598
Views
44
Downloads
6
Crossref
N/A
WoS
0
Scopus
N/A
CSCD
With the increasing development of smart grid, multi-party cooperative computation between several entities has become a typical characteristic of modern energy systems. Traditionally, data exchange among parties is inevitable, rendering how to complete multi-party collaborative optimization without exposing any private information a critical issue. This paper proposes a fully privacy-preserving distributed optimization framework based on secure multi-party computation (SMPC) with secret sharing protocols. The framework decomposes the collaborative optimization problem into a master problem and several subproblems. The process of solving the master problem is executed in the SMPC framework via the secret sharing protocols among agents. The relationships of agents are completely equal, and there is no privileged agent or any third party. The process of solving subproblems is conducted by agents individually. Compared to the traditional distributed optimization framework, the proposed SMPC-based framework can fully preserve individual private information. Exchanged data among agents are encrypted and no private information disclosure is assured. Furthermore, the framework maintains a limited and acceptable increase in computational costs while guaranteeing optimality. Case studies are conducted on test systems of different scales to demonstrate the principle of secret sharing and verify the feasibility and scalability of the proposed methodology.
With the increasing development of smart grid, multi-party cooperative computation between several entities has become a typical characteristic of modern energy systems. Traditionally, data exchange among parties is inevitable, rendering how to complete multi-party collaborative optimization without exposing any private information a critical issue. This paper proposes a fully privacy-preserving distributed optimization framework based on secure multi-party computation (SMPC) with secret sharing protocols. The framework decomposes the collaborative optimization problem into a master problem and several subproblems. The process of solving the master problem is executed in the SMPC framework via the secret sharing protocols among agents. The relationships of agents are completely equal, and there is no privileged agent or any third party. The process of solving subproblems is conducted by agents individually. Compared to the traditional distributed optimization framework, the proposed SMPC-based framework can fully preserve individual private information. Exchanged data among agents are encrypted and no private information disclosure is assured. Furthermore, the framework maintains a limited and acceptable increase in computational costs while guaranteeing optimality. Case studies are conducted on test systems of different scales to demonstrate the principle of secret sharing and verify the feasibility and scalability of the proposed methodology.
Wu, J., Yan, J., Jia, H., Hatziargyriou, N., Djilali, N., Sun, H. (2016). Integrated energy systems. Applied Energy, 167: 155–157.
Li, G. Q., Zhang, R. F., Jiang, T., Chen, H. H., Bai, L. Q., Cui, H. T., Li, X. J. (2017). Optimal dispatch strategy for integrated energy systems with CCHP and wind power. Applied Energy, 192: 408–419.
Sun, H. B., Guo, Q. L., Zhang, B. M., Wu, W. C., Wang, B., Shen, X. W., Wang, J. H. (2018). Integrated energy management system: Concept, design, and demonstration in China. IEEE Electrification Magazine, 6: 42–50.
Sun, Y. Y., Li, Z. Y., Tian, W., Shahidehpour, M. (2016). A Lagrangian decomposition approach to energy storage transportation scheduling in power systems. IEEE Transactions on Power Systems, 31: 4348–4356.
Li, Z., Wu, W., Zeng, B., Shahidehpour, M., Zhang, B. (2016). Decentralized contingency-constrained tie-line scheduling for multi-area power grids. IEEE Transactions on Power Systems, 32: 354–367.
Wen, Y. F., Qu, X. B., Li, W. Y., Liu, X., Ye, X. (2018). Synergistic operation of electricity and natural gas networks via ADMM. IEEE Transactions on Smart Grid, 9: 4555–4565.
Zhang, X., Khalili, M. M., Liu, M. (2018). Improving the privacy and accuracy of ADMM-based distributed algorithms. Proceedings of Machine Learning Research, 80: 5796–5805.
Yuman, Z., Xuezhi, L., Zheng, Y. (2020). Decomposition-coordination based optimization for PV–BESS–CHP integrated energy systems. Transactions of China Electrotechnical Society, 35: 2372–2386.
Han, S., Topcu, U., Pappas, G. J. (2017). Differentially private distributed constrained optimization. IEEE Transactions on Automatic Control, 62: 50–64.
Nozari, E., Tallapragada, P., Cortés, J. (2016). Differentially private distributed convex optimization via functional perturbation. IEEE Transactions on Control of Network Systems, 5: 395–408.
Zhang, C., Ahmad, M., Wang, Y. (2019). ADMM based privacy-preserving decentralized optimization. IEEE Transactions on Information Forensics and Security, 14: 565–580.
Zhang, C. L., Wang, Y. Q. (2019). Enabling privacy-preservation in decentralized optimization. IEEE Transactions on Control of Network Systems, 6: 679–689.
Cramer, R., Daza, V., Gracia, I., Urroz, J. J., Leander, G., Marti-Farre, J., Padro, C. (2008). On codes, matroids, and secure multiparty computation from linear secret-sharing schemes. IEEE Transactions on Information Theory, 54: 2644–2657.
Zhao, C., Zhao, S. N., Zhao, M. H., Chen, Z. X., Gao, C. Z., Li, H. W., Tan, Y. (2019). Secure multi-party computation: Theory, practice and applications. Information Sciences, 476: 357–372.
Smahi, A., Xia, Q., Xia, H., Sulemana, N., Fateh, A. A., Gao, J. B., Du, X. J., Guizani, M. (2020). A blockchainized privacy-preserving support vector machine classification on mobile crowd sensed data. Pervasive and Mobile Computing, 66: 101195.
Choudhury, A., Patra, A. (2017). An efficient framework for unconditionally secure multiparty computation. IEEE Transactions on Information Theory, 63: 428–468.
Karnin, E., Greene, J., Hellman, M. (1983). On secret sharing systems. IEEE Transactions on Information Theory, 29: 35–41.
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22: 612–613.
Copyright: by the author(s). The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).