You are on page 1of 10

Privacy-Preserving Obfuscation for

Distributed Power Systems


Terrence W.K. Mak , Ferdinando Fioretto: , and Pascal Van Hentenryck

Georgia Institute of Technology, Atlanta, GA, USA
: Syracuse University, New York, NY, USA
wmak@gatech.edu, ffiorett@syr.edu, pvh@isye.gatech.edu

Abstract—This paper considers the problem of releasing Fig. 1, reported from [3], emphasizes these results. It shows
privacy-preserving load data of a decentralized operated power the average load distance (as L1 ) between the original and the
system. The paper focuses on data used to solve Optimal Power privacy-preserving loads for a set of 29 networks, at varying
Flow (OPF) problems and proposes a distributed algorithm
that complies with the notion of Differential Privacy, a strong of the obfuscation parameter α. The percentages of instances
privacy framework used to bound the risk of re-identification. with a feasible AC-OPF solution are shown above the bars.
The problem is challenging since the application of traditional Interestingly, a recent body of 3.04%
differential privacy mechanisms to the load data fundamentally work has shown that it is possi- 10
changes the nature of the underlying optimization problem and
often leads to severe feasibility issues. The proposed differentially ble to release AC-feasible obfus- 8

cated load data that also satisfies

Error (p.u.)
private distributed algorithm is based on the Alternating Direction 6

Method of Multipliers (ADMM) and guarantees that the released the notion of differential privacy 4
privacy-preserving data retains high fidelity and satisfies the AC [3]–[5]. Despite the soundness and
power flow constraints. Experimental results on a variety of OPF effectiveness of such data release 2 14.4%
43.2%
benchmarks demonstrate the effectiveness of the approach. 0
techniques, these methods rely on 0.1 1 10
Index Terms—Differential Privacy, Optimal Power Flow, Indistinguishability (⍺)
the presence of a trusted data cura-
ADMM, Distributed computing tor that can collect sensitive loads Fig. 1. Average L1 error and
from all the system participants. percentages of feasible AC-
OPF instances.
However, this is impractical in
I. I NTRODUCTION
very large systems with distributed loads and generators (e.g.,
The availability of test cases representing high-fidelity multiple microgrids). Even if the power system is operated
power system networks is essential to foster research in several centrally, it is typically owned and controlled by various
important power optimization problems, including optimal parties, e.g., load customers, transmission system operators
power flow (OPF), unit commitment, and transmission plan- (TSO), distribution system operators (DSO), and generation
ning. However, the release of such datasets poses significant companies. These parties operate with specific customer and
privacy risks. For instance, revealing the electrical load of legal agreements, which render the transmission of proprietary
a customer may disclose sensitive business activities and data to a centralized server infeasible.
manufacturing processes, causing significant economic loss.
To overcome these limitations, this paper introduces the
Indirectly, it may also reveal how transmission operators
Privacy-preserving Decentralized OPF (PD-OPF), a novel
operate their networks, raising security issues [1].
decentralized and privacy-preserving framework that allows
Differential Privacy (DP) [2] is a privacy framework that has multiple power system parties to release their data privately
been shown effective in protecting sensitive information during without relying on a trusted data curator. Crucially, the frame-
a data release process. It prevents the disclosure of sensitive work guarantees that the released data produces a feasible AC
information by introducing carefully calibrated noise to the power flow and that its OPF cost is close to that of the original
result of a computation. While DP algorithms could be used OPF. The heart of the mechanism is a distributed optimization
directly to generate privacy-preserving power system data, they procedure that relies on the Alternating Direction Method of
face significant challenges when the released data is required Multipliers (ADMM) to redistribute the noise introduced by
to preserve domain specific properties, such as preserving the traditional DP algorithms to satisfy the desired properties. The
optimal cost and the feasibility of an AC Optimal Power proposed mechanism leverages standard DP primitives and can
Flow (AC-OPF) problem. Naive noise addition can drastically be easily adopted on top of any existing distributed power
degrade the fidelity to the original problem of interest and system optimization algorithm.
introduce severe feasibility issues, as shown in [1], [3], [4].
While the paper focuses on preserving the privacy of
individual loads, the framework is general and can be used to
The authors would like to thank Kory Hedman for extensive discussions on protect other sensitive quantities (e.g., generator capabilities).
various obfuscation techniques. This research is partly funded by the ARPA-E
Grid Data Program under Grant 1357-1530. Contributions The key contributions of this work are as

21st Power Systems Computation Conference Porto, Portugal — June 29 – July 3, 2020
PSCC 2020
follows: (1) It introduces PD-OPF, a novel, distributed mech- Model 1 AC Optimal Power Flow: POPF
anism that relies on ADMM to obfuscate the individual loads variables: Sig , @i P G;¸ Vi , @i P N ; Sij , @pi, j q P E Y E R
while ensuring AC-OPF feasibility on the obfuscated data. PD- minimize: OpS g q  c2i p<pSig qq2 c1i <pSig q c0i (1)
OPF satisfies the notion of local differential privacy, providing iPN
strong privacy guarantees. (2) Experimental results on a large subject to: =Vs  0, Ds P N (2)
collection of OPF benchmarks illustrate that the proposed vil ¤ |Vi | ¤ viu @i P N (3)
approach finds high-quality AC-feasible solutions, and that the  θij∆ ¤ =pVi Vj q ¤ θij∆ @pi, j q P E (4)
Sigl ¤ Sig ¤ Sigu @i P G „ N
results are comparable to those obtained with a centralized (5)
version with a data curator.
|Sij | ¤ suij @pi, j q P E Y E R
°
(6)
Sig  Sid  pi,j qPE YE Sij @i P N
R (7)
Sij  Yij |Vi |2  Yij Vi Vj @pi, j q P E Y E R (8)
II. R ELATED W ORK

