Skip to main content

Table 2 Comparison of potential privacy breaches and their feasibility for malicious adversaries: some of the attacks are feasible in our protocol

From: Privacy-preserving load profile matching for tariff decisions in smart grids

 

Smart meter

Third party

Utility

 

Interested

Feasible

Interested

Feasible

Interested

Feasible

(a) Load profile forecast revealed

  

a

a

(b) Template load profiles revealed

a

a

\(\checkmark ^{\mathrm {c}}\)

a

(c) Best matching tariff revealed

  

c,b

c,b

  1. Int. stands for interested, feas. for feasible. Whenever attacks require collusions to be feasible, they are denoted by – a. If values are modified maliciously, denoted by – b, information may be revealed. A c denotes interest in revealing data from other entities of the same type, but not oneself, e.g., other utilities