Review of results on smart‐meter privacy by data manipulation, demand shaping, and load scheduling

F Farokhi - IET Smart Grid, 2020 - Wiley Online Library
Simple analysis of energy consumption patterns recorded by smart meters can be used to
deduce household occupancy. With access to higher‐resolution smart‐meter readings, we …

Privacy against statistical inference

F du Pin Calmon, N Fawaz - 2012 50th annual Allerton …, 2012 - ieeexplore.ieee.org
We propose a general statistical inference framework to capture the privacy threat incurred
by a user that releases data to a passive but curious adversary, given utility constraints. We …

Utility-privacy tradeoffs in databases: An information-theoretic approach

L Sankar, SR Rajagopalan… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Ensuring the usefulness of electronic data sources while providing necessary privacy
guarantees is an important unsolved problem. This problem drives the need for an analytical …

Context-aware generative adversarial privacy

C Huang, P Kairouz, X Chen, L Sankar, R Rajagopal - Entropy, 2017 - mdpi.com
Preserving the utility of published datasets while simultaneously providing provable privacy
guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such …

From the information bottleneck to the privacy funnel

A Makhdoumi, S Salamatian, N Fawaz… - … Workshop (ITW 2014 …, 2014 - ieeexplore.ieee.org
We focus on the privacy-utility trade-off encountered by users who wish to disclose some
information to an analyst, that is correlated with their private data, in the hope of receiving …

Smart meter privacy: A utility-privacy framework

SR Rajagopalan, L Sankar, S Mohajer… - … conference on smart …, 2011 - ieeexplore.ieee.org
End-user privacy in smart meter measurements is a well-known challenge in the smart grid.
The solutions offered thus far have been tied to specific technologies such as batteries or …

Privacy-preserving adversarial networks

A Tripathy, Y Wang, P Ishwar - 2019 57th Annual Allerton …, 2019 - ieeexplore.ieee.org
We propose a data-driven framework for optimizing privacy-preserving data release
mechanisms to attain the information-theoretically optimal tradeoff between minimizing …

Semidefinite programming approach to Gaussian sequential rate-distortion trade-offs

T Tanaka, KKK Kim, PA Parrilo… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Sequential rate-distortion (SRD) theory provides a framework for studying the fundamental
trade-off between data-rate and data-quality in real-time communication systems. In this …

Estimation efficiency under privacy constraints

S Asoodeh, M Diaz, F Alajaji… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
We investigate the problem of estimating a random variable Y under a privacy constraint
dictated by another correlated random variable X. When X and Y are discrete, we express …

Rate-distortion theory for the Shannon cipher system

H Yamamoto - IEEE Transactions on Information Theory, 1997 - ieeexplore.ieee.org
Rate distortion theory is considered for the Shannon cipher system (SCS). The admissible
region of cryptogram rate R, key rate R/sub k/, legitimate receiver's distortion D, and …