TRUSTED AND PRIVACY-PRESERVING MECHANISM FOR ELECTRICITY USAGE DATA DISCLOSURE USING VERIFIABLE NOISE
First Claim
1. A method of energy usage data privacy preservation, the method comprising:
- downloading energy usage data and a signature from a repository;
determining whether the signature is that of a utility;
rejecting the energy usage data when the signature is not that of the utility; and
when the signature is that of the utility;
generating noisy data by adding random noise to the energy usage data;
encrypting a message-signature pair that includes the energy usage data and a verified signature;
constructing a proof configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language; and
communicating the noisy data, the encrypted message-signature pair, and the proof to a third party.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of energy usage data privacy preservation is described. The method includes downloading energy usage data and a signature from a repository. The method includes determining whether the signature is that of a utility. When the signature is not that of the utility, the method includes rejecting the energy usage data. When the signature is that of the utility, the method includes generating noisy data, encrypting a message-signature pair, constructing a proof, and communicating the noisy data, the encrypted message-signature pair, and the proof to a third party. The noisy data is generated by adding random noise to the energy usage data. The message-signature pair includes the energy usage data and a verified signature. The proof is configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language.
13 Citations
28 Claims
-
1. A method of energy usage data privacy preservation, the method comprising:
-
downloading energy usage data and a signature from a repository; determining whether the signature is that of a utility; rejecting the energy usage data when the signature is not that of the utility; and when the signature is that of the utility; generating noisy data by adding random noise to the energy usage data; encrypting a message-signature pair that includes the energy usage data and a verified signature; constructing a proof configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language; and communicating the noisy data, the encrypted message-signature pair, and the proof to a third party. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of demand response (DR) event implementation comprising:
-
communicating a curtailment request of a DR event to a customer; requesting energy usage data of the customer during the DR event following the DR event; receiving noisy data, an encrypted message-signature pair, and a proof, the noisy data including energy usage data with random noise; determining whether the proof is a valid proof of an expression stating that the noisy data and the encrypted message-signature pair are members of a corresponding proof language; and when the proof is a valid proof of the expression; accepting the noisy data as the requested energy usage data; and evaluating compliance of the customer with the DR event based at least partially on the noisy data. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium having encoded therein programming code executable by a processor to perform operations comprising:
-
downloading energy usage data and a signature from a repository; determining whether the signature is that of a utility; rejecting the energy usage data when the signature is not that of the utility; and when the signature is that of the utility; generating noisy data by adding random noise to the energy usage data; encrypting a message-signature pair that includes the energy usage data and a verified signature; constructing a proof configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language; and communicating the noisy data, the encrypted message-signature pair, and the proof to a third party. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
-
22. A non-transitory computer-readable medium having encoded therein programming code executable by a processor to perform operations comprising:
-
communicating a curtailment request of a DR event to a customer; requesting energy usage data of the customer during the DR event following the DR event; receiving noisy data, an encrypted message-signature pair, and a proof, the noisy data including energy usage data with random noise; determining whether the proof is a valid proof of an expression stating that the noisy data and the encrypted message-signature pair are members of a corresponding proof language; and when the proof is a valid proof of the expression; accepting the noisy data as the requested energy usage data; and evaluating compliance of the customer with the DR event based at least partially on the noisy data. - View Dependent Claims (23, 24, 25, 26, 27, 28)
-
Specification