{"title":"Customer-centric energy usage data management and sharing in smart grid systems","authors":"Gaurav Lahoti, D. Mashima, Wei-Peng Chen","doi":"10.1145/2516930.2516935","DOIUrl":"https://doi.org/10.1145/2516930.2516935","url":null,"abstract":"A recent study revealed that fine-grained energy usage data could potentially leak sensitive information about an electricity customer. On the other hand, a number of online service providers utilizing such data have emerged and improved effectiveness of smart grid technologies (for instance, demand-response aggregators), and therefore sharing of data is getting popular. In this work, we propose a customer-centric framework to manage, store, and share energy usage data in a privacy-enhanced way. We present a mechanism to enable customers to flexibly control the amount of energy usage information disclosed while still allowing third-party service providers to be convinced of the authenticity of data. A prototype implementation using the widely used Green Button data model is presented and evaluated. We further discuss the design of a demand-response aggregation service on top of the proposed framework.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125639800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Weaver, C. Cheh, E. Rogers, W. Sanders, Dennis Gammel
{"title":"Toward a cyber-physical topology language: applications to NERC CIP audit","authors":"G. Weaver, C. Cheh, E. Rogers, W. Sanders, Dennis Gammel","doi":"10.1145/2516930.2516934","DOIUrl":"https://doi.org/10.1145/2516930.2516934","url":null,"abstract":"Our Cyber-Physical Topology Language (CPTL) provides a language that utilities can use to programmatically analyze current and future cyber-physical architectures. The motivation for our research emerged from the importance and limitations of several audit scenarios: account management, vulnerability assessment, and configuration management. Those scenarios occur in the context of the North American Electric Reliability Corporation's Critical Infrastructure Protection (NERC CIP) audits. The NERC CIP standards define security controls by which utilities must be audited. Although the standards were designed to make power control networks less vulnerable to cyber attack and to decrease the chance of outages, the audit process is manual and costly. In order to save utilities and auditors time and money, we used the limitations of those audit scenarios in formally specifying and implementing CPTL, which consists of both a representation of cyber-physical assets and operations upon that representation. First, CPTL uses graph theory to represent a network of cyber-physical assets; we currently implement this representation in GraphML. Second, CPTL defines operations upon that representation. In this paper, we introduce operators to process attributes by expanding and contracting components of a network, and implement these operations using the Boost Graph Library (BGL). In order to demonstrate the potential for CPTL to save auditors and utilities time and money, we provide a detailed example of how CPTL could help with vulnerability assessment and discuss additional applications beyond the audit scenarios mentioned above. We describe current approaches to those scenarios and argue that CPTL improves upon both the state-of-the-art and current practice. In fact, we intend CPTL to enable a broad range of new research on realistic cyber-physical architectures by giving utilities, auditors, managers, and researchers a common language with which to communicate and analyze those architectures.","PeriodicalId":303004,"journal":{"name":"ACM workshop on Smart Energy Grid Security","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121154997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}