Model-driven Privacy Assessment in the Smart Grid

Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frincu, Viktor Prasanna

2015

Abstract

In a smart grid, data and information are transported, transmitted, stored, and processed with various stakeholders having to cooperate effectively. Furthermore, personal data is the key to many smart grid applications and therefore privacy impacts have to be taken into account. For an effective smart grid, well integrated solutions are crucial and for achieving a high degree of customer acceptance, privacy should already be considered at design time of the system. To assist system engineers in early design phase, frameworks for the automated privacy evaluation of use cases are important. For evaluation, use cases for services and software architectures need to be formally captured in a standardized and commonly understood manner. In order to ensure this common understanding for all kinds of stakeholders, reference models have recently been developed. In this paper we present a model-driven approach for the automated assessment of such services and software architectures in the smart grid that builds on the standardized reference models. The focus of qualitative and quantitative evaluation is on privacy. For evaluation, the framework draws on use cases from the University of Southern California microgrid.

References

  1. Ahmed, M., Anjomshoaa, A., Nguyen, T., and Tjoa, A. (2007). Towards an ontology-based risk assessment in collaborative environment using the semanticlife. In Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 07, pages 400-407, Washington, DC, USA. IEEE Computer Society.
  2. Barker, K., Askari, M., Banerjee, M., Ghazinour, K., Mackas, B., Majedi, M., Pun, S., and Williams, A. (2009). A data privacy taxonomy. In Proceedings of the 26th British National Conference on Databases: Dataspace: The Final Frontier, BNCOD 26, pages 42-54, Berlin, Heidelberg. Springer.
  3. Boehm, B. (2006). A view of 20th and 21st century software engineering. In Proceedings of the 28th International Conference on Software Engineering, ICSE 2006, pages 12-29, New York, NY, USA. ACM.
  4. Cavoukian, A., Polonetsky, J., and Wolf, C. (2010). Smartprivacy for the smart grid: embedding privacy into the design of electricity conservation. Identity in the Information Society, 3(2):275-294.
  5. CEN, Cenelec and ETSI (2012a). Smart Grid Information Security. Technical report, CEN/Cenelec/ETSI Smart Grid Coordination Group Std.
  6. CEN, Cenelec and ETSI (2012b). Smart Grid Reference Architecture. Technical report, CEN/Cenelec/ETSI Smart Grid Coordination Group Std.
  7. Chen, B., Kalbarczyk, Z., Nicol, D., Sanders, W., Tan, R., Temple, W., Tippenhauer, N., Vu, A., and Yau, D. (2013). Go with the flow: Toward workflow-oriented security assessment. In Proceedings of New Security Paradigm Workshop (NSPW), Banff, Canada.
  8. Dänekas, C., Neureiter, C., Rohjans, S., Uslar, M., and Engel, D. (2014). Towards a model-driven-architecture process for smart grid projects. In Benghozi, P.-J., Krob, D., Lonjon, A., and Panetto, H., editors, Digital Enterprise Design & Management, volume 261 of Advances in Intelligent Systems and Computing, pages 47-58. Springer International Publishing.
  9. Guarino, N., Oberle, D., and Staab, S. (2009). What Is an Ontology? Handbook on Ontologies - International Handbooks on Information Systems. Springer, 2nd edition.
  10. Knirsch, F., Engel, D., Frincu, M., and Prasanna, V. (2015). Model-based assessment for balancing privacy requirements and operational capabilities in the smart grid. In Proceedings of the 6th Conference on Innovative Smart Grid Technologies (ISGT2015). to appear.
  11. Kost, M. and Freytag, J.-C. (2012). Privacy analysis using ontologies. In CODASPY 7812 Proceedings of the second ACM conference on Data and Application Security and Privacy, pages 205-2016, San Antonio, Texas, USA. ACM.
  12. Kost, M., Freytag, J.-C., Kargl, F., and Kung, A. (2011). Privacy verification using ontologies. In Proceedings of the 2011 Sixth International Conference on Availability, Reliability and Security, ARES 7811, pages 627-632, Washington, DC, USA. IEEE Computer Society.
  13. Langer, L., Skopik, F., Kienesberger, G., and Li, Q. (2013). Privacy issues of smart e-mobility. In Industrial Electronics Society, IECON 2013 - 39th Annual Conference of the IEEE, pages 6682-6687.
  14. McDaniel, P. and McLaughlin, S. (2009). Security and privacy challenges in the smart grid. Security Privacy, IEEE, 7(3):75-77.
  15. National Institute of Standards and Technology (2010). Guidelines for smart grid cyber security: Vol. 2, privacy and the smart grid. Technical report, The Smart Grid Interoperability Panel - Cyber Security Working Group.
  16. National Institute of Standards and Technology (2012). NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0. Technical Report NIST Special Publication 1108R2, National Institute of Standards and Technology.
  17. Neureiter, C., Eibl, G., Veichtlbauer, A., and Engel, D. (2013). Towards a framework for engineering smartgrid-speficic privacy requirements. In Proc. IEEE IECON 2013, Special Session on Energy Informatics, Vienna, Austria. IEEE.
  18. Shearer, R., Motik, B., and Horrocks, I. (2008). Hermit: A highly-efficient owl reasoner. In Dolbear, C., Ruttenberg, A., and Sattler, U., editors, OWLED, volume 432 of CEUR Workshop Proceedings. CEUR-WS.org.
  19. Simmhan, Y., Kumbhare, A., Cao, B., and Prasanna, V. (2011a). An analysis of security and privacy issues in smart grid software architectures on clouds. In IEEE International Conference on Cloud Computing (CLOUD), 2011, pages 582-589. IEEE.
  20. Simmhan, Y., Zhou, Q., and Prasanna, V. (2011b). Semantic information integration for smart grid applications. In Kim, J. H. and Lee, M. J., editors, Green IT: Technologies and Applications, pages 361-380. Springer, Berlin Heidelberg, Germany.
  21. The European Parliament and the Council (1995). Official Journal L 281, 23/11/1995 P. 0031 - 0050 - Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995. Online.
  22. Wicker, S. and Schrader, D. (2011). Privacy-aware design principles for information networks. Proceedings of the IEEE, 99(2):330-350.
Download


Paper Citation


in Harvard Style

Knirsch F., Engel D., Neureiter C., Frincu M. and Prasanna V. (2015). Model-driven Privacy Assessment in the Smart Grid . In Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-081-9, pages 173-181. DOI: 10.5220/0005229601730181


in Bibtex Style

@conference{icissp15,
author={Fabian Knirsch and Dominik Engel and Christian Neureiter and Marc Frincu and Viktor Prasanna},
title={Model-driven Privacy Assessment in the Smart Grid},
booktitle={Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2015},
pages={173-181},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005229601730181},
isbn={978-989-758-081-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Model-driven Privacy Assessment in the Smart Grid
SN - 978-989-758-081-9
AU - Knirsch F.
AU - Engel D.
AU - Neureiter C.
AU - Frincu M.
AU - Prasanna V.
PY - 2015
SP - 173
EP - 181
DO - 10.5220/0005229601730181