There is a rich literature on theoretical results of DP (see III. P RELIMINARIES


for instance [6] and [7]). The literature on DP applied to A. Optimal Power Flow
power systems includes considerably fewer efforts. Ács and
Castelluccia [8] exploit a direct application of the Laplace Optimal Power Flow (OPF) is the problem of determin-
mechanism to hide user participation in smart meter data sets, ing the most economic generator dispatch to meet the load
achieving -DP. Zhao et al. [9] study a DP schema that exploits demands in a power network. A power network N can be
the ability of households to charge and discharge a battery to viewed as a graph pN, E q where the set of buses N  rns
hide the real energy consumption of their appliances. Liao represents the nodes and the set of lines and transformers
et al. [10] introduce Di-PriDA, a privacy-preserving mech- E „ tpi, j q P N  N u represents the directed arcs. The paper
anism for appliance-level peak-time load balancing control denotes with G and L as for the set of generators and loads in
in the smart grid, aimed at masking the consumption of the network, and uses E R to indicate the set of arcs, but in the
top-k appliances of a household. Halder et al. [11] propose reverse direction. The AC-OPF problem (POPF ) is specified in
an architecture for privacy-preserving thermal inertial load Model 1, where I, V, Y, and S denote the complex quantities
management as a service provided by load-serving entities. for current, voltage, admittance, and power, respectively.
Finally, Zhou et al. [12] introduce the notion of monotonicity The model takes as input the power network N and
of DC-OPF operator, which requires that monotonic changes returns the optimal generator dispatch costs (with ties broken
in the network loads induce monotonic changes in the DC-OPF arbitrarily). The objective function OpS g q captures the cost
objective cost. This enables a characterization of the network, of the generator dispatch, with S g  xS1g , . . . , Sng y denoting
which is useful to preserve the privacy of monotonic networks. the vector of generator dispatch values. Constraint (2) sets the
reference angle to zero for the slack bus s P N to eliminate
There are also related work on privacy-preserving im- numerical symmetries. Constraints (3) and (4) capture the
plementations of the ADMM algorithm. Zhang et al. [13] voltage and phase angle difference bounds. Constraints (5)
proposed a version of the ADMM algorithm for privacy- and (6) enforce the generator output and line flow limits.
preserving empirical risk minimization problems, a class of Finally, constraints (7) capture the Kirchhoff’s Current Law
convex problems used for regression and classification tasks. and constraints (8) capture the Ohm’s Law. The solution
Huang et al. [14] proposed an approach that combines an ap- set satisfying constraints (2) to (8) for a given set of load
proximate augmented Lagrangian function with time-varying demands S d  xS1d , . . . , Snd y is denoted by CP F pS d q. Table I
Gaussian noise for general objective functions. Finally, Ding summarizes the common notations used throughout the paper.
et al. [15] proposed P-ADMM, to provide guarantees within a
relaxed model of differential privacy (called zero-concentrated B. Alternating Direction of Multipliers Method (ADMM)
DP).
ADMM is a widely used distributed procedure solving
The privacy-preserving distributed learning literature fo- optimization problems with coupling constraints. Consider an
cuses almost entirely on problems whose objective func- optimization problem of the following form:
tions are smooth and strongly convex. Additionally, most
min f pxq g pz q
approaches suffer one shortcoming: The privacy loss being P P
x X ,z Z
provided as a guarantee is a function of the iteration counts
of the algorithm, which can be huge if a large number of
s.t. Ax Bz  c, (9)
iterations is required to converge to a feasible solution. In where X „ Rn and Z „ Rm are two disjoint sets, x P Rn
contrast, this work provides bounded privacy loss irrespective and z P Rm denote variable vectors owned by two distinct
of the number of iterations. It also ensures that the privacy- groups of agents, and Ax Bz  c describes the set of
preserving data is AC-OPF feasible and that the solution cost coupling constraints between the two groups of agents with
stays close to the original ones. A P R`n , B P R`m , and c P R` . The functions f and

21st Power Systems Computation Conference Porto, Portugal — June 29 – July 3, 2020
PSCC 2020
TABLE I
C OMMON NOTATION USED IN THE PAPER .

N Power network  Privacy budget


Sg Vector of power generator dispatch α Indistinguishability value
Sd Vector of load demands β Faithfulness value/parameter
POPF Function solving AC-OPF, with input S d and output S g O The optimal costs of the original problem
CPF The set of feasible AC power flow for POPF x A vector of variables/values
Mx A mechanism of x xl , xu Upper and lower bounds of quantity x
Px The optimization problem for the accuracy phase of Mx pq pq
< ,= Real / imaginary component of a complex number
Y , I, V  Conjugate of admittance matrix Y , current I, and voltage V c2 , c1 , c0 Cost function coefficients
λd , λ g , λ V , λ S Lagrange multiplier for load, generation, voltage, and power flow ρ ADMM penalty parameter

g denote the objectives over x and z, respectively, and are when its data participates into a computation. It has originally
commonly assumed to be convex. The augmented Lagrange been proposed in the global privacy context and, informally,
function Lρ px, z, λq of (9) is: ensures that an adversary would not be able to reliably
infer whether or not a particular individual participates in
f pxq g pz q λ| pAx Bz  cq kAx Bz  ck22
ρ
2 the dataset, even with an unbounded computational power
where λ P R` is a vector of Lagrangian multipliers, with ρ ¡
and access to every other entry of the dataset. The setting
adopted in this work studies the local privacy context (Local
0 representing the penalty parameter. The vector of Lagrangian
Differential Privacy [21], aka LDP), in which each load
customer i holds a datum, Sid P C, describing the complex
multipliers are the dual variables associated with the coupling
constraints Ax Bz  c.
load consumption of the bus i P N . While the standard local
Given a solution tuple pxk , z k , λk q at iteration k,
differential privacy framework is concerned with protecting the
ADMM [16] proceeds to the next iteration, k 1, computing
pxk 1 , zk 1 , λk 1 q as follows, in three sequential steps: participation of an individual into a dataset, in a power system,
the individual identity is not a sensitive information: It is a
xk 1
 argmin Lρ px, zk , λk q (10) public knowledge that each bus may connect to a demand. The
xPX sensitive information is represented by the load magnitude. To
zk 1
 argmin Lρ pxk 1 , z, λk q (11) accommodate such notion of privacy risk, the paper uses the
z PZ
λk 1
 λ ρpAxk 1 Bzk 1  cq.
k
(12)
definition of generalized differential privacy for metric spaces
[22] and adapts it to the local differential privacy context.
The algorithm terminates when a desired termination condition Without loss of generality, we focus on Lebesgue spaces L1 ,
(e.g., an iteration limit or a convergence factor) is reached. The and in particular, consider the complex space C equipped with
quality of the solution at iteration k can be measured by the norm 1. For a given value α ¡ 0, a randomized mechanism
primal infeasibility (residue) vector [17] M is -LDP for α distances (a.k.a. local α-indistinguishable),
if for all x and x1 P C s.t. }x  x1 }1 ¤ α, and for any output
rpk  Axk Bz k  c, (13) response o P C:
indicating the distance to a primal feasible solution, and the PrrMpxq  os ¤ e PrrMpx1 q  os. (15)
dual infeasibility (residue) vector [17]
 ρAT B pzk  zk1 q,
where the probability is computed over the randomness of
rdk (14) M. A mechanism satisfying Definition 15 ensures that its
indicating the distance from the previous local minima. When output cannot differ to much, if run on similar inputs (i.e.,
both infeasibility vectors are zero, ADMM converges to a inputs differing on a single value by at most α). In other
(local) optimal and feasible solution. words, the definition ensures that an attacker obtaining access
to a privacy-preserving load value cannot detect, with high
C. Differential Privacy Notions probability, the distance between the privacy-preserving value
The need for data privacy emerges in two main contexts: and its original value. The level of privacy is controlled by
the global context, as in when institutions release datasets the privacy loss parameter  ¥ 0, with small values denoting
containing information of several users or answer queries on strong privacy. The level of indistinguishability is controlled
such datasets (e.g., US Census queries [18], [19]), and the by the parameter α ¡ 0. The above definition allows us to
local context, as in when individuals disclose their personal obfuscate load values that are close to one another while
data to some data curator (e.g., Google Chrome data collection retaining the distinction between those that are far apart.
process [20]). In both contexts, privacy is achieved through a Local Differential Privacy (LDP), including its extension for
randomizer M adding noise to the data before releasing. generic metric spaces, satisfies several important properties. In
Differential privacy [2] (DP) is an algorithmic property that particular, it is immune to post-processing as defined in the
characterizes and bounds the privacy loss of an individual following theorem.

