet of ThingsIoT-Lite:  A Lightweight Semantic Model for the Internet of Things
IoT-Lite: A Lightweight Semantic Model for the Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
How to make data more usable on the Internet of Things
How to make data more usable on the Internet of ThingsHow to make data more usable on the Internet of Things
How to make data more usable on the Internet of Things
 
Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things
 
Designing Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things ApplicationsDesigning Cross-Domain Semantic Web of Things Applications
Designing Cross-Domain Semantic Web of Things Applications
 
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
Assisting IoT Projects and Developers in Designing Interoperable Semantic Web...
 
Making Smarter Systems with IoT and Analytics
Making Smarter Systems with IoT and AnalyticsMaking Smarter Systems with IoT and Analytics
Making Smarter Systems with IoT and Analytics
 
IoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approachesIoT Edge Intelligence - The need for new software development approaches
IoT Edge Intelligence - The need for new software development approaches
 
Semantic IoT Semantic Inter-Operability Practices - Part 2
Semantic IoT Semantic Inter-Operability Practices - Part 2Semantic IoT Semantic Inter-Operability Practices - Part 2
Semantic IoT Semantic Inter-Operability Practices - Part 2
 
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
Bd ca m big data for context-aware monitoring - a personalized knowledge disc...
 
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew TuckerCloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
Cloud Computing, SDN, Big Data and Internet of Everything - Lew Tucker
 
Internet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealthInternet of Things and Data Analytics for Smart Cities and eHealth
Internet of Things and Data Analytics for Smart Cities and eHealth
 

Viewers also liked

Ee463 ofdm - loren schwappach
Ee463   ofdm - loren schwappachEe463   ofdm - loren schwappach
Ee463 ofdm - loren schwappach
Loren Schwappach
 
Manual de instruccion_competencia_universitaria_de_planes_de_negocios_2012
Manual de instruccion_competencia_universitaria_de_planes_de_negocios_2012Manual de instruccion_competencia_universitaria_de_planes_de_negocios_2012
Manual de instruccion_competencia_universitaria_de_planes_de_negocios_2012
Kimyell Munos Matos
 
Io t research_arpanpal_iem
Io t research_arpanpal_iemIo t research_arpanpal_iem
Io t research_arpanpal_iem
Arpan Pal
 
Arpan pal icdcn
Arpan pal icdcnArpan pal icdcn
Arpan pal icdcn
Arpan Pal
 
PAPR Reduction in OFDM
PAPR Reduction in OFDMPAPR Reduction in OFDM
PAPR Reduction in OFDM
Svetislav Maric
 
OFDMA System
OFDMA SystemOFDMA System
OFDMA Systemprapun
 
papr-presentation
papr-presentationpapr-presentation
papr-presentation
Heshani Thathsarani
 
Joint SLM and Modified Clipping Technique for PAPR Reduction
Joint SLM and Modified Clipping Technique for PAPR ReductionJoint SLM and Modified Clipping Technique for PAPR Reduction
Joint SLM and Modified Clipping Technique for PAPR Reduction
Hazrat Ali
 
Labview based rf characterization and testing of dual mode phase shifter
Labview based rf characterization and testing of dual mode phase shifterLabview based rf characterization and testing of dual mode phase shifter
Labview based rf characterization and testing of dual mode phase shifter
eSAT Journals
 
01 ofdm intro
01 ofdm intro01 ofdm intro
01 ofdm intro
LALIT SINGH
 
OFDM (Orthogonal Frequency Division Multiplexing )
OFDM (Orthogonal Frequency Division Multiplexing �)OFDM (Orthogonal Frequency Division Multiplexing �)
OFDM (Orthogonal Frequency Division Multiplexing )
Juan Camilo Sacanamboy
 
Ofdma tutorial
Ofdma tutorialOfdma tutorial
Ofdma tutorial
amit_onu
 
Setting your 'Sales' for Success
Setting your 'Sales' for SuccessSetting your 'Sales' for Success
Setting your 'Sales' for Success
Clarity Thinker
 
