Towards a Holistic Privacy Engineering Approach for Smart Grid Systems

被引:11
作者
Fhom, Hervais Simo [1 ]
Bayarou, Kpatcha M. [1 ]
机构
[1] Fraunhofer Inst Secure Informat Technol, Rheinstr 75, D-64295 Darmstadt, Germany
来源
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11 | 2011年
关键词
REQUIREMENTS; AGGREGATION; ANONYMITY;
D O I
10.1109/TrustCom.2011.32
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting energy consumers's data and privacy is a key factor for the further adoption and diffusion of smart grid technologies and applications. However, current smart grid initiatives and implementations around the globe tend to either focus on the need for technical security to the detriment of privacy or consider privacy as a feature to add after system design. This paper aims to contribute towards filling the gap between this fact and the accepted wisdom that privacy concerns should be addressed as early as possible (preferably when modeling system's requirements). We present a methodological framework for tackling privacy concerns throughout all phases of the smart grid system development process. We describe methods and guiding principles to help smart grid engineers to elicit and analyze privacy threats and requirements from the outset of the system development, and derive the best suitable countermeasures, i.e. privacy enhancing technologies (PETs), accordingly. The paper also provides a summary of modern PETs, and discusses their context of use and contributions with respect to the underlying privacy engineering challenges and the smart grid setting being considered.
引用
收藏
页码:234 / 241
页数:8
相关论文
共 57 条
  • [1] Anderson R., 2010, WHO CONTROLS SWITCH
  • [2] [Anonymous], 2010, PROC 9 ANN ACM WORKS, DOI [10.1145/1866919.1866930, DOI 10.1145/1866919.1866930]
  • [3] [Anonymous], 2008, Security Engineering-A Guide to Building Dependable Distributed Systems
  • [4] [Anonymous], 2009, 4 INT S INF COMP COM, DOI DOI 10.1145/1533057.1533093
  • [5] [Anonymous], 2006, The security development lifecycle
  • [6] [Anonymous], 2000, Rethinking public key infrastructures and digital certificates: building in privacy
  • [7] [Anonymous], 2006, ZAKLADY STATISTIKY P
  • [8] ASHLEY P, 2003, ENTERPRISE PRIVACY A
  • [9] Berthier R, 2010, INT CONF SMART GRID, P350, DOI 10.1109/SMARTGRID.2010.5622068
  • [10] Bohli J.-M., 2010, P 1 IEEE INT WORKSH