21st Power Systems Computation Conference Porto, Portugal — June 29 – July 3, 2020
PSCC 2020
Theorem 1 (Post-Processing Immunity): [6] Let M be an 2) Fidelity Phase In the second phase, the agents coordinate
-(local) differentially private mechanism and g be an arbitrary a distributed process to adjust the private load values S̃id ,
mapping from the set of possible output sequences to an to new values Ŝ d that achieve the fidelity goal, while
arbitrary set. Then g  M is -(local) differentially private. deviating as little as possible from the local α-obfuscated
loads S̃id .
IV. D ECENTRALIZED L OAD O BFUSCATION The next sections describe in details the PD-OPF phases.
The decentralized load obfuscation problem is the problem A. Privacy Phase
of coordinating the release of privacy-preserving load data in
In the privacy phase, each (load) agent i perturbs its load
a power system owned and controlled by multiple parties. We
data Sid , independently from other agents, so to generate an α-
consider a set of agents, each coordinating some power system
local indistinguishable load S̃id . To do so, the agents use a ver-
component, e.g., loads, generators, buses, or power lines. The
sion of the Laplace Mechanism, a method used to guarantee an
goal of the problem is to release load data, which is controlled
-LDP private responses to numeric functions [6]. The Laplace
distribution with 0 mean and scale ξ, denoted by Lappξ q, has
by the load agents.
The problem has three desiderata. (1) It requires obfuscation |x|
1  ξ
of the loads up to some amount α ¡ 0. (2) It requires that the a probability density function Lappx|ξ q  2ξ e . Consider
AC-OPF objective induced by the obfuscated loads is close to a function f a numeric function that maps datasets to R and
that attained using the original data. (3) It requires its agents let z be a random variable drawn from Lap pξ q where ξ  α .
to coordinate the data release process using a decentralized The following theorem provides an LDP mechanism.
Theorem 2 (Laplace Mechanism): The Laplace mechanism
that outputs f pxq z achieves α-local indistinguishability.
and confined communication process.
Formally, the decentralized load obfuscation problem finds
the active and reactive, privacy-preserving load values Ŝid for Since the load data is represented in the complex form,
each load agent i P N that satisfy the following criteria: agents use the Polar Laplacian mechanism [3], [23], which
is a generalization of the Laplace mechanism to Euclidean
1) Privacy: The original load Sid and its privacy-preserving spaces. The mechanism satisfies α-local obfuscation [3], [22].
counterpart Ŝid are local α-indistinguishable, for every
load i P N .
For simplicity, the paper refers to the the Laplace mechanism
as for the Polar Laplace mechanism.
2) Fidelity: For every generator i, the optimal AC-OPF
dispatch cost OpŜig q obtained by using the obfuscated B. Fidelity Phase
loads Ŝid is required to be close to the original AC-OPF While simply adding Laplace noise to each load satisfies
dispatch cost OpSig q up to a user-defined factor β ¡ 0: local α-indistinguishability, the resulting power system data
may no longer be AC feasible, nor it may induce a similar
|OpŜig q  OpSig q| ¤ βOpSig q @i P N. optimal dispatch costs. To find a set of loads Ŝ d that satisfy
Finally, it requires the computation mechanism to be per- the fidelity criteria, a post-processing step that uses a bi-level
formed in a decentralized fashion. In the following, we denote program PBL can be formulated as follows [3]:
with Oi as for the original optimal generation costs OpSig q, PBL  min }Ŝ d  S̃ d }2 (16)
s.t.: OpS g q  O ¤ βO
 
which are assumed to be publicly known [5] (e.g., from the   (17)
S g  POPF pŜ d q.
market information). When such information is not publicly
available, then it could be (privately) estimated. Notice that, (18)
as studied in [3] when some information is publicly available, The upper level objective Eq. (16) minimizes the L2 distance
the attacker posterior about the input dataset after observing between the noisy loads S̃ d and the (post-processed) load
the output of a DP algorithm remain bounded with respect to variables Ŝ d . Constraint (18) captures the AC-OPF require-
its prior 1 . ment. It computes an AC optimal generator dispatch S g for
the post-processed loads Ŝ d . Finally, Constraint (17) requires
V. T HE PD-OPF M ECHANISM the generator dispatch to satisfy the fidelity goal.
This section introduces the Privacy-preserving Distributed Solving bilevel programs is challenging computationally,
OPF (PD-OPF) mechanism to solve the decentralized load being strongly NP-Hard [24]. To address the underlying com-
obfuscation problem. PD-OPF agents operate in two phases: putational challenge, an efficient relaxation of problem PBL
1) Privacy Phase During the first phase, each load agent can be provided as in [3]:
i P N applies a LDP protocol to obtain an α-local PRBL  min }Ŝ d  S̃ d }2 (19)
s.t.: OpS g q  O ¤ βO
 
obfuscated version S̃id of its original load Sid . This   (20)
AC Power Flow: (2)  (8).
process is executed independently and autonomously by
each load agent in the system. (21)
It relaxes the optimality requirement Eq. (18) and only requires
1A straightforward corollary is that if the prior knowledge is the dataset AC feasibility (Eq. (21)). The mechanism restores feasibility
itself, then no privacy mechanism can be used to modify such knowledge. An
example will be revealing the dispatch cost of a small power grid containing of the loads and ensures the existence of a dispatch whose
only one generator and one load. cost is close to the optimal one.

21st Power Systems Computation Conference Porto, Portugal — June 29 – July 3, 2020
PSCC 2020
Post-processing based Model 2 ADMM: Load agent Di pPload q
Distributed AC-Consistency dpB q
inputs: xρ, λdi , S̃id , Si y
Generator Bus Demand dpD q
g(G) d(D) variables: Si
Si Si
d pD q
Sig
<latexit sha1_base64="brfDKy4ErGyut1E8uZEzncygh1w=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJeyKqMeABz1GNA9M1jA76U2GzM4uM7NCWPIXXjwo4tW/8ebfOHkcNLGgoajqprsrSATXxnW/naXlldW19dxGfnNre2e3sLdf13GqGNZYLGLVDKhGwSXWDDcCm4lCGgUCG8Hgauw3nlBpHst7M0zQj2hP8pAzaqz0cNfhj1mvdH0y6hSKbtmdgCwSb0aKMEO1U/hqd2OWRigNE1Trlucmxs+oMpwJHOXbqcaEsgHtYctSSSPUfja5eESOrdIlYaxsSUMm6u+JjEZaD6PAdkbU9PW8Nxb/81qpCS/9jMskNSjZdFGYCmJiMn6fdLlCZsTQEsoUt7cS1qeKMmNDytsQvPmXF0n9tOy5Ze/2rFg5n8WRg0M4ghJ4cAEVuIEq1ICBhGd4hTdHOy/Ou/MxbV1yZjMH8AfO5w+/S5BC</latexit>