My thesis
My thesisMy thesis
My thesis
Ahmed Anwar
 
Ofdma
OfdmaOfdma
OFDM
OFDMOFDM
An Overview : Peak to Average Power Ratio (PAPR) in OFDM system using some ne...
An Overview : Peak to Average Power Ratio (PAPR) in OFDM system using some ne...An Overview : Peak to Average Power Ratio (PAPR) in OFDM system using some ne...
An Overview : Peak to Average Power Ratio (PAPR) in OFDM system using some ne...
Z AL Hashemi
 
OFDM for LTE
OFDM for LTEOFDM for LTE
OFDM for LTE
Madhumita Tamhane
 
OFDM
OFDMOFDM
(Ofdm)
(Ofdm)(Ofdm)

Viewers also liked (20)

Ee463 ofdm - loren schwappach
Ee463   ofdm - loren schwappachEe463   ofdm - loren schwappach
Ee463 ofdm - loren schwappach
 
Manual de instruccion_competencia_universitaria_de_planes_de_negocios_2012
Manual de instruccion_competencia_universitaria_de_planes_de_negocios_2012Manual de instruccion_competencia_universitaria_de_planes_de_negocios_2012
Manual de instruccion_competencia_universitaria_de_planes_de_negocios_2012
 
Io t research_arpanpal_iem
Io t research_arpanpal_iemIo t research_arpanpal_iem
Io t research_arpanpal_iem
 
Arpan pal icdcn
Arpan pal icdcnArpan pal icdcn
Arpan pal icdcn
 
PAPR Reduction in OFDM
PAPR Reduction in OFDMPAPR Reduction in OFDM
PAPR Reduction in OFDM
 
OFDMA System
OFDMA SystemOFDMA System
OFDMA System
 
papr-presentation
papr-presentationpapr-presentation
papr-presentation
 
Joint SLM and Modified Clipping Technique for PAPR Reduction
Joint SLM and Modified Clipping Technique for PAPR ReductionJoint SLM and Modified Clipping Technique for PAPR Reduction
Joint SLM and Modified Clipping Technique for PAPR Reduction
 
Labview based rf characterization and testing of dual mode phase shifter
Labview based rf characterization and testing of dual mode phase shifterLabview based rf characterization and testing of dual mode phase shifter
Labview based rf characterization and testing of dual mode phase shifter
 
01 ofdm intro
01 ofdm intro01 ofdm intro
01 ofdm intro
 
OFDM (Orthogonal Frequency Division Multiplexing )
OFDM (Orthogonal Frequency Division Multiplexing �)OFDM (Orthogonal Frequency Division Multiplexing �)
OFDM (Orthogonal Frequency Division Multiplexing )
 
Ofdma tutorial
Ofdma tutorialOfdma tutorial
Ofdma tutorial
 
Setting your 'Sales' for Success
Setting your 'Sales' for SuccessSetting your 'Sales' for Success
Setting your 'Sales' for Success
 
My thesis
My thesisMy thesis
My thesis
 
Ofdma
OfdmaOfdma
Ofdma
 
OFDM
OFDMOFDM
OFDM
 
An Overview : Peak to Average Power Ratio (PAPR) in OFDM system using some ne...
An Overview : Peak to Average Power Ratio (PAPR) in OFDM system using some ne...An Overview : Peak to Average Power Ratio (PAPR) in OFDM system using some ne...
An Overview : Peak to Average Power Ratio (PAPR) in OFDM system using some ne...
 
OFDM for LTE
OFDM for LTEOFDM for LTE
OFDM for LTE
 
OFDM
OFDMOFDM
OFDM
 
(Ofdm)
(Ofdm)(Ofdm)
(Ofdm)
 

Similar to Smart energy privacy tac tics2014

The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
PayamBarnaghi
 
Machine Learning in IOT
Machine Learning in IOTMachine Learning in IOT
Machine Learning in IOT
ArikumarKS2
 
Deep learning algorithms for intrusion detection systems in internet of thin...
Deep learning algorithms for intrusion detection systems in  internet of thin...Deep learning algorithms for intrusion detection systems in  internet of thin...
Deep learning algorithms for intrusion detection systems in internet of thin...
IJECEIAES
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
Editor IJMTER
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
SyedSaqlain32
 
