DFG Research Training Group 2153: "Energy Status Data - Informatics Methods for its Collection, Analysis and Exploitation"

M.Sc. Rebecca Schwerdt

  • Institut für Theoretische Informatik (ITI)
    Arbeitsgruppe Kryptographie und Sicherheit
    Informatik-Hauptgebäude (Geb. 50.34)
    Am Fasanengarten 5
    Raum 251

Research Abstract

In handling and utilizing private energy data there is always a trade-off between utility and privacy which needs to be considered carefully. Current research concerning energy data mainly focuses on the notion of ‘differential privacy’ for release mechanisms, which guarantees for every participant, that whether his data is included in a database or not does not influence the releases significantly. Although this is a very strong and desirable guarantee, it might not be applicable to all energy related cases. Firstly differential privacy seems to be too strong to admit certain utilities, like applications requiring that no noise is added to specific releases, as would be the case for billing. Secondly it was shown that differential privacy methods require the underlying data to be statistically independent, which can not always be expected in energy related scenarios. My research focuses not only on differential privacy but also other possible notions of privacy and their respective applicability to private energy data.

In order to find suitable notions of privacy and develop privacy preserving methods that translate well from theory to practice, the requirements of the existing legal framework need to be met and the surrounding technical system and the privacy implications of its possibilities and restrictions need to be understood. Both the legal and the engineering related aspect show potential for collaborations with other graduates in the research training group.

Another pivotal question of future grid communication is the security aspect. In addition to preventing things such as fraud or attacks on the grid, security protocols also play a vital role in preserving data privacy of the enduser. On this topic I am able to closely work with other researchers at my PI’s chair, who aim to develop cryptographic components for future energy grids, that can easily be combined to assemble a complete system of secure communication fitting different scenarios. Possible use cases we look at are vehicle to grid communication or the use of smart home appliances, both combining different security, privacy and utility requirements.