Print Email Facebook Twitter An efficient privacy-preserving comparison protocol in smart metering systems Title An efficient privacy-preserving comparison protocol in smart metering systems Author Nateghizad, M. (TU Delft Cyber Security) Erkin, Z. (TU Delft Cyber Security) Lagendijk, R.L. (TU Delft Cyber Security) Date 2016 Abstract In smart grids, providing power consumption statistics to the customers and generating recommendations for managing electrical devices are considered to be effective methods that can help to reduce energy consumption. Unfortunately, providing power consumption statistics and generating recommendations rely on highly privacy-sensitive smart meter consumption data. From the past experience, we see that it is essential to find scientific solutions that enable the utility providers to provide such services for their customers without damaging customers’ privacy. One effective approach relies on cryptography, where sensitive data is only given in the encrypted form to the utility provider and is processed under encryption without leaking content. The proposed solutions using this approach are very effective for privacy protection but very expensive in terms of computation and communication. In this paper, we focus on an essential operation for designing a privacy-preserving recommender system for smart grids, namely comparison, that takes two encrypted values and outputs which one is greater than the other one. We improve the state-of-the-art comparison protocol based on Homomorphic Encryption in terms of computation and communication by 56 and 25 %, respectively, by introducing algorithmic changes and data packing. As the smart meters are very limited devices, the overall improvement achieved is promising for the future deployment of such cryptographic protocols for enabling privacy enhanced services in smart grids. Subject Homomorphic encryptionPrivacyRecommender systemSecure comparisonSmart metering To reference this document use: http://resolver.tudelft.nl/uuid:cc0542a3-dbcd-4905-a153-37206101d453 DOI https://doi.org/10.1186/s13635-016-0033-4 ISSN 1687-4161 Source Eurasip Journal on Information Security, 2016 (1) Part of collection Institutional Repository Document type journal article Rights © 2016 M. Nateghizad, Z. Erkin, R.L. Lagendijk Files PDF art_3A10.1186_2Fs13635_01 ... 0033_4.pdf 585.22 KB Close viewer /islandora/object/uuid:cc0542a3-dbcd-4905-a153-37206101d453/datastream/OBJ/view