-
Measuring privacy in smart metering anonymized data
Authors:
Santi Martínez,
Francesc Sebé,
Christoph Sorge
Abstract:
In recent years, many proposals have arisen from research on privacy in smart metering. In one of the considered approaches, referred to as anonymization, smart meters transmit fine-grained electricity consumption values in such a way that the energy supplier can not exactly determine procedence. This paper measures the real privacy provided by such approach by taking into account that at the end…
▽ More
In recent years, many proposals have arisen from research on privacy in smart metering. In one of the considered approaches, referred to as anonymization, smart meters transmit fine-grained electricity consumption values in such a way that the energy supplier can not exactly determine procedence. This paper measures the real privacy provided by such approach by taking into account that at the end of a billing period the energy supplier collects the overall electricity consumption of each meter for billing purposes. An entropy-based measure is proposed for quantifying privacy and determine the extent to which knowledge on the overall consumption of meters allows to re-identify anonymous fine-grained consumption values.
△ Less
Submitted 12 February, 2020;
originally announced February 2020.
-
sec-cs: Getting the Most out of Untrusted Cloud Storage
Authors:
Dominik Leibenger,
Christoph Sorge
Abstract:
We present sec-cs, a hash-table-like data structure for file contents on untrusted storage that is both secure and storage-efficient. We achieve authenticity and confidentiality with zero storage overhead using deterministic authenticated encryption. State-of-the-art data deduplication approaches prevent redundant storage of shared parts of different contents irrespective of whether relationships…
▽ More
We present sec-cs, a hash-table-like data structure for file contents on untrusted storage that is both secure and storage-efficient. We achieve authenticity and confidentiality with zero storage overhead using deterministic authenticated encryption. State-of-the-art data deduplication approaches prevent redundant storage of shared parts of different contents irrespective of whether relationships between contents are known a priori or not.
Instead of just adapting existing approaches, we introduce novel (multi-level) chunking strategies, ML-SC and ML-CDC, which are significantly more storage-efficient than existing approaches in presence of high redundancy.
We prove sec-cs's security, publish a ready-to-use implementation, and present results of an extensive analytical and empirical evaluation that show its suitability for, e.g., future backup systems that should preserve many versions of files on little available cloud storage.
△ Less
Submitted 10 June, 2016;
originally announced June 2016.
-
Practical Aspects of the Bitcoin System
Authors:
Artus Krohn-Grimberghe Christoph Sorge
Abstract:
Digital payment schemes show an ever increasing importance. Out of the countless different schemes available this article focuses on the popular Bitcoin system. The authors provide a description of Bitcoin's unique technological basis and its accompanying ecosystem of users, miners, trading platforms and vendors. Furthermore, this article discusses Bitcoin's currency-like features and the first re…
▽ More
Digital payment schemes show an ever increasing importance. Out of the countless different schemes available this article focuses on the popular Bitcoin system. The authors provide a description of Bitcoin's unique technological basis and its accompanying ecosystem of users, miners, trading platforms and vendors. Furthermore, this article discusses Bitcoin's currency-like features and the first regulatory actions take in the European Union and in the United States of America.
△ Less
Submitted 30 August, 2013;
originally announced August 2013.