Font Size: a A A

Research On The Demand Side Privacy Preserving Method Under Incentive-based Demand Response In Smart Grid

Posted on:2020-06-26Degree:MasterType:Thesis
Country:ChinaCandidate:K WangFull Text:PDF
GTID:2392330578466729Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The Advanced Metering Infrastructure in smart grid provides an efficient method for monitoring and adjustment,which in turn enables the possibility for the electricity market to maintain the supply-demand balance like a traditional market.The currently most promising implementation for this is the “Demand Response” measures,and the “Incentive-Based Demand Response”(IDR)is believed to be the most effective measure.However,the implementation of IDR requires the finegrained electricity consumption data from customers to be collected,which poses a serious threat to customer's privacy security.To design an IDR system that can protect the customer's privacy on the demand side,in this paper,an IDR system structure is firstly designed.Then the known IDR privacy preserving methods are especially analyzed while the privacy security leak known as “depseudonymization attacks” lurking in these methods are discussed.As a more secure method to renew customers' pseudonyms,the “coordinated renew rule” is presented and implemented based on DLREP restrictive blind signature.At the same time,the DLREP restrictive blind signature scheme is used to design a rewards extraction-redemption method and the Schnorr signature scheme is used for billing data transmission.Comparing with currently known methods,these methods have a better struct that can be proven to be secure and also a better computational performance.Finally,an IDR system which can protect the privacy safety of customers on the demand side is described,which has better computational performance comparing with known scheme,and is theoretically proven to have also a better effect in privacy protection.
Keywords/Search Tags:Demand Side, Incentive-Based Demand Response, Depseudonymization Attack, Privacy Preserving, Blind Signature
PDF Full Text Request
Related items