Trusted and privacy-preserving mechanism for electricity usage data disclosure using verifiable noise
First Claim
1. A method of energy usage data privacy preservation, the method comprising:
- downloading energy usage data and a signature from a repository;
receiving input effective to select a noise bound;
determining whether the signature is that of a utility;
rejecting the energy usage data when the signature is not that of the utility; and
when the signature is that of the utility;
generating noisy data by adding random noise to the energy usage data, the random noise being configured to vary the energy usage data by an amount less than the noise bound;
encrypting a message-signature pair that includes the energy usage data and a verified signature;
constructing a proof configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language; and
communicating the noisy data, the encrypted message-signature pair, and the proof to a third party.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of energy usage data privacy preservation is described. The method includes downloading energy usage data and a signature from a repository. The method includes determining whether the signature is that of a utility. When the signature is not that of the utility, the method includes rejecting the energy usage data. When the signature is that of the utility, the method includes generating noisy data, encrypting a message-signature pair, constructing a proof, and communicating the noisy data, the encrypted message-signature pair, and the proof to a third party. The noisy data is generated by adding random noise to the energy usage data. The message-signature pair includes the energy usage data and a verified signature. The proof is configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language.
19 Citations
14 Claims
-
1. A method of energy usage data privacy preservation, the method comprising:
-
downloading energy usage data and a signature from a repository; receiving input effective to select a noise bound; determining whether the signature is that of a utility; rejecting the energy usage data when the signature is not that of the utility; and when the signature is that of the utility; generating noisy data by adding random noise to the energy usage data, the random noise being configured to vary the energy usage data by an amount less than the noise bound; encrypting a message-signature pair that includes the energy usage data and a verified signature; constructing a proof configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language; and communicating the noisy data, the encrypted message-signature pair, and the proof to a third party. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium having encoded therein programming code executable by a processor to perform operations comprising:
-
downloading energy usage data and a signature from a repository; receiving input effective to select a noise bound; determining whether the signature is that of a utility; rejecting the energy usage data when the signature is not that of the utility; and when the signature is that of the utility; generating noisy data by adding random noise to the energy usage data, the random noise being configured to vary the energy usage data by an amount less than the noise bound; encrypting a message-signature pair that includes the energy usage data and a verified signature; constructing a proof configured to establish that the encrypted message-signature pair and the noisy data are members of a corresponding proof language; and communicating the noisy data, the encrypted message-signature pair, and the proof to a third party. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification