Utility-Privacy Tradeoff Based on Random Data Obfuscation in Internet of Energy

Zhitao Guan, Guanlin Si, Jun Wu*, Liehuang Zhu, Zijian Zhang, Yinglong Ma

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

11 Citations (Scopus)

Abstract

Internet of Energy is considered as a promising approach to solve the problems of energy crisis and carbon emission. It needs to collect user's real-time data for optimizing the energy utilization. However, such data may disclose user's privacy information. Previous works usually adopt specific obfuscation value to mask user's data and counteract the deviation through data aggregation; these works can preserve the data privacy effectively, but most of them consider less about the data-utility (precision). In this paper, we propose a utility-privacy tradeoff scheme based on random data obfuscation in Internet of Energy. In the proposed scheme, we adopt random data-obfuscation to mask the real-time data and realize the fault-tolerance during data aggregation, and the random obfuscation value obeys the Laplace distribution. We use the signal-to-noise ratio to quantify the level of utility; we measure the level of privacy through information entropy. Based on these two Indicators, we balance the utility-privacy tradeoff by calculating the optimal parameters of the Laplace distribution. The analysis shows that our scheme can meet the security requirement, and it also has better performance than that of other popular methods.

Original languageEnglish
Article number7840024
Pages (from-to)3250-3262
Number of pages13
JournalIEEE Access
Volume5
DOIs
Publication statusPublished - 2017
Externally publishedYes

Keywords

  • fault-tolerance
  • Internet of energy
  • random data obfuscation
  • utility-privacy tradeoff

ASJC Scopus subject areas

  • Computer Science(all)
  • Materials Science(all)
  • Engineering(all)

Fingerprint

Dive into the research topics of 'Utility-Privacy Tradeoff Based on Random Data Obfuscation in Internet of Energy'. Together they form a unique fingerprint.

Cite this