June 2020: Top Download Articles in Advanced Computational Intelligence
June 2020: Top Download Articles in Advanced Computational IntelligenceJune 2020: Top Download Articles in Advanced Computational Intelligence
June 2020: Top Download Articles in Advanced Computational Intelligence
aciijournal
 
Internet of Things based smart campus - smart car parking
Internet of Things based smart campus - smart car parkingInternet of Things based smart campus - smart car parking
Internet of Things based smart campus - smart car parking
Chandan Taluja
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
Ahmed Banafa
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
ijccsa
 
Complex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on ArduinoComplex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on Arduino
neirew J
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Arpan pal u world2012
Arpan pal u world2012Arpan pal u world2012
Arpan pal u world2012
Arpan Pal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
 
Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities
PayamBarnaghi
 
An Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfAn Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdf
CIOWomenMagazine
 
Smart home for specially abled
Smart home for specially abledSmart home for specially abled
Smart home for specially abled
ArvindKumar1806
 
u world 2012, Dalian, China
u world 2012, Dalian, China u world 2012, Dalian, China
u world 2012, Dalian, China
Arpan Pal
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
Tauseef Naquishbandi
 
Smart health
Smart healthSmart health
Smart health
Tauseef Naquishbandi
 
Data Privacy using IoTs in Smart Cities Project
 Data Privacy using IoTs in Smart Cities Project Data Privacy using IoTs in Smart Cities Project
Data Privacy using IoTs in Smart Cities Project
IndicThreads
 

Similar to Smart energy privacy tac tics2014 (20)

The Internet of Things: What's next?
The Internet of Things: What's next? The Internet of Things: What's next?
The Internet of Things: What's next?
 
Machine Learning in IOT
Machine Learning in IOTMachine Learning in IOT
Machine Learning in IOT
 
Deep learning algorithms for intrusion detection systems in internet of thin...
Deep learning algorithms for intrusion detection systems in  internet of thin...Deep learning algorithms for intrusion detection systems in  internet of thin...
Deep learning algorithms for intrusion detection systems in internet of thin...
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
June 2020: Top Download Articles in Advanced Computational Intelligence
June 2020: Top Download Articles in Advanced Computational IntelligenceJune 2020: Top Download Articles in Advanced Computational Intelligence
June 2020: Top Download Articles in Advanced Computational Intelligence
 
Internet of Things based smart campus - smart car parking
Internet of Things based smart campus - smart car parkingInternet of Things based smart campus - smart car parking
Internet of Things based smart campus - smart car parking
 
IoT implementation and Challenges
IoT implementation and ChallengesIoT implementation and Challenges
IoT implementation and Challenges
 
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOCOMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINO
 
Complex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on ArduinoComplex Event Processing Using IOT Devices Based on Arduino
Complex Event Processing Using IOT Devices Based on Arduino
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Arpan pal u world2012
Arpan pal u world2012Arpan pal u world2012
Arpan pal u world2012
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities Semantic Technologies for the Internet of Things: Challenges and Opportunities
Semantic Technologies for the Internet of Things: Challenges and Opportunities
 
An Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdfAn Analysis of the Architecture of the Internet of Things.pdf
An Analysis of the Architecture of the Internet of Things.pdf
 
Smart home for specially abled
Smart home for specially abledSmart home for specially abled
Smart home for specially abled
 
u world 2012, Dalian, China
u world 2012, Dalian, China u world 2012, Dalian, China
u world 2012, Dalian, China
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
 
Smart health
Smart healthSmart health
Smart health
 
Data Privacy using IoTs in Smart Cities Project
 Data Privacy using IoTs in Smart Cities Project Data Privacy using IoTs in Smart Cities Project
Data Privacy using IoTs in Smart Cities Project
 

More from Arpan Pal

Mobisys io t_health_arpanpal
Mobisys io t_health_arpanpalMobisys io t_health_arpanpal
Mobisys io t_health_arpanpal
Arpan Pal
 
Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4
Arpan Pal
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
Arpan Pal
 
Healthcare arpan pal gws
Healthcare arpan pal gwsHealthcare arpan pal gws
Healthcare arpan pal gws
Arpan Pal
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
Arpan Pal
 
Arpan pal u-world
Arpan pal   u-worldArpan pal   u-world
Arpan pal u-world
Arpan Pal
 
Arpan pal csi2012
Arpan pal csi2012Arpan pal csi2012
Arpan pal csi2012
Arpan Pal
 
Arpan pal ncccs
Arpan pal ncccsArpan pal ncccs
Arpan pal ncccs
Arpan Pal
 
Arpan pal tac tics2012
Arpan pal tac tics2012Arpan pal tac tics2012
Arpan pal tac tics2012
Arpan Pal
 
Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013
Arpan Pal
 
Arpan pal besu
Arpan pal besuArpan pal besu
Arpan pal besu
Arpan Pal
 
Bitm2003 802.11g
Bitm2003 802.11gBitm2003 802.11g
Bitm2003 802.11g
Arpan Pal
 
Contest presentation ocr
Contest presentation ocrContest presentation ocr
Contest presentation ocr
Arpan Pal
 
Contest presentation epg
Contest presentation epgContest presentation epg
Contest presentation epg
Arpan Pal
 
Embedded
EmbeddedEmbedded
Embedded
Arpan Pal
 
Grid computing iot_sci_bbsr
Grid computing iot_sci_bbsrGrid computing iot_sci_bbsr
Grid computing iot_sci_bbsr
Arpan Pal
 
Euro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallengesEuro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallenges
Arpan Pal
 
Generic mac
Generic macGeneric mac
Generic mac
Arpan Pal
 
Heig tcs
Heig tcsHeig tcs
Heig tcs
Arpan Pal
 
Hip case study tcs iitb
Hip case study tcs iitbHip case study tcs iitb
Hip case study tcs iitb
Arpan Pal
 

More from Arpan Pal (20)

Mobisys io t_health_arpanpal
Mobisys io t_health_arpanpalMobisys io t_health_arpanpal
Mobisys io t_health_arpanpal
 
Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4Tcs tele rehab-hod-0.4
Tcs tele rehab-hod-0.4
 
Io t standard_bis_arpanpal
Io t standard_bis_arpanpalIo t standard_bis_arpanpal
Io t standard_bis_arpanpal
 
Healthcare arpan pal gws
Healthcare arpan pal gwsHealthcare arpan pal gws
Healthcare arpan pal gws
 
Io t of actuating things
Io t of actuating thingsIo t of actuating things
Io t of actuating things
 
Arpan pal u-world
Arpan pal   u-worldArpan pal   u-world
Arpan pal u-world
 
Arpan pal csi2012
Arpan pal csi2012Arpan pal csi2012
Arpan pal csi2012
 
Arpan pal ncccs
Arpan pal ncccsArpan pal ncccs
Arpan pal ncccs
 
Arpan pal tac tics2012
Arpan pal tac tics2012Arpan pal tac tics2012
Arpan pal tac tics2012
 
Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013Arpan pal gridcomputing_iot_uworld2013
Arpan pal gridcomputing_iot_uworld2013
 
Arpan pal besu
Arpan pal besuArpan pal besu
Arpan pal besu
 
Bitm2003 802.11g
Bitm2003 802.11gBitm2003 802.11g
Bitm2003 802.11g
 
Contest presentation ocr
Contest presentation ocrContest presentation ocr
Contest presentation ocr
 
Contest presentation epg
Contest presentation epgContest presentation epg
Contest presentation epg
 
Embedded
EmbeddedEmbedded
Embedded
 
Grid computing iot_sci_bbsr
Grid computing iot_sci_bbsrGrid computing iot_sci_bbsr
Grid computing iot_sci_bbsr
 
Euro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallengesEuro india2006 wirelessradioembeddedchallenges
Euro india2006 wirelessradioembeddedchallenges
 
Generic mac
Generic macGeneric mac
Generic mac
 
Heig tcs
Heig tcsHeig tcs
Heig tcs
 
Hip case study tcs iitb
Hip case study tcs iitbHip case study tcs iitb
Hip case study tcs iitb
 

