Core Concepts
Deep learning-based profiling attacks can effectively reverse the privacy protections offered by weekly re-pseudonymization of smart meter data, strongly limiting its ability to prevent re-identification in practice.
Abstract
The article presents a new deep learning-based profiling attack against re-pseudonymized smart meter data. The attack uses neural network embeddings tailored to the smart meter domain to extract features from weekly consumption records and then applies nearest neighbor matching to identify the correct household across time.
The key highlights and insights are:
The proposed deep learning-based profiling attack strongly outperforms previous methods, successfully identifying the correct household 54.5% of the time among 5139 households based on electricity consumption records (73.4% when including gas consumption).
The attack remains effective even when the attacker does not have access to auxiliary data about the target user, successfully identifying 52.2% of households in a disjoint set of users.
The accuracy of the attack only slowly decreases as the population size increases, reaching 29.2% on a dataset of 67,309 users.
Less frequent re-pseudonymization and access to additional consumption data (gas) further increase the accuracy of the attack.
The results strongly suggest that even frequent re-pseudonymization strategies can be reversed using state-of-the-art deep learning techniques, significantly limiting their ability to prevent re-identification in practice.
Stats
The dataset consists of the electricity and gas consumption records of 5139 users over 49 consecutive weeks.
Quotes
"Our results strongly suggest that even frequent re-pseudonymization strategies can be reversed, strongly limiting their ability to prevent re-identification in practice."