Table 2: Big Data Challenges in Smart Grids and Proposed Solutions.

Challenge Ref. # Solution Advantage / Disadvantage
Security ‎ [63] A regulatory framework equivalent to Health Insurance Portability and Accountability Act (HIPPA) for smart grid privacy and consumer fraud problems Would provide clear legislative and legal avenues should problems occur / Bureaucracy would not solve some of the problems provided
‎ [64] A distributed incremental aggregation framework for smart meters to protect users’ privacy by using homomorphic encryption Unidirectional functionality not allowing for passing information back to a specific unit; Time delay of communication in possible real time operations; Does not look into malicious or fraudulent data acquisition.
‎ [65] Using a battery connected between the home and the grid so that anyone looking at the power usage will see a battery charging and not the current profiles of the actual items using power Makes power usage indistinguishable from one day to the next; Overhead of installation and usage and wear and tear costs of a battery system in a home; Difficult to hide high power usage items such as AC, washer, dryer, etc.
‎ [66] Privacy vs utility: How to get the best of both worlds without sacrificing too much on either side. Balanced framework / Gives up privacy information of high power item usage as well as the price of the battery
‎ [67] Targeted attacks vs random attacks to smart grid: Building faster and more resilient networks to fend off attacks through the communication networks Faster networks would entail creating a faster protocol to transfer information; Faster connections mean less encryption or protections increasing privacy and attacker problems.
‎ [69] Load Redistribution (LR) attacks: Using Multi-start Benders decomposition to find the most damaging immediate attack. Good attack prevention strategy for this specific type of attack
‎ [70] Proposing strategies to detect and localize malicious attacks Capable of detecting attacks on multiple locations / The number of locations being attacked expands computation.
Quality ‎ [75] The data mining-based and the state estimation-based electricity consumption outlier data detection methods Data mining algorithms are faster and better at detecting outliers than traditional methods / Does not account for missing or redundant data.
‎ [82] Developing a data mining prototype system (RMINE) for fault diagnosis or system malfunction detection Capable of obtaining the minimal diagnostic rule set to derive a logical decision in assisting maintenance engineers to diagnose faults
‎ [86] Introducing a new class of attacks, called false data injection attacks against monitoring of PMUs or smart grid sensors for state estimation N/A
Processing location [88] Using embedded neural networks to analyze edge-based load information. Offers privacy concerns by identifying what is being used in a specific area.
[89] Creating a micro grid out of a smart home Makes a good framework out of the smart home / Lack of intelligent connections to the grid makes it unusable.
[90] Applying edge computing in the Power Internet of Things (PIOT), such as in monitoring transmission lines, managing smart homes, etc. Bandwidth issues, locational solutions