Si
g(B) Vi
<latexit sha1_base64="Eo9uzHs/UDofxaKvCFqD2LHJJ0w=">AAAB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0lE1GPBi8eK9gPaUDbbTbt0swm7E6GE/gQvHhTx6i/y5r9xm+agrQ8GHu/NMDMvSKQw6LrfTmltfWNzq7xd2dnd2z+oHh61TZxqxlsslrHuBtRwKRRvoUDJu4nmNAok7wST27nfeeLaiFg94jThfkRHSoSCUbTSQ3sgBtWaW3dzkFXiFaQGBZqD6ld/GLM04gqZpMb0PDdBP6MaBZN8VumnhieUTeiI9yxVNOLGz/JTZ+TMKkMSxtqWQpKrvycyGhkzjQLbGVEcm2VvLv7n9VIMb/xMqCRFrthiUZhKgjGZ/02GQnOGcmoJZVrYWwkbU00Z2nQqNgRv+eVV0r6oe27du7+sNa6KOMpwAqdwDh5cQwPuoAktYDCCZ3iFN0c6L86787FoLTnFzDH8gfP5Aykojao=</latexit>
<latexit sha1_base64="ubDoCVGNIlj9449fFqWJ5vmJZT0=">AAAB8XicbVBNSwMxEJ31s9avqkcvwSLUS9kVUY8FPXisaD+wXUs2m21Dk+ySZIWy9F948aCIV/+NN/+NabsHbX0w8Hhvhpl5QcKZNq777Swtr6yurRc2iptb2zu7pb39po5TRWiDxDxW7QBrypmkDcMMp+1EUSwCTlvB8Grit56o0iyW92aUUF/gvmQRI9hY6eGuxx6zsHJ9Mu6Vym7VnQItEi8nZchR75W+umFMUkGlIRxr3fHcxPgZVoYRTsfFbqppgskQ92nHUokF1X42vXiMjq0SoihWtqRBU/X3RIaF1iMR2E6BzUDPexPxP6+TmujSz5hMUkMlmS2KUo5MjCbvo5ApSgwfWYKJYvZWRAZYYWJsSEUbgjf/8iJpnlY9t+rdnpVr53kcBTiEI6iABxdQgxuoQwMISHiGV3hztPPivDsfs9YlJ585gD9wPn8AtiGQPA==</latexit>

Si
d(B) Sid
minimize: }Si  S̃id }2 λdi  SidpDq ρ }SidpDq  SidpBq }2 (22)
2
<latexit sha1_base64="UC/WqLYWsF9fM/Qe0SWpRLE4MA4=">AAAB7HicbVBNS8NAEJ34WetX1aOXxSJ4KomIeix48VjRtIU2ls120y7dbMLuRCihv8GLB0W8+oO8+W/ctjlo64OBx3szzMwLUykMuu63s7K6tr6xWdoqb+/s7u1XDg6bJsk04z5LZKLbITVcCsV9FCh5O9WcxqHkrXB0M/VbT1wbkagHHKc8iOlAiUgwilby7x8HPdGrVN2aOwNZJl5BqlCg0at8dfsJy2KukElqTMdzUwxyqlEwySflbmZ4StmIDnjHUkVjboJ8duyEnFqlT6JE21JIZurviZzGxozj0HbGFIdm0ZuK/3mdDKPrIBcqzZArNl8UZZJgQqafk77QnKEcW0KZFvZWwoZUU4Y2n7INwVt8eZk0z2ueW/PuLqr1yyKOEhzDCZyBB1dQh1togA8MBDzDK7w5ynlx3p2PeeuKU8wcwR84nz+bmY6A</latexit> <latexit sha1_base64="VL+FGDImpq2rzuz3nKCaziTc37I=">AAAB7HicbVBNS8NAEJ34WetX1aOXxSJ4KomIeix48VjRtIU2ls1m0i7dbMLuRiilv8GLB0W8+oO8+W/ctjlo64OBx3szzMwLM8G1cd1vZ2V1bX1js7RV3t7Z3duvHBw2dZorhj5LRaraIdUouETfcCOwnSmkSSiwFQ5vpn7rCZXmqXwwowyDhPYljzmjxkr+/WPU471K1a25M5Bl4hWkCgUavcpXN0pZnqA0TFCtO56bmWBMleFM4KTczTVmlA1pHzuWSpqgDsazYyfk1CoRiVNlSxoyU39PjGmi9SgJbWdCzUAvelPxP6+Tm/g6GHOZ5QYlmy+Kc0FMSqafk4grZEaMLKFMcXsrYQOqKDM2n7INwVt8eZk0z2ueW/PuLqr1yyKOEhzDCZyBB1dQh1togA8MODzDK7w50nlx3p2PeeuKU8wcwR84nz+XB459</latexit>

<latexit sha1_base64="3uw0sHHlTl6NUx/3MnEjXPRuFOY=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJeyKqMegF48RzQOTNcxOepMhs7PLzKwQlvyFFw+KePVvvPk3Th4HTSxoKKq66e4KEsG1cd1vZ2l5ZXVtPbeR39za3tkt7O3XdZwqhjUWi1g1A6pRcIk1w43AZqKQRoHARjC4HvuNJ1Sax/LeDBP0I9qTPOSMGis93HX4Y9YrXZ2MOoWiW3YnIIvEm5EizFDtFL7a3ZilEUrDBNW65bmJ8TOqDGcCR/l2qjGhbEB72LJU0gi1n00uHpFjq3RJGCtb0pCJ+nsio5HWwyiwnRE1fT3vjcX/vFZqwks/4zJJDUo2XRSmgpiYjN8nXa6QGTG0hDLF7a2E9amizNiQ8jYEb/7lRVI/LXtu2bs9K1bOZ3Hk4BCOoAQeXEAFbqAKNWAg4Rle4c3Rzovz7nxMW5ec2cwB/IHz+QO3rZA9</latexit> <latexit sha1_base64="H2vwkb0f9c7hnA62XiET0eIqmCw=">AAAB8XicbVBNSwMxEJ31s9avqkcvwSLUS9kVUY9FLx4r2g9s15LNZtvQJLskWaEs/RdePCji1X/jzX9j2u5BWx8MPN6bYWZekHCmjet+O0vLK6tr64WN4ubW9s5uaW+/qeNUEdogMY9VO8CaciZpwzDDaTtRFIuA01YwvJ74rSeqNIvlvRkl1Be4L1nECDZWerjrsccsrFydjHulslt1p0CLxMtJGXLUe6WvbhiTVFBpCMdadzw3MX6GlWGE03Gxm2qaYDLEfdqxVGJBtZ9NLx6jY6uEKIqVLWnQVP09kWGh9UgEtlNgM9Dz3kT8z+ukJrr0MyaT1FBJZouilCMTo8n7KGSKEsNHlmCimL0VkQFWmBgbUtGG4M2/vEiap1XPrXq3Z+XaeR5HAQ7hCCrgwQXU4Abq0AACEp7hFd4c7bw4787HrHXJyWcO4A+czx+zFZA6</latexit>