Recently uploaded

Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 

Recently uploaded (20)

Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 

Smart energy privacy tac tics2014

  • 1. 1Copyright © 2011 Tata Consultancy Services Limited Sensor Data Sensitivity Analysis for Privacy Negotiation in IoT with focus on Smart Meters Dr. Arpan Pal Principal Scientist and Research Head Innovation Lab, Kolkata Tata Consultancy Services With Arijit Ukil and Soma Bandyopadhyay, Innovation Lab, Kolkata
  • 2. Motivation Problem Statement Proposed Approach and Results Conclusion and Future Work
  • 3. 3 Signal Processing Internet-of-Things - towards Intelligent Infrastructure Sense Extract Analyze Respond Learn Monitor Intelligent Infra @Home @Building @Vehicle @Utility @Mobile @Store @Road “Intelligent” (Cyber) “Infrastructure” (Physical) APPLICATION SERVICES BACK-END PLATFORM INTERNET GATEWAY Sense Extract Analyze Respond Communication Computing
  • 4. 4 Home Utility Management Solution (HUMS) Utility Appliances Smart Plugs Intelligent Gateway Smart Meter Demand Forecasting Demand Response Appliance Management Consumption View Appliance Scheduling On-off Control Social Network Integration Consumer Home Analytics  Numerous data are going out  Carries sensitive / private information.  Disaggregation of per appliance based consumption.  Better utility: more data granularity: more private info.  Customer @ Netherlands  Need to know Appliance Type / make / Model from aggregated Smart Meter Data  Disaggregation based NILM
  • 5. 5 Smart Energy Disaggregation: Privacy Concern  Activity monitoring  Advantage: Personalized services and recommendation like theft detection, elderly monitoring (University of Virginia’s ALARMNET, Harvard’s CodeBlue)  Privacy issue: Leads to private data (smart meter data) leakage, Activity at Home becomes known – can lead to various privacy leakage –especially for consumption behaviours that are anomalous w.r.t aggregate behaviour (intra-day, intra-week, intra-month, intra-customer) [1] [www.winlab.rutgers.edu/~gruteser/papers/fp023-roufPS.pdf [1]
  • 6. 6 Privacy Negotiation – Need for Sensitivity Analysis • Helps Users to get a better understanding of privacy leakage from the data they are sharing – is it worth the utility provided by the application? • Help in comparing similar utility applications from privacy perspective • Tune Privacy preservation adaptively before sharing data to applications Privacy Utility Privacy Preservation Tool Sensitivity Analysis
  • 7. Motivation Problem Statement Proposed Approach and Results Conclusion and Future Work
  • 8. 8 Sensitivity Detection and Analysis  Privacy as a function of sensitivity detection and analysis  Explores intrinsic statistical properties of smart meter data (time-series data) for sensitivity analysis and detection  Information theoretic model for privacy measurement  Works on generic time-series data
  • 9. 9 Privacy Analyzer in Smart Energy Management PPDM: Privacy preserving data mining, one of privacy enhancing methods [2] × Only Anonymization does not help, need to analyze the diversity also [3] × Existing Diversity algorithms like l- diversity are computationally heavy – cannot suite IoT real-time requirement × Existing diversity algorithms can work on quasi-identifiers in sensor metadata and not on the real sensor data  Unless we work on the sensor data, we cannot get fine-grain privacy negotiation control – need sensitivity analysis [2] M. Hamblen. “Privacy algorithms: Technology-based protections could make personal data impersonal”. Computerworld, Oct. 14 2002. [3] Ashwin Machanavajjhala et. al., “ℓ-Diversity: Privacy Beyond k-Anonymity”, www.cs.cornell.edu/~vmuthu/research/ldiversity.pdf
  • 10. 10 State of the Art – Sensitivity Analysis of Smart Meter Data Intrusive monitoring  Application-specific monitoring through dedicated hardware: using The Energy detective (TED) [4], battery-based load obfuscation [5]. × Need Dedicated Hardware × Need Training – Supervised Learning Non-intrusive monitoring × Supervised NILM using disaggregation [8] Our Goal  Improvement in NILM based Sensitivity Analysis for Privacy Negotiation as compared to available privacy measures × Z-score [6]: 3-sigma based analysis – very high false negatives × Modified z-score [7]: high false negatives [4] A. Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, D. Irwin, "Private memoirs of a smart meter," ACM BuildSys, pp. 61 - 66, 2010. [5] W. Yang, N. Li, Y. Qi, Wahbeh Qardaji, Stephen McLaughlin, Patrick McDaniel," Minimizing Private Data Disclosures in the Smart Grid," ACM CCS, pp. 415-427, 2012. [6] R. Rao, S. Akella, G. Guley, "Power Line Carrier (PLC) Signal Analysis of Smart Meters for Outlier Detection," IEEE SmartGridComm, pp. 291 - 296, 2011. [7] R. M. Nascimento, et al., Outliers’ Detection and Filling Algorithms for Smart Metering Centers ," IEEE PES , pp.1 - 6, 2012. [8] K. Srinivasarengan, Y.G. Goutam, M.G. Chandra, and S. Kadhe, "A Framework for Non Intrusive Load Monitoring Using Bayesian Inference," IEEE IMIS, pp. 427 423, 2013.
  • 11. Motivation Problem Proposed Approach and Results Conclusion and Future Work
  • 12. 12 Proposed Sensitivity Detection Algorithm 1. Find kurtosis to understand spread of distribution of meter data 2. If kurtosis < 3: use Hampel [9] identifier for detecting sensitivity points  Minimizes masking effect through outlier processing – reduces false negatives 3. Else: use modified Rosner [10] filter for sensitivity detection  Minimizes swamping effect through iterative backward testing - reduces false positives  Modification in backward testing criteria through fitting in student-t distribution 4. Compute Sensitivity Density by normalizing within given time period under consideration 5. Privacy Negotiation using the Sensitivity Density  Additional application specific parameter tuning – sampling resolution, block size [9] Hampel: H. Liu, S. Shah, W. Jiang, "On-line outlier detection and data cleaning," Elsevier Computers and Chemical Engineering, pp. 1635–1647, 2004. [10] Rosner: B. Rosner, “On the Detection of Many Outliers.” Technometrics, vol. 17, pp. 221–227, 1975.
  • 13. 13 Sensitivity Detection - Results [11] Experimented with REDD dataset (Z. Kolter, and M, J. Johnson, "REDD: A public data set for energy disaggregation research," SustKDD, 2011) of 24 hour, 1 Hz sampling Proposed Scheme Proposed Scheme
  • 14. 14 Privacy Gain Analysis: Results Privacy gain w.r.t. NILM [8] Privacy gain w.r.t. supervised learning [4] Proposed Scheme Proposed Scheme
  • 15. 15 Privacy Breach Attack Analysis Privacy Quantification Sensitivity detection Privacy Preservation Privacy Breach Attack with Disaggregation Algorithm (NILM) Smart meter data Privacy Preserved Data Out Privacy Breach Attack Success Count
  • 16. 16 Privacy Breach Attack: Results Privacy Analyzer successfully defends leaking of fridge and high power appliance signature. [12] Submitted in Infocom 2014, IPSN 2014 [13] Two patent filing under progress
  • 17. Motivation Problem Proposed Approach and Results Conclusion and Future Work
  • 18. 18 Conclusion  Sensitivity detection with higher accuracy: minimal false positive and negative alarms.  Privacy-utility trade-off with low power appliance detection capability while fridge and high power appliance detection suppressed.  Cost-effective compared to supervised learning based schemes, which require additional hardware like TED (The Energy Detector). Assuming a household has around 10 electrical appliances; using TED 5000-C costs more than 2000 USD.  No additional infrastructure, non-invasive: high scalability, maintainability.
  • 19. 19 Future Work  Further Reduce Computational Complexity  Improve Privacy Quantification Calculation  Sensitivity analysis through learning of collective energy usage pattern: Detection of sensitivity considering large set of smart meter data from number of households. – Detection of Unusual Pattern across days / months / seasons / consumers

Editor's Notes

  1. Buiness Application