Private Electric Vehicle Charging Location Aggregation Based on Local Differential Privacy

被引:0
|
作者
Xiong X. [1 ]
Liu S. [1 ]
Li D. [1 ,2 ]
Li Y. [1 ]
Wang J. [3 ]
机构
[1] School of Computer Sci., Wuhan Univ., Wuhan
[2] Hubei Water Resources Research Inst., Wuhan
[3] College of Computer Sci., South-Central Univ. for Nationalities, Wuhan
关键词
Charging location; Electric vehicles; Local differential privacy; Privacy preservation;
D O I
10.15961/j.jsuese.201801051
中图分类号
学科分类号
摘要
The charging location data generated by electric vehicles frequently accessing charging piles for charging are of great significance for optimizing the arrangement of charging piles and guiding the electric power dispatching. However, charging location data are private information for vehicle users. In order to prevent the leakage of the privacy of these users, it is urgent to explore a way of private charging location data aggregation. Therefore, a local differential privacy technology is adopted to preserve the charging location data of electric vehicles. A partition-based privacy preservation charging location data aggregation method is proposed by introducing Bayesian randomized multiple dummies algorithm. The method employs the Bayesian randomized multiple dummies algorithm to design a local obfuscation algorithm for locally perturbing a vehicle's charging location. Then, the private location aggregation method for charging location data with the characteristics of sparseness and small size samples is designed by combining reconstruction algorithm of the randomized multiple dummies algorithm. At the same time, under the premise of ensuring the level of privacy preservation, the whole location domain is divided to narrow the privacy location domain, thereby further improving the utility of aggregation result. The privacy analysis of the proposed method is given. Finally, experimental results on four different synthetic datasets, namely, uniform distribution, normal distribution, peak distribution and random distribution, as well as the public Gowalla dataset are carried out. The experimental results show that the proposed method is superior to the existing randomized projection matrix based private aggregation method in terms of utility under the same privacy level. © 2019, Editorial Department of Advanced Engineering Sciences. All right reserved.
引用
收藏
页码:137 / 143
页数:6
相关论文
共 17 条
  • [1] Han W., Xiao Y., Privacy preservation for V2G networks in smart grid: A survey, Computer Communications, 91, pp. 17-28, (2016)
  • [2] Green R.C., Wang L., Alam M., The impact of plug-in hybrid electric vehicles on distribution networks: A review and outlook, Renewable and Sustainable Energy Reviews, 15, 1, pp. 544-553, (2011)
  • [3] Stegelmann M., Kesdogan D., Location privacy for vehicle-to-grid interaction through battery management, Proceedings of the IEEE 9th International Conference on Information Technology: New Generations, pp. 373-378, (2012)
  • [4] Liu J.K., Susilo W., Yuen T.H., Et al., Efficient privacy-preserving charging station reservation system for electric vehicles, The Computer Journal, 59, 7, pp. 1040-1053, (2016)
  • [5] Yang Z., Yu S., Lou W., Et al., P2: Privacy-preserving communication and precise reward architecture for V2G networks in smart grid, IEEE Transactions on Smart Grid, 2, 4, pp. 697-706, (2011)
  • [6] Jiang R., Lu R., Lai C., Et al., A Secure communication protocol with privacy-preserving monitoring and controllable linkability for V2G, Proceedings of the 1st International Conference on Data Science in Cyberspace, pp. 567-572, (2017)
  • [7] Han S., Topcu U., Pappas G.J., Differentially private distributed protocol for electric vehicle charging, Proceedings of the 52nd Annual Allerton Conference on Communication, Control, and Computing, pp. 242-249, (2014)
  • [8] Han S., Topcu U., Pappas G.J., An approximately truthful mechanism for electric vehicle charging via joint differential privacy, Proceedings of the 2015 American Control Conference, pp. 2469-2475, (2015)
  • [9] Dwork C., Roth A., The algorithmic foundations of differential privacy, Foundations and Trends® in Theoretical Computer Science, 9, 3-4, pp. 211-407, (2014)
  • [10] Kasiviswanathan S.P., Lee H.K., Nissim K., Et al., What can we learn privately?, SIAM Journal on Computing, 40, 3, pp. 793-826, (2011)