Oi⇤ Vi
<latexit sha1_base64="nKCC0rLauwQKHZgA4U4Du4F+sws=">AAAB8nicbVBNS8NAEJ34WetX1aOXxSLUS0lE1GPRi8cK9gPSWDbbTbt0sxt2N0IJ+RlePCji1V/jzX/jts1BWx8MPN6bYWZemHCmjet+Oyura+sbm6Wt8vbO7t5+5eCwrWWqCG0RyaXqhlhTzgRtGWY47SaK4jjktBOOb6d+54kqzaR4MJOEBjEeChYxgo2V/HY/Y/ljVrs5y/uVqlt3Z0DLxCtIFQo0+5Wv3kCSNKbCEI619j03MUGGlWGE07zcSzVNMBnjIfUtFTimOshmJ+fo1CoDFEllSxg0U39PZDjWehKHtjPGZqQXvan4n+enJroOMiaS1FBB5ouilCMj0fR/NGCKEsMnlmCimL0VkRFWmBibUtmG4C2+vEza53XPrXv3F9XGZRFHCY7hBGrgwRU04A6a0AICEp7hFd4c47w4787HvHXFKWaO4A+czx/CI5Db</latexit>
(B)
Sij
<latexit sha1_base64="F546YZf+QAxdvVCUlV/pnAhwnXc=">AAAB83icbVBNSwMxEJ2tX7V+VT16CRahXsquiHosevFY0X5Au5Zsmm1js8mSZIWy7N/w4kERr/4Zb/4b03YPWn0w8Hhvhpl5QcyZNq775RSWlldW14rrpY3Nre2d8u5eS8tEEdokkkvVCbCmnAnaNMxw2okVxVHAaTsYX0399iNVmklxZyYx9SM8FCxkBBsr9W77KXvI7tPq5XHWL1fcmjsD+ku8nFQgR6Nf/uwNJEkiKgzhWOuu58bGT7EyjHCalXqJpjEmYzykXUsFjqj209nNGTqyygCFUtkSBs3UnxMpjrSeRIHtjLAZ6UVvKv7ndRMTXvgpE3FiqCDzRWHCkZFoGgAaMEWJ4RNLMFHM3orICCtMjI2pZEPwFl/+S1onNc+teTenlfpZHkcRDuAQquDBOdThGhrQBAIxPMELvDqJ8+y8Oe/z1oKTz+zDLzgf34ekkUw=</latexit>
(B)
Sij Vi(L)
<latexit sha1_base64="YBWX1/UXzjRebJyVMW9M9ygwBZE=">AAAB83icbVA9SwNBEJ2LXzF+RS1tFoMQm3AnopYBGwuLiOYDkjPsbfaSNXu7x+6eEI77GzYWitj6Z+z8N26SKzT6YODx3gwz84KYM21c98spLC2vrK4V10sbm1vbO+XdvZaWiSK0SSSXqhNgTTkTtGmY4bQTK4qjgNN2ML6c+u1HqjST4s5MYupHeChYyAg2Vurd9lP2kN2n1evjrF+uuDV3BvSXeDmpQI5Gv/zZG0iSRFQYwrHWXc+NjZ9iZRjhNCv1Ek1jTMZ4SLuWChxR7aezmzN0ZJUBCqWyJQyaqT8nUhxpPYkC2xlhM9KL3lT8z+smJrzwUybixFBB5ovChCMj0TQANGCKEsMnlmCimL0VkRFWmBgbU8mG4C2+/Je0TmqeW/NuTiv1szyOIhzAIVTBg3OowxU0oAkEYniCF3h1EufZeXPe560FJ5/Zh19wPr4BluCRVg==</latexit>
(L)
<latexit sha1_base64="L44lrite8K5DIedi1bkF2nKMRy8=">AAAB8nicbVBNS8NAEJ34WetX1aOXxSLUS0lE1GPBiwcPFewHpLFstpt26WY37G6EEvIzvHhQxKu/xpv/xm2bg7Y+GHi8N8PMvDDhTBvX/XZWVtfWNzZLW+Xtnd29/crBYVvLVBHaIpJL1Q2xppwJ2jLMcNpNFMVxyGknHN9M/c4TVZpJ8WAmCQ1iPBQsYgQbK/ntfsbyx6x2d5b3K1W37s6AlolXkCoUaPYrX72BJGlMhSEca+17bmKCDCvDCKd5uZdqmmAyxkPqWypwTHWQzU7O0alVBiiSypYwaKb+nshwrPUkDm1njM1IL3pT8T/PT010HWRMJKmhgswXRSlHRqLp/2jAFCWGTyzBRDF7KyIjrDAxNqWyDcFbfHmZtM/rnlv37i+qjcsijhIcwwnUwIMraMAtNKEFBCQ8wyu8OcZ5cd6dj3nrilPMHMEfOJ8/0V+Q5Q==</latexit>

S̃id
Model 3 ADMM: Generator agent Gi pPgen q
g pB q
inputs: xρ, λgi , Oi , Si y
<latexit sha1_base64="CUQ6YW+tLEreUT/cjwMvJRFMDMs=">AAAB7HicdVBNS8NAEJ3Ur1q/qh69LBZBPJSkhFRvBS/erGDaQhvLZrttl242YXcjlNLf4MWDIl79Qd78N27aCCr6YODx3gwz88KEM6Vt+8MqrKyurW8UN0tb2zu7e+X9g5aKU0moT2Iey06IFeVMUF8zzWknkRRHIaftcHKZ+e17KhWLxa2eJjSI8EiwISNYG8m/vjvrs365YlfrNde7cJBdtRfISM1zPRc5uVKBHM1++b03iEkaUaEJx0p1HTvRwQxLzQin81IvVTTBZIJHtGuowBFVwWxx7BydGGWAhrE0JTRaqN8nZjhSahqFpjPCeqx+e5n4l9dN9fA8mDGRpJoKslw0TDnSMco+RwMmKdF8aggmkplbERljiYk2+ZRMCF+fov9Jq1Z17Kpz41YaXh5HEY7gGE7BgTo04Aqa4AMBBg/wBM+WsB6tF+t12Vqw8plD+AHr7ROCjo5y</latexit>

<latexit sha1_base64="2oYf1COBBs2kS8cZqDPufRu2484=">AAAB9HicdVDLSsNAFL3xWeur6tLNYBFchaSUVHcFNy4r2ge0sUwmk3bo5OHMpFBCv8ONC0Xc+jHu/BsnbQQVPXDhcM693HuPl3AmlWV9GCura+sbm6Wt8vbO7t5+5eCwI+NUENomMY9Fz8OSchbRtmKK014iKA49Trve5DL3u1MqJIujWzVLqBviUcQCRrDSkjtQjPs0u5kP2Z0/rFQts1GrOxc2skxrgZzUnLpTR3ahVKFAa1h5H/gxSUMaKcKxlH3bSpSbYaEY4XReHqSSJphM8Ij2NY1wSKWbLY6eo1Ot+CiIha5IoYX6fSLDoZSz0NOdIVZj+dvLxb+8fqqCczdjUZIqGpHloiDlSMUoTwD5TFCi+EwTTATTtyIyxgITpXMq6xC+PkX/k07NtC3Tvq5Xm04RRwmO4QTOwIYGNOEKWtAGAvfwAE/wbEyNR+PFeF22rhjFzBH8gPH2CUvtkmY=</latexit>

