{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:16:46Z","timestamp":1775470606480,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T00:00:00Z","timestamp":1662508800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T00:00:00Z","timestamp":1662508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100016756","name":"Kempe Foundation","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100016756","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The introduction of advanced metering infrastructure (AMI) smart meters has given rise to fine-grained electricity usage data at different levels of time granularity. AMI collects high-frequency daily energy consumption data that enables utility companies and data aggregators to perform a rich set of grid operations such as demand response, grid monitoring, load forecasting and many more. However, the privacy concerns associated with daily energy consumption data has been raised. Existing studies on data anonymization for smart grid data focused on the direct application of perturbation algorithms, such as microaggregation, to protect the privacy of consumers. In this paper, we empirically show that reliance on microaggregation alone is not sufficient to protect smart grid data. Therefore, we propose DFTMicroagg algorithm that provides a dual level of perturbation to improve privacy. The algorithm leverages the benefits of discrete Fourier transform (DFT) and microaggregation to provide additional layer of protection. We evaluated our algorithm on two publicly available smart grid datasets with millions of smart meters readings. Experimental results based on clustering analysis using k-Means, classification via k-nearest neighbor (kNN) algorithm and mean hourly energy consumption forecast using Seasonal Auto-Regressive Integrated Moving Average with eXogenous (SARIMAX) factors model further proved the applicability of the proposed method. Our approach provides utility companies with more flexibility to control the level of protection for their published energy data.<\/jats:p>","DOI":"10.1007\/s10207-022-00612-8","type":"journal-article","created":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T12:02:49Z","timestamp":1662552169000},"page":"1299-1321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["DFTMicroagg: a dual-level anonymization algorithm for smart grid data"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0155-7949","authenticated-orcid":false,"given":"Kayode S.","family":"Adewole","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0368-8037","authenticated-orcid":false,"given":"Vicen\u00e7","family":"Torra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,7]]},"reference":[{"key":"612_CR1","doi-asserted-by":"crossref","unstructured":"Armoogum, S., Bassoo, V.: \u201cPrivacy of energy consumption data of a household in a smart grid,\u201d In: Smart Power Distribution Systems (Q. Yang, T. Yang, W. Li, eds.), 163\u2013177, Academic Press, 2019","DOI":"10.1016\/B978-0-12-812154-2.00008-0"},{"issue":"6","key":"612_CR2","doi-asserted-by":"publisher","first-page":"3084","DOI":"10.1109\/TSG.2017.2703158","volume":"8","author":"J-X Chin","year":"2017","unstructured":"Chin, J.-X., De Rubira, T.T., Hug, G.: Privacy-protecting energy management unit through model-distribution predictive control. IEEE Trans. Smart Grid 8(6), 3084\u20133093 (2017)","journal-title":"IEEE Trans. Smart Grid"},{"key":"612_CR3","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.cose.2017.11.008","volume":"73","author":"G Karopoulos","year":"2018","unstructured":"Karopoulos, G., Ntantogian, C., Xenakis, C.: Masker: masking for privacy-preserving aggregation in the smart grid ecosystem. Comput. Secur. 73, 307\u2013325 (2018)","journal-title":"Comput. Secur."},{"issue":"1","key":"612_CR4","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.icte.2018.01.006","volume":"4","author":"D Mashima","year":"2018","unstructured":"Mashima, D., Serikova, A., Cheng, Y., Chen, B.: Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing. ICT Expr. 4(1), 35\u201341 (2018)","journal-title":"ICT Expr."},{"key":"612_CR5","unstructured":"Kapoor, S., Sturmberg, B., Shaw, M.: \u201cA review of publicly available energy data sets,\u201d Wattwatchers\u2019 My Energy Marketplace (MEM)(The Australian National University, p. 2020. Canberra, Australia (2020)"},{"key":"612_CR6","doi-asserted-by":"crossref","unstructured":"Soykan, E.U., Bilgin, Z., Ersoy, M.A., Tomur, E.: \u201cDifferentially private deep learning for load forecasting on smart grid,\u201d in 2019 IEEE Globecom Workshops (GC Wkshps),1\u20136, IEEE, 2019","DOI":"10.1109\/GCWkshps45667.2019.9024520"},{"key":"612_CR7","unstructured":"Commission, E.: \u201cSmart grids and meters.