Privacy-Preserving Distributed Probabilistic Load Flow
نویسندگان
چکیده
In a multi-regional interconnected grid, the probabilistic load flow (PLF) of any region cannot be calculated individually but should consider uncertainties introduced in other areas. Accordingly, topologies, loads, and generations every are needed. Although renewable generation data could assumed as publicly known, some regional independent system operators (ISOs) still would not share important parameters with others. This motivates development privacy-preserving distributed (PPD) PLF method. The challenge is to identify mapping between flows uncertain power injections across regions without full information about entire grid. main idea this paper respectively calculate coefficient matrix constant vector mapping: for former, PPD accelerated projection-based consensus algorithm proposed; latter, average leveraged. Consequently, method derived each ISO analytically obtain its joint way sharing - key contribution paper. Experiments on 118- 1354-bus systems demonstrate that can generate same results corresponding centralized method, has satisfactory accuracy compared frequently used methods.
منابع مشابه
Privacy - Preserving Distributed Computation
P4P: A Practical Framework for Privacy-Preserving Distributed Computation
متن کاملPrivacy-preserving distributed clustering
Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a data set. The data set to be used for clustering can be owned by a single entity, or in some cases, information from different databases is pooled to enrich the data so that the merged data...
متن کاملPrivacy-Preserving Distributed Event Corroboration
Privacy-Preserving Distributed Event Correlation Janak J. Parekh Event correlation is a widely-used data processing methodology, and is useful for the distributed monitoring of software faults and vulnerabilities. Most existing solutions have focused on “intra-organizational” correlation; organizations typically employ privacy policies that prohibit the exchange of information outside of the or...
متن کاملPreserving Privacy in Distributed Systems
We present sTile, a technique for distributing trust-needing computation onto insecure networks, while providing probabilistic guarantees that malicious agents that compromise parts of the network cannot learn private data. With sTile, we explore the fundamental cost of achieving privacy through data distribution and bound how much less efficient a privacy-preserving system is than a non-privat...
متن کاملPrivacy-Preserving Distributed Information Sharing
In many important applications, a collection of mutually distrustful parties must share information, without compromising their privacy. Currently, these applications are often performed by using some form of a trusted third party (TTP); this TTP receives all players’ inputs, computes the desired function, and returns the result. However, the level of trust that must be placed in such a TTP is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Power Systems
سال: 2021
ISSN: ['0885-8950', '1558-0679']
DOI: https://doi.org/10.1109/tpwrs.2020.3022476