Fidelity Sij Line Privacy g pGq


<latexit sha1_base64="+K/5Wk0FyPsAJXyzFY9SRdfyXrw=">AAAB7XicbVDLSgNBEOyNrxhfUY9eBoPgKeyKqMeAF48RzQOSJcxOZpNJ5rHMzAphyT948aCIV//Hm3/jJNmDJhY0FFXddHdFCWfG+v63V1hb39jcKm6Xdnb39g/Kh0dNo1JNaIMornQ7woZyJmnDMstpO9EUi4jTVjS+nfmtJ6oNU/LRThIaCjyQLGYEWyc1H3oZG0175Ypf9edAqyTISQVy1Hvlr25fkVRQaQnHxnQCP7FhhrVlhNNpqZsammAyxgPacVRiQU2Yza+dojOn9FGstCtp0Vz9PZFhYcxERK5TYDs0y95M/M/rpDa+CTMmk9RSSRaL4pQjq9DsddRnmhLLJ45gopm7FZEh1phYF1DJhRAsv7xKmhfVwK8G95eV2lUeRxFO4BTOIYBrqMEd1KEBBEbwDK/w5invxXv3PhatBS+fOYY/8D5/ALC9jyc=</latexit>

variables: Si
(LDP)
g pGq ρ gpGq
Vj
<latexit sha1_base64="EnoGgiG3YNpL8leqKKG9N6ByyXA=">AAAB8nicbVBNSwMxEM3Wr1q/qh69BItQL2VXRD0WvXisYD+gXUs2zbax2WRJZoWy7M/w4kERr/4ab/4b03YP2vpg4PHeDDPzglhwA6777RRWVtfWN4qbpa3tnd298v5By6hEU9akSijdCYhhgkvWBA6CdWLNSBQI1g7GN1O//cS04UrewyRmfkSGkoecErBSt9VPH7OHtHp9mvXLFbfmzoCXiZeTCsrR6Je/egNFk4hJoIIY0/XcGPyUaOBUsKzUSwyLCR2TIetaKknEjJ/OTs7wiVUGOFTalgQ8U39PpCQyZhIFtjMiMDKL3lT8z+smEF75KZdxAkzS+aIwERgUnv6PB1wzCmJiCaGa21sxHRFNKNiUSjYEb/HlZdI6q3luzbs7r9Qv8jiK6Agdoyry0CWqo1vUQE1EkULP6BW9OeC8OO/Ox7y14OQzh+gPnM8fw66Q3A==</latexit>
(B)
Sji
<latexit sha1_base64="SaRLs1EMOtsnvbXYqxVQ9fzBKp0=">AAAB83icbVBNSwMxEJ2tX7V+VT16CRahXsquiHosevFY0X5Au5Zsmm1js8mSZIWy7N/w4kERr/4Zb/4b03YPWn0w8Hhvhpl5QcyZNq775RSWlldW14rrpY3Nre2d8u5eS8tEEdokkkvVCbCmnAnaNMxw2okVxVHAaTsYX0399iNVmklxZyYx9SM8FCxkBBsr9W776QPL7tPq5XHWL1fcmjsD+ku8nFQgR6Nf/uwNJEkiKgzhWOuu58bGT7EyjHCalXqJpjEmYzykXUsFjqj209nNGTqyygCFUtkSBs3UnxMpjrSeRIHtjLAZ6UVvKv7ndRMTXvgpE3FiqCDzRWHCkZFoGgAaMEWJ4RNLMFHM3orICCtMjI2pZEPwFl/+S1onNc+teTenlfpZHkcRDuAQquDBOdThGhrQBAIxPMELvDqJ8+y8Oe/z1oKTz+zDLzgf34elkUw=</latexit>
(B)
Sji Vj
<latexit sha1_base64="YA6sJJZW4rFqs+K2sjWK+riseCE=">AAAB83icbVA9SwNBEJ2LXzF+RS1tFoMQm3AnopYBGwuLiOYDkjPsbfaSNXu7x+6eEI77GzYWitj6Z+z8N26SKzT6YODx3gwz84KYM21c98spLC2vrK4V10sbm1vbO+XdvZaWiSK0SSSXqhNgTTkTtGmY4bQTK4qjgNN2ML6c+u1HqjST4s5MYupHeChYyAg2Vurd9tMHlt2n1evjrF+uuDV3BvSXeDmpQI5Gv/zZG0iSRFQYwrHWXc+NjZ9iZRjhNCv1Ek1jTMZ4SLuWChxR7aezmzN0ZJUBCqWyJQyaqT8nUhxpPYkC2xlhM9KL3lT8z+smJrzwUybixFBB5ovChCMj0TQANGCKEsMnlmCimL0VkRFWmBgbU8mG4C2+/Je0TmqeW/NuTiv1szyOIhzAIVTBg3OowxU0oAkEYniCF3h1EufZeXPe560FJ5/Zh19wPr4BluGRVg==</latexit>
(L)
<latexit sha1_base64="LWvXHqR99qdHqcfGf5jay1180i0=">AAAB8nicbVA9SwNBEN2LXzF+RS1tFoMQm3AnopYBGwuLCOYDkjPsbfaSNXu7x+6cEI77GTYWitj6a+z8N26SKzTxwcDjvRlm5gWx4AZc99sprKyurW8UN0tb2zu7e+X9g5ZRiaasSZVQuhMQwwSXrAkcBOvEmpEoEKwdjK+nfvuJacOVvIdJzPyIDCUPOSVgpW6rnz5mD2n19jTrlytuzZ0BLxMvJxWUo9Evf/UGiiYRk0AFMabruTH4KdHAqWBZqZcYFhM6JkPWtVSSiBk/nZ2c4ROrDHCotC0JeKb+nkhJZMwkCmxnRGBkFr2p+J/XTSC88lMu4wSYpPNFYSIwKDz9Hw+4ZhTExBJCNbe3YjoimlCwKZVsCN7iy8ukdVbz3Jp3d16pX+RxFNEROkZV5KFLVEc3qIGaiCKFntErenPAeXHenY95a8HJZw7RHzifP9LqkOY=</latexit>
(L)
minimize: λg  S i }S  S gpBq }2
i
2 i i (23)

Vj
local constraints: Sigl ¤ SigpGq ¤ Sigu (24)
g pG q
O p1  β q ¤ OpS q ¤ O  p1 β q
<latexit sha1_base64="tMnDGzTT0KuJSe7PKhUp0tJumRM=">AAAB6nicbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqseCF48V7Qe0oWy2m3btZhN2J0IJ/QlePCji1V/kzX/jts1BWx8MPN6bYWZekEhh0HW/ncLa+sbmVnG7tLO7t39QPjxqmTjVjDdZLGPdCajhUijeRIGSdxLNaRRI3g7GNzO//cS1EbF6wEnC/YgOlQgFo2il+1b/sV+uuFV3DrJKvJxUIEejX/7qDWKWRlwhk9SYrucm6GdUo2CST0u91PCEsjEd8q6likbc+Nn81Ck5s8qAhLG2pZDM1d8TGY2MmUSB7YwojsyyNxP/87ophtd+JlSSIldssShMJcGYzP4mA6E5QzmxhDIt7K2EjaimDG06JRuCt/zyKmldVD236t1dVuq1PI4inMApnIMHV1CHW2hAExgM4Rle4c2Rzovz7nwsWgtOPnMMf+B8/gAqrI2r</latexit>

i i i (25)
Bus

Fig. 2. The ADMM-based LDP post-processing step of PD-OPF.