\u201d https:\/\/ec.europa.eu\/energy\/topics\/markets-and-consumers\/smart-grids-and-meters_en?redir=1, 2021"},{"key":"612_CR8","doi-asserted-by":"crossref","unstructured":"Tudor, V., Almgren, M., Papatriantafilou, M.:\u201cA study on data de-pseudonymization in the smart grid,\u201d In: Proceedings of the Eighth European Workshop on System Security, 1\u20136, 2015","DOI":"10.1145\/2751323.2751325"},{"key":"612_CR9","doi-asserted-by":"crossref","unstructured":"Dong, R., Ratliff, L.J.: \u201cEnergy disaggregation and the utility-privacy tradeoff,\u201d In: Big data application in power systems (R.\u00a0Arghandeh and Y.\u00a0Zhou, eds.), 409\u2013444, Elsevier, 2018","DOI":"10.1016\/B978-0-12-811968-6.00018-8"},{"key":"612_CR10","doi-asserted-by":"crossref","unstructured":"Efthymiou, C., Kalogridis, G.: \u201cSmart grid privacy via anonymization of smart metering data,\u201d In: 2010 first IEEE International conference on smart grid communications, 238\u2013243, IEEE, 2010","DOI":"10.1109\/SMARTGRID.2010.5622050"},{"key":"612_CR11","doi-asserted-by":"crossref","unstructured":"Cleemput, S., Mustafa, M.A., Marin, E., Preneel, B.:\u201cDe-pseudonymization of smart metering data: Analysis and countermeasures,\u201d In: 2018 Global internet of things summit (GIoTS), 1\u20136, IEEE, 2018","DOI":"10.1109\/GIOTS.2018.8534430"},{"issue":"3\u20134","key":"612_CR12","first-page":"1","volume":"14","author":"FC Sangogboye","year":"2018","unstructured":"Sangogboye, F.C., Jia, R., Hong, T., Spanos, C., Kj\u00e6rgaard, M.B.: A framework for privacy-preserving data publishing with enhanced utility for cyber-physical systems. ACM Trans. Sens. Netw. (TOSN) 14(3\u20134), 1\u201322 (2018)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"612_CR13","unstructured":"BBCNews, \u201cUkraine power cut \u2019was cyber-attack\u2019.\u201d https:\/\/www.bbc.com\/news\/technology-38573074, 2017"},{"key":"612_CR14","doi-asserted-by":"crossref","unstructured":"Jia, R., Sangogboye, F.C., Hong, T., Spanos, C., Kj\u00e6rgaard, M.B.: \u201cPad: protecting anonymity in publishing building related datasets,\u201d In: Proceedings of the 4th ACM International conference on systems for energy-efficient built environments, 1\u201310 (2017)","DOI":"10.1145\/3137133.3137140"},{"key":"612_CR15","unstructured":"Thouvenot, V., Nogues, D., Gouttas, C.: \u201cData-driven anonymization process applied to time series,\u201d In: SIMBig, 80\u201390 (2017)"},{"key":"612_CR16","doi-asserted-by":"publisher","first-page":"770","DOI":"10.1016\/j.future.2019.05.069","volume":"100","author":"L Zhang","year":"2019","unstructured":"Zhang, L., Zhao, L., Yin, S., Chi, C.-H., Liu, R., Zhang, Y.: A lightweight authentication scheme with privacy protection for smart grid communications. Fut. Generat. Comput. Sys. 100, 770\u2013778 (2019)","journal-title":"Fut. Generat. Comput. Sys."},{"issue":"9","key":"612_CR17","doi-asserted-by":"publisher","first-page":"6134","DOI":"10.1109\/TII.2020.2984366","volume":"17","author":"W Ali","year":"2020","unstructured":"Ali, W., Din, I.U., Almogren, A., Guizani, M., Zuair, M.: A lightweight privacy-aware iot-based metering scheme for smart industrial ecosystems. IEEE Trans. Ind. Info. 17(9), 6134\u20136143 (2020)","journal-title":"IEEE Trans. Ind. Info."},{"issue":"2","key":"612_CR18","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/JIOT.2016.2561908","volume":"4","author":"KN Alharbi","year":"2016","unstructured":"Alharbi, K.N., Lin, X., Shao, J.: A privacy-preserving data-sharing framework for smart grid. IEEE Intern. Things J. 4(2), 555\u2013562 (2016)","journal-title":"IEEE Intern. Things J."