Differential privacy (DP) has been widely used to protect the privacy of confidential cyber physical energy systems (CPES) data. However, applying DP without analyzing the utility, privacy, and security requirements can affect the data utility as well as help the attacker to conduct integrity attacks (e.g., False Data Injection(FDI)) leveraging the differentially private data. Existing anomaly-detection-based defense strategies against data integrity attacks in DP-based smart grids fail to minimize the attack impact while maximizing data privacy and utility. To address this challenge, it is nontrivial to apply a defensive approach during the design process. In this paper, we formulate and develop the defense strategy as a part of the design process to investigate data privacy, security, and utility in a DP-based smart grid network. We have proposed a provable relationship among the DP-parameters that enables the defender to design a fault-tolerant system against FDI attacks. To experimentally evaluate and prove the effectiveness of our proposed design approach, we have simulated the FDI attack in a DP-based grid. The evaluation indicates that the attack impact can be minimized if the designer calibrates the privacy level according to the proposed correlation of the DP-parameters to design the grid network. Moreover, we analyze the feasibility of the DP mechanism and QoS of the smart grid network in an adversarial setting. Our analysis suggests that the DP mechanism is feasible over existing privacy-preserving mechanisms in the smart grid domain. Also, the QoS of the differentially private grid applications is found satisfactory in adversarial presence.
翻译:不同的隐私(DP)被广泛用来保护机密的网络物理能源系统(CPES)数据的隐私。然而,在不分析通用性、隐私和安全要求的情况下应用DP可以影响数据效用,并有助于攻击者利用不同的私人数据进行完整攻击(如假数据输入(FDI)),现有基于异常的检测防御战略无法最大限度地减少基于DP的智能电网的数据完整攻击,同时最大限度地扩大数据隐私和实用性。为了应对这一挑战,在设计过程中采用防御性方法并非易事。在本文件中,我们制定和发展局域网应用战略,作为基于DP智能电网网络中调查数据隐私、安全和效用的设计过程的一部分。我们提议在DP参数之间建立一种可调节的关系,使辩护人能够设计一个针对基于DP的智能网络的容错系统,从而在实验性评估和证明我们提议的设计方法的有效性时,我们模拟了基于局基网的外国直接投资攻击。评估表明,如果设计师对DP-S的智能网络的精确度进行精确度分析,那么攻击影响是可以最小化的。