constraints (Eq. (21)) are enforced as local constraints by each
agent. Finally, the load agents control the minimization term
C. Decentralized Fidelity Phase Objective (19) of problem PRBL , to control the deviation of the
To coordinate the resolution of problem PRBL in a decen- new, post-processed load w.r.t. the Laplace obfuscated coun-
tralized fashion, the problem is expressed into the format of terpart. A detailed description of the individual optimization
Eq. (9) and solved using an ADMM protocol. The ADMM problems computing the local Lagrange functions (Eq. 10) for
mechanism used follows the component-based dual decompo- the load, generator, and line agents, and (Eq. 11) for the bus
sition framework [17], [25] and models each power system agents is given as follows. 2
component as an individual agent. The framework considers Load agent The optimization step performed by each load
four types of agents: load demand agents D, generator agents agent i (i P N ), at each iteration, produces a load value
dpD q
G, line agents L, and bus agents B. Figure 2 illustrates the Si and is shown in Model 2. Eq. (22) captures the load
ADMM communication scheme adopted by each agent (i P N , augmented Lagrange function (see Eq. (19)) and the agent
if it is a bus, load, or generator agent), or (pi, j q P E, if it is coupling constraints described as penalty terms. The first term
a line agent). of the objective is the L2 distance between the load value
dpD q
It is summarized in the following three steps. At each Si and the Laplace load value S̃id . The remaining terms
iteration: correspond to the load coupling constraint, matching the load
dpD q dpB q
1) Load, generator, and line agents compute their individ- values Si to the feedback signal Si from the connecting
dpD q bus.
ual consensus variables, respectively, Si , for load
g pGq pLq pLq
agent i, Si , for generator agent i, and Sij , Vij Generator agent The objective of the generator agent i
p Lq p Lq
(and Sji , Vji for the reverse direction) for line agent (i P N ), at each iteration, is that of producing a dispatch
g pGq g pB q
pij q. Collectively, they form a consensus vector x  value Si that matches the feedback signal Si from the
xSidpDq , SigpGq , SijpLq , VijpLq , SjipLq , VjipLq y (see Eq. (10)), connecting bus. The problem is reported in Model 3. Therein,
which is sent to their connecting bus agents. Eq. (23) describes the generator agent coupling constraints
2) Upon receiving its neighboring load, generator, and line as penalty terms. The optimization model ensures that the
consensus variables, bus agent i computes the response dispatch values satisfy the feasible bounds (Eq. (24)), and
dpB q g pB q pBq pBq
value z  xSi , Si , Sij , Vi y (see Eq. (11)) and that the dispatch cost stays within the fidelity requirement
dpB q g pB q (Eq. (25)).
send value Si to load agent i, value Si to generator
pBq pBq to line agent pij q, for each Line agent The objective of the line agent (ij) (pi, j q P E), is
agent i, and values Sij , Vi pLq pLq
that of finding flow values Sij and Sji and voltage values
line (i, j) connected to bus i.
3) Finally, each agent updates its corresponding dual vari-
pLq pLq
Vij and Vji (i.e. voltages on each side of line pi, j q) that
ables in the complex domain C: λdi , for load agent pBq pBq and
match the corresponding feedback signals Sij , Vi
i, λgi , for generator agent i, and λVij , λSij , for line pBq pBq
agent pi, j q. Collectively, they are identified with λ 
Sji , Vj , computed by the buses i and j, respectively.
xλdi , λgi , λVij , λSij y, using the notation in Eq. (12). The optimization is illustrated in Model 4. It describes four
coupling constraints: two associated to the voltage values
The goal of the coupling constraints Ax Bz  c (see and two associated to the flow values (Eq. (32)). The model
Constraint (9)) is that of matching the states values z of also ensures the voltages and power flows are within the
the bus agents to those of their connected components x.
The fidelity constraint (Eq. (20)) and the AC Power Flow 2 To 
simplify the notations, ( ) is used to represent the complex dot product.

21st Power Systems Computation Conference Porto, Portugal — June 29 – July 3, 2020
PSCC 2020
Model 4 ADMM: Line agent Li,j pPline q Algorithm 1: ADMM: Main routine
inputs: xρ, λS , λV , S
p B q , V pB q , λ S , λ V , S pB q , V pB q y x y x |@ y x |@ y
Inputs : N , ρinit , tmax , S̃id Di , Oi Gi
p q
ij ij
p q
ij
p q
ij
p q
ji ji ji ji
1 ρ Ð ρinit
dpB q g pB q
L L L L
variables:
¸
Sij , Sji , Vij , Vji
2 xλdi , Si yÐx y @
0, 0 Di ; λgi , Si x yÐx y @
0, 0 Gi ;
pL q
rλSef  Sef λV  p Lq x S p Bq
yÐx y^x V p Bq
y Ð x y @p q P Li,j
minimize: ef Vef 3 λij , Sij 0, 0 λij , Vij 0, 0 i, j
pe,f qPtpi,j q,pj,iqu 4 
for t 1, 2, . . . , tmax do
ρ
p}S pLq  S pBq }2
2 ef ef }VefpLq  VefpBq }2 qs (26) 5

6
Optimization of load, generator, and line agents
@ d pD q
D i : Si Ð x dpB q
Pload ( ρ, λdi , S̃id , Si ) y
pL q p Lq
local constr. =Vij  0, if i  s; =Vji  0, if j  s; (27) 7 @
Gi : Si
g pGq
Ð xg 
Pgen ( ρ, λi , Oi , Si
g pB q
) y
pLq | ¤ vu , @pe, f q P tpi, j q, pj, iqu @ pLq pLq pLq pLq Ð
v l ¤ |V (28) 8 Li,j : Sij , Vij , Sji , Vji
e ef e
x
Pline ( ρ, λS V pB q SpB q V pB q pBq y)
 θef

¤ =pVefpLq VfpeLq q ¤ θef

(29) 9
ij , λij , Sij , Vij , λji , λji , Sji , Vji
Optimization of bus agents
d pB q g pB q pB q pB q
pLq | ¤ su , @pe, f q P tpi, j q, pj, iqu
|Sef (30) 10 @Bi : S i , Si , Vi , Sef Ð
p q p qy p Lq pLq yq
ef
p Lq pL q
Sef  Yef |Vef |2  Yef
  V pLq V pLq px 
Pbus ρ, λdi , Si
d D
, λgi , Si g G
, λS x V
ef , Sef , λef , Vef 
ef ef
Lagrange multiplier update
@pe, f q P tpi, j q, pj, iqu
11
d pD q dpB q
(31)
12 @Di and Bi : λdi Ð
λdi Si p Si  q
g pGq g pB q
13 @ g
Gi and Bi : λi λiÐ
g
Si pS  q
@ { Ð pLiq S pBq , λV
p  q Ð
Model 5 ADMM: Bus agent Bi pPbus q 14 Li,j and Bi Bj : λS ij λS
ij
pL q  p B q q
Sij ij ij

dpD q g pGq
λV Vijp Vi
inputs: xρ, λdi , Si y, ij
, λgi , Si 15 Coordinating agent penalty ρ update (optional)
S p Lq V
ij
p Lq
xλ , S , λ , V |@pi, j q P E Y E R y ij
16 ρ Ð update p()
ij ij

variables:
p q , S gpBq , V pBq , S pBq @pi, j q P E Y E R
d B
Si
Output : Sid
i i ij
d pB q ρ dpB q
minimize: λd  S i }S  S dpDq }2
i
2 i i

