
more technology-oriented approach. This is a conse-
quence of the technology-oriented composition of the
analysis team. While LINDDUN GO’s methodology
in itself is clearly beneficial, our experience confirms
that diverse analysis teams are indeed desirable.
Derivation of countermeasures can not be done
using LINDDUN GO alone as it requires some deeper
privacy knowledge, for example about privacy en-
hancing technologies.
The present work is considered as a starting point
in a detailed evaluation of LINDDUN GO. In this
first step, experience is gained by a detailed analysis
of a single use case. In future work, we would like
to study the applicability on a broader variety of use
cases and also for more complex use cases. One such
example would consider flexibility provision, where
the system operates in a distributed way. This hap-
pens, for example, when reinforcement learning is
used for the determination of charging and discharg-
ing actions. Methodologically, we see the greatest po-
tential for improvement in the development of more
concrete Non-compliance cards (for example regard-
ing compatibility with GDPR), as those were rather
generic. We also intend to compare LINDDUN GO
to the more complex, regular version LINDDUN.
ACKNOWLEDGEMENTS
Funding from the Federal State of Salzburg (project
SEEEG) and the Austrian Research Promotion
Agency (FFG project number 881165) is gratefully
acknowledged.
REFERENCES
Azam, N., Michala, L., Ansari, S., and Truong, N. B.
(2023). Data privacy threat modelling for autonomous
systems: A survey from the gdpr’s perspective. IEEE
Transactions on Big Data, 9:388–414.
Bauwens, T. (2016). Explaining the diversity of motivations
behind community renewable energy. Energy Policy,
93:278–290.
Chah, B., Lombard, A., Bkakria, A., Yaich, R., and Belfort,
F. (2023). Exploring Privacy Threats in Connected
and Autonomous Vehicles : An Analysis. Journal of
Ubiquitous Systems & Pervasive Networks, 19(1):25–
32.
Danner, D. and de Meer, H. (2021). Quality of service and
fairness for electric vehicle charging as a service. En-
ergy Informatics, 4:1–20.
Deng, M., Wuyts, K., Scandariato, R., Preneel, B., and
Joosen, W. (2011). A privacy threat analysis frame-
work: supporting the elicitation and fulfillment of pri-
vacy requirements. Requirements Engineering, 16:3–
32.
Directorate-General for Energy, EC (2019). Clean energy
for all Europeans. Publications Office of the European
Union.
El Sadany, M., Schmittner, C., and Kastner, W. (2019). As-
suring compliance with protection profiles with threat-
get. In International Conference on Computer Safety,
Reliability, and Security (SAFECOMP) 2019, pages
62–73.
Erkin, Z., Troncoso-Pastoriza, J. R., Lagendijk, R. L., and
Perez-Gonzalez, F. (2013). Privacy-preserving data
aggregation in smart metering systems: An overview.
IEEE Signal Processing Magazine, 30:75–86.
European Parliament and Council of the EU (2018). Direc-
tive (eu) 2018/2001 of the european parliament and
of the council of 11 december 2018 on the promotion
of the use of energy from renewable sources (recast).
Official Journal of the European Union, 61:82–209.
Kursawe, K., Danezis, G., and Kohlweiss, M. (2011).
Privacy-friendly aggregation for the smart grid. In Pri-
vacy Enhanced Technology Symposium, pages 175–
191.
Li, F., Luo, B., and Liu, P. (2010). Secure information ag-
gregation for smart grids using homomorphic encryp-
tion. In Proceedings of First IEEE International Con-
ference on Smart Grid Communications, pages 327–
332. IEEE.
Nweke, L. O., Abomhara, M., Yayilgan, S. Y., Comparin,
D., Heurtier, O., and Bunney, C. (2022). A linddun-
based privacy threat modelling for national identifica-
tion systems. In Proceedings of the 2022 IEEE Nige-
ria 4th International Conference on Disruptive Tech-
nologies for Sustainable Development, NIGERCON
2022. Institute of Electrical and Electronics Engineers
Inc.
Shostack, A. (2014a). Elevation of privilege: Drawing de-
velopers into threat modeling. In 2014 USENIX Sum-
mit on Gaming, Games, and Gamification in Security
Education (3GSE 14).
Shostack, A. (2014b). Threat Modeling: Designing for Se-
curity. Wiley Publishing, 1st edition.
Tøndel, I. A., Oyetoyan, T. D., Jaatun, M. G., and Cruzes,
D. (2018). Understanding challenges to adoption of
the Microsoft Elevation of Privilege game. In Pro-
ceedings of the 5th Annual Symposium and Bootcamp
on Hot Topics in the Science of Security, pages 1–10.
Walker, G. (2008). What are the barriers and incentives for
community-owned means of energy production and
use? Energy Policy, 36:4401–4405.
Wuyts, K., Scandariato, R., and Joosen, W. (2014). Em-
pirical evaluation of a privacy-focused threat model-
ing methodology. Journal of Systems and Software,
96:122–138.
Wuyts, K., Sion, L., and Joosen, W. (2020). LINDDUN
GO: A Lightweight Approach to Privacy Threat Mod-
eling. In IEEE European Symposium on Security and
Privacy Workshops (EuroS&PW), pages 302–309.
Evaluating the Efficacy of LINDDUN GO for Privacy Threat Modeling for Local Renewable Energy Communities
525