Contrary, our privacy-friendly architecture stores en-
crypted 16-bit consumptions each with a 128-bit
MAC tag at the EMS. Thus, the storage requirements
of our architecture grow linearly with the number of
stored consumptions. Storing 100 million consump-
tions with their MAC tags requires 1.8 GB of stor-
age in contrast to 200 MB required to simply store
plaintext consumptions. Besides the overhead for the
EMS, each service must store the group-wise aggre-
gated keys sent by the KA, required to verify and de-
crypt the responses to queries directed to the EMS. If
a spatial grouping scheme is used while each group is
composed of five smart meters, the overhead of stor-
ing the keys required to decrypt all possible aggre-
gates composed of 100 million consumptions is about
343 MB for each service. Contrary, the KA must not
store any period keys. It must only store the private
symmetric key k
enc
sid
as well as the private-public key
pair (k
priv
sid
,k
pub
sid
) of each smart meter sid, such that the
storage requirements of the KA are equal to the num-
ber of smart meters multiplied with a constant factor
which corresponds to the key lengths. Thus, the stor-
age requirements of the KA are negligible.
8 CONCLUSIONS
This work presents a smart metering architecture
which is flexible enough to serve various services
while still preserving the customers’ privacy. Privacy
is preserved using a database storing purely encrypted
energy consumptions and a policy forcing a strict but
flexible grouping, like temporal and spatial grouping
of the smart meters. The database may be located in a
mutual suspicious cloud environment without affect-
ing our privacy guarantees. Third-party services, like
energy providers, can aggregate the encrypted con-
sumptions at the database level using various selec-
tive SQL queries. The responses to these queries can
only be successfully decrypted if the queries are valid
according to the grouping scheme and privacy poli-
cies enforced by a key authority. Thus, our protocol
requires a trusted third party. However, it is rarely in-
volved, as its primary task is to hand out sets of secret
encryption keys to the smart meters that can be used
for a long time. Finally, our privacy-friendly architec-
ture, while flexible, imposes only a moderate perfor-
mance and storage overhead.
ACKNOWLEDGMENTS
The work presented in this paper was partly supported
by the German BMWi SmartPowerHamburg project.
The views and conclusions contained herein are those
of the authors and should not be interpreted as nec-
essarily representing the official policies or endorse-
ments, either expressed or implied of the SmartPow-
erHamburg project.
REFERENCES
Agrawal, R., Kiernan, J., Srikant, R., and Xu, Y. (2004). Or-
der preserving encryption for numeric data. SIGMOD
’04. ACM.
Agrawal, S. and Boneh, D. (2009). Homomorphic MACs:
MAC-Based Integrity for Network Coding. ACNS
’09. Springer.
Ben-Or, M., Goldwasser, S., and Wigderson, A. (1988).
Completeness theorems for non-cryptographic fault-
tolerant distributed computation. STOC ’88. ACM.
Bohli, J.-M., Sorge, C., and Ugus, O. (2010). A privacy
model for smart metering. ICC ’10. IEEE.
Castelluccia, C., Mykletun, E., and Tsudik, G. (2005). Effi-
cient aggregation of encrypted data in wireless sensor
networks. MobiQuitous ’05.
Chaum, D., Cr´epeau, C., and Damgard, I. (1988). Mul-
tiparty unconditionally secure protocols. STOC ’88.
ACM.
Domingo-Ferrer, J. (2002). A provably secure additive
and multiplicative privacy homomorphism. ISC ’02.
Springer.
Efthymiou, C. and Kalogridis, G. (2010). Smart grid
privacy via anonymization of smart metering data.
SmartGridComm ’10. IEEE.
Enev, M., Gupta, S., Kohno, T., and Patel, S. N. (2011).
Televisions, video privacy, and powerline electromag-
netic interference. CCS ’11. ACM.
EnWG (2005). Energiewirtschaftsgesetz, Germany. BGBl I
2005, 1970. Geaendert durch Art. 8 G v. 2011 I 1634.
Federal Office for Information Security (2011). Protection
profile for the gateway of a smart metering system.
Garcia, F. D. and Jacobs, B. (2010). Privacy-friendly
energy-metering via homomorphic encryption. Lec-
ture Notes in Computer Science, V. 6710. Springer.
Johnson, R., Molnar, D., Song, D. X., and Wagner, D.
(2002). Homomorphic signature schemes. CT-RSA
’02. Springer.
Kursawe, K., Danezis, G., and Kohlweiss, M. (2011).
Privacy-friendly aggregation for the smart-grid. Lec-
ture Notes in Computer Science, V. 6794. Springer.
Li, F., Luo, B., and Liu, P. (2010). Secure information ag-
gregation for smart grids using homomorphic encryp-
tion. IEEE.
McLaughlin, S., McDaniel, P., and Aiello, W. (2011). Pro-
tecting consumer privacy from electric load monitor-
ing. CCS ’11. ACM.
Mykletun, E., Girao, J., and Westhoff, D. (2006). Public key
based cryptoschemes for data concealment in wireless
sensor networks. ICC ’06. IEEE.
HomomorphicPrimitivesforaPrivacy-friendlySmartMeteringArchitecture
111