},{"key":"612_CR19","unstructured":"Domingo-Ferrer, J., Torra, V.: \u201cA quantitative comparison of disclosure control methods for microdata,\u201d Confidentiality, disclosure and data access: theory and practical applications for statistical agencies, 111\u2013134 (2001)"},{"key":"612_CR20","doi-asserted-by":"crossref","unstructured":"Bovornkeeratiroj, P., Iyengar, S., Lee, S., Irwin, D., Shenoy, P.: \u201cRepel: A utility-preserving privacy system for iot-based energy meters,\u201d In: 2020 IEEE\/ACM Fifth International conference on internet-of-things design and implementation (IoTDI), 79\u201391, IEEE,(2020)","DOI":"10.1109\/IoTDI49375.2020.00015"},{"key":"612_CR21","unstructured":"Salas, J., Torra, V.: \u201cA general algorithm for k-anonymity on dynamic databases,\u201d In: Data privacy management, cryptocurrencies and blockchain technology"},{"key":"612_CR22","doi-asserted-by":"crossref","unstructured":"Nin, J., Torra, V.: \u201cExtending microaggregation procedures for time series protection,\u201d In: International conference on rough sets and current trends in computing, 899\u2013908, Springer, Berlin, 2006","DOI":"10.1007\/11908029_93"},{"key":"612_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57358-8","volume-title":"Data privacy: foundations, new developments and the big data challenge","author":"V Torra","year":"2017","unstructured":"Torra, V.: Data privacy: foundations, new developments and the big data challenge, 1st edn. Springer, Berlin (2017)","edition":"1"},{"key":"612_CR24","doi-asserted-by":"crossref","unstructured":"Romdhane, R.B., Hammami, H., Hamdi, M., Kim, T.-H.: \u201cA novel approach for privacy-preserving data aggregation in smart grid,\u201d in 2019 15th international wireless communications & Mobile Computing Conference (IWCMC), 1060\u20131066, IEEE, 2019","DOI":"10.1109\/IWCMC.2019.8766472"},{"key":"612_CR25","doi-asserted-by":"crossref","unstructured":"Cao, H., Liu, S., Zhao, R., Gu, H., Bao, J., Zhu, L.: \u201cA privacy preserving model for energy internet base on differential privacy,\u201d In: 2017 IEEE International conference on energy internet (ICEI), pp. 204\u2013209, IEEE, 2017","DOI":"10.1109\/ICEI.2017.43"},{"key":"612_CR26","doi-asserted-by":"crossref","unstructured":"Tudor, V., Almgren, M., Papatriantafilou, M.:\u201cAnalysis of the impact of data granularity on privacy for the smart grid,\u201d In: Proceedings of the 12th ACM workshop on workshop on privacy in the electronic society, 61\u201370 (2013)","DOI":"10.1145\/2517840.2517844"},{"key":"612_CR27","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.rser.2018.03.088","volume":"91","author":"L Wen","year":"2018","unstructured":"Wen, L., Zhou, K., Yang, S., Li, L.: Compression of smart meter big data: a survey. Renew. Sustain. Energy Rev. 91, 59\u201369 (2018)","journal-title":"Renew. Sustain. Energy Rev."},{"issue":"4","key":"612_CR28","doi-asserted-by":"publisher","first-page":"653","DOI":"10.3390\/en12040653","volume":"12","author":"X Huang","year":"2019","unstructured":"Huang, X., Hu, T., Ye, C., Xu, G., Wang, X., Chen, L.: Electric load data compression and classification based on deep stacked auto-encoders. Energies 12(4), 653 (2019)","journal-title":"Energies"},{"issue":"3","key":"612_CR29","doi-asserted-by":"publisher","first-page":"465","DOI":"10.3390\/electronics9030465","volume":"9","author":"M Plenz","year":"2020","unstructured":"Plenz, M., Dong, C., Grumm, F., Meyer, M.F., Schumann, M., McCulloch, M., Jia, H., Schulz, D.: Framework integrating lossy compression and perturbation for the case of smart meter privacy. Electronics 9(3), 465 (2020)","journal-title":"Electronics"},{"key":"612_CR30","doi-asserted-by":"crossref","unstructured":"Feng, X., Lan, J., Peng, Z., Huang, Z., Guo, Z.: \u201cA novel privacy protection framework for power generation data based on generative adversarial networks,\u201d In: 2019 IEEE PES Asia-Pacific power and energy engineering conference (APPEEC), pp.\u00a01\u20135, IEEE, 2019","DOI":"10.1109\/APPEEC45492.2019.8994702"},{"issue":"8","key":"612_CR31","doi-asserted-by":"publisher","first-page":"7250","DOI":"10.1109\/JIOT.2020.2983213","volume":"7","author":"AS Khwaja","year":"2020","unstructured":"Khwaja, A.S., Anpalagan, A., Naeem, M., Venkatesh, B.: Smart meter data obfuscation using correlated noise. IEEE Intern. Things J. 7(8), 7250\u20137264 (2020)","journal-title":"IEEE Intern. Things J."},{"key":"612_CR32","unstructured":"Samarati, P., Sweeney, L.: \u201cProtecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression,\u201d SRI Intl. Tech. Rep., 1998"},{"issue":"6","key":"612_CR33","doi-asserted-by":"publisher","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P.: Protecting respondents identities in microdata release. IEEE Trans. Knowl. Data Eng. 13(6), 1010\u20131027 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"05","key":"612_CR34","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int J Uncertain Fuzzin. Knowl.-Bas. Sys. 10(05), 557\u2013570 (2002)","journal-title":"Int J Uncertain Fuzzin. Knowl.-Bas. Sys."},{"key":"612_CR35","doi-asserted-by":"crossref","unstructured":"Torra, V., Navarro-Arribas, G.: Data privacy. Wiley Interdisciplinary Reviews: data Mining and Knowledge Discovery. vol. 4, issue 4, pp. 269\u2013280, Wiley, Hobroken, 2014","DOI":"10.1002\/widm.1129"},{"key":"612_CR36","unstructured":"Alarte Aleixandre, J.: \u201cApplication of clustering techniques to privacy protection,\u201d Thesis, Universitat Oberta de Catalunya, 2018"},{"issue":"2","key":"612_CR37","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/s10618-005-0007-5","volume":"11","author":"J Domingo-Ferrer","year":"2005","unstructured":"Domingo-Ferrer, J., Torra, V.: Ordinal, continuous and heterogeneous k-anonymity through microaggregation. Data Min. Knowl. Discov. 11(2), 195\u2013212 (2005)","journal-title":"Data Min. Knowl. Discov."},{"issue":"1","key":"612_CR38","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TE.1969.4320436","volume":"12","author":"JW Cooley","year":"1969","unstructured":"Cooley, J.W., Lewis, P.A., Welch, P.D.: The fast fourier transform and its applications. IEEE Trans. Educat. 12(1), 27\u201334 (1969)","journal-title":"IEEE Trans. Educat."},{"issue":"4","key":"612_CR39","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1109\/TASSP.1984.1164399","volume":"32","author":"Z Wang","year":"1984","unstructured":"Wang, Z.: Fast algorithms for the discrete w transform and for the discrete fourier transform. IEEE Trans. Acoust., Speech, Signal Process. 32(4), 803\u2013816 (1984)","journal-title":"IEEE Trans. Acoust., Speech, Signal Process."},{"issue":"1","key":"612_CR40","first-page":"81","volume":"4","author":"AB Watson","year":"1994","unstructured":"Watson, A.B.: Image compression using the discrete cosine transform. Math. J. 4(1), 81 (1994)","journal-title":"Math. J."},{"issue":"20","key":"612_CR41","doi-asserted-by":"publisher","first-page":"20739","DOI":"10.1007\/s11042-016-3971-4","volume":"76","author":"X Liao","year":"2017","unstructured":"Liao, X., Li, K., Yin, J.: Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform. Multim. Tool. Appl. 76(20), 20739\u201320753 (2017)","journal-title":"Multim. Tool. Appl."},{"issue":"5","key":"612_CR42","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1109\/TCOM.1971.1090705","volume":"19","author":"S Weinstein","year":"1971","unstructured":"Weinstein, S., Ebert, P.: Data transmission by frequency-division multiplexing using the discrete fourier transform. IEEE Trans. Commun. Technol. 19(5), 628\u2013634 (1971)","journal-title":"IEEE Trans. Commun. Technol."},{"key":"612_CR43","doi-asserted-by":"crossref","unstructured":"Yancey, W.E., Winkler, W.E., Creecy, R.H.: \u201cDisclosure risk assessment in perturbative microdata protection,\u201d In: Inference control in statistical databases, pp.\u00a0135\u2013152, Springer, Berlin, 2002","DOI":"10.1007\/3-540-47804-3_11"},{"key":"612_CR44","unstructured":"Arthur, D., Vassilvitskii, S.: \u201ck-means++: The advantages of careful seeding,\u201d In: Eighteenth annual ACM-SIAM symposium on Discrete algorithms, pp.\u00a01027\u20131035, ACM, 2007"},{"key":"612_CR45","volume-title":"Forecasting: principles and practice","author":"RJ Hyndman","year":"2018","unstructured":"Hyndman, R.J., Athanasopoulos, G.: Forecasting: principles and practice. OTexts, Melbourne, Australia (2018)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00612-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00612-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00612-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T11:00:54Z","timestamp":1727953254000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00612-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,7]]},"references-count":45,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["612"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00612-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,7]]},"assertion":[{"value":"7 September 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This research does not involve human or animal. However, it involved anonymization of dataset which are publicly available. The dataset used in this research are publicly available online and the links to them have been provided in the article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"There are no human subjects in this article and informed consent is not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}