λgi  g B
Si
p q ρ g pB q
S }  SigpGq }2 is executed for tmax iterations and the overall communication
¸ complexity is in Optmax p|N | |E|qq.
2 i
rλSij  SijpBq ρ2 }SijpBq  SijpLq }2 The ADMM coordination process described above is similar
pi,j qPE YE R
pBq ρ }V pBq  V pLq }2 s to that introduced in [17]. However, differently from other
ij  Vi
λV (32)
2 i
¸ proposals, that use ADMM for solving an OPF, the ADMM
ij
g pB q d pB q pB q
local constraint: Si  Si  Sij (33) scheme used by PD-OPF is used for the distributed resolution
pi,j qPE YE R of problem PRBL . It redistributes the noise introduced by the
Laplace mechanism optimally to satisfy the fidelity criteria.
Theorem 3: PD-OPF satisfies local α-indistinguishability.
feasible bounds (Eqs. (28) to (30)), and that the AC power Proof. By Theorem 2, the load values obtained by the applica-
flow constraints are satisfied (Eq. (31)). The voltage angle tion of the Laplace mechanism satisfy α-local indistinguisha-
=VijpLq {=VjipLq is zero if it connects to a slack bus (Eq. (27)). bility. The ADMM mechanism makes use of exclusively the
Bus agent At each iteration, bus agent i performs the opti- privacy-preserved load values S̃ d (computed by the application
of the Laplace mechanism), as well as additional public
information (e.g. the local cost values Oi ). Therefore, by post-
mization described in Model 5. Its objective is that of finding
dpB q g pB q pB q
load value Si , generator value Si , voltage value Vi ,
p Bq
and flow values Sij , for each connecting line pi, j q P E YE R ,
processing immunity of differential privacy, PD-OPF satisfies
that match the state variables sent from the load, generator,
local α-indistinguishability. l
and line agents, respectively. The model also ensures the VI. E XPERIMENTAL R ESULTS
satisfaction of the flow balance constraint (Eq. (33)).
This section reports on the obfuscation quality and ability
ADMM Coordination Process The ADMM algorithm that to converge of PD-OPF. Additionally, the proposed method is
coordinates all agents is illustrated in Algorithm 1. Lines 1 to compared with a centralized version that solves problem PRBL ,
3 initialize all variables associated with the load, generator, thus admitting the presence of a centralized data curator. The
and line agents, respectively. Each of these agents, hence, experiments are performed on a variety of NESTA [26] bench-
perform their optimization step (lines 6 to 8), independently marks. Parameter  is fixed to 1.0, the indistinguishability level
from one another, and send their (consensus) variables to α varies from 0.01 to 0.1 in p.u. (i.e. 1 MVA to 10 MVA),
the corresponding bus agents. Upon receiving the consensus and the fidelity level β varies from 102 to 101 (i.e. from
variables from each of their neighboring agents, the bus agents 1% to 10% of the optimal cost difference). PD-OPF is limited
perform their associated local optimization step and send the to use 5000 iterations. All the models are implemented using
feedback values back to the corresponding load, generator, and PowerModels.jl [27] in Julia with nonlinear solver IPOPT [28].
line agents (line 10). Finally, the multipliers variables λ are Choosing a fixed penalty factor ρ to drive convergence is
updated by each individual agent (lines 12 to 14). At the end of challenging [17]. Thus, the experimental routine adjusts ρ
each iteration, the parameter ρ can be updated. The algorithm dynamically, using the maximum primal and dual infeasibility

21st Power Systems Computation Conference Porto, Portugal — June 29 – July 3, 2020
PSCC 2020
Mechanism 10 Mechanism
10 PD-OPF AC-OPF
PD-OPF AC-OPF
= 0.005 = 0.01

Reactive load (p.u.)


5 5

percentage (%)
0
0
percentage (%)

0
5 5
10 10
15 15
5
20 20
0.1 0.01 0.1 0.01 0 5 0 5
Active Load (p.u.) Active Load (p.u.)
10 Mechanism
10 Mechanism PD-OPF AC-OPF Fig. 4. Loads from the original dataset and the Laplace & the PD-OPF
PD-OPF AC-OPF Mechanisms on the IEEE-57 bus system, at varying of the indistinguishability
5
5 value α 
0.005 (left) and α 
0.01 (right) with β 
0.1. PD-OPF
percentage (%)

0 mechanism: green triangle; Laplace mechanism: yellow cross; Original: blue


percentage (%)

0 dot.
5 5
10 10
B. Quality of Load Demand Obfuscation
15 15
20 Figure 4 depicts the original load values (Orig.) associated
20 0.1 0.01 0.1 0.01 to the IEEE-57 bus systems, and compares them with those
generated by the Laplace mechanism (Lap.) and by PD-OPF.
Fig. 3. Dispatch costs differences between the optimal and the PD-OPF The figure illustrates that the post-processing step used in PD-
solution (PD-OPF) and its centralized AC-OPF counterpart. IEEE 39 (top) &

IEEE 57 bus (bottom), α 0.01 (left), 0.1 (right), β 0.1, 0.01 . PD-OPF r s OPF modifies the original loads. Since the Laplace mechanism
mechanism: blue bars; centralized AC-OPF: brown bars. does not converge to an AC feasible solution, PD-OPF further
modifies the Laplace-generated loads. The figure does not
report the AC-feasible loads due to large overlaps with PD-
values, p  max rp and d  max rd , respectively (in spirit OPF values.
of [17]). Higher values of ρ encourage the satisfaction of
the primal constraints, while lower values shift weights to C. Quality of Privacy Loss Minimization
the objectives and reduce the dual infeasibilities [17]. The
Figure 5 illustrates the difference between the loads pro-
heuristic adopted changes ρ when the distance between p and
duces by PD-OPF and those produces by a centralized imple-
d becomes too large:
mentation of problem PRBL [5]. The difference is measured in
ρ  mintp1 cqρ, ρu, if p ¡ ct d , terms of distance from the Laplace obfuscated loads (averaged
over 50 instances). The differences in the IEEE-39 test case
ρ  maxt , ρu, if d ¡ ct p .
ρ
1 c are due to the feasibility boosting phase, activated to improve
the primal feasibility. In the other test cases the differences
The scaling factor c is set to 2%, the threshold parameter ct to between the two approaches are negligible, thus validating
7.0, and upper ρ and lower ρ bounds to 106 and 5, respectively. the use of a decentralized solution for releasing loads when a
To allow PD-POPF to restore primal feasibility, a feasi- centralized trusted data curator is unavailable.
bility boosting procedure is implemented as follows. When
the iteration counter 4500 iterations, if the maximum primal D. Convergence Quality & Runtime
infeasibility is larger than 103 , ρ will be increased by:
mintp1 cqρ, ρu. We call this phase feasibility boosting.
Finally, table II presents the maximum and dual infeasibil-
ities (in p.u.), before and after (marked with ) activating the
feasibility boosting procedure. The table clearly illustrates the
A. Quality of Fidelity Restoration
benefits of the boosting procedure. It is able to reduce the
Let O and Ô to be the optimal dispatch costs for the orig- primal infeasibility of up to two order of magnitude, albeit at
inal and obfuscated loads respectively. Figure 3 illustrates the a cost of a larger dual infeasibility.
average percentage difference on the dispatch cost differences Figure 6 illustrates the details of one run on the IEEE-39
between the original and obfuscated loads produced by PD- benchmark. After a few iterations, both the primal and the dual
OPF: 100  ÔO O  . Since a PD-OPF implements a relaxation infeasibilities stabilize in the range r101 , 101 s (top-left), and
of Constraint (18), the Figure also reports a comparison using the generator costs stabilize after 2000 iterations (bottom-left).
a centralized procedure that solves an AC-OPF with the PD- When the feasibility boosting is activated, the coordination
OPF loads as input. The experimental results indicate that PD- agent increases the parameter ρ (bottom right), inducing all
OPF is able to restore the problem fidelity well, even when the agents to re-optimize with a higher penalty for violating the
fidelity requirement β are as small as 0.01% of the original coupling constraints. This is obtained at a cost of a larger dual
costs. feasibility (top-right).

21st Power Systems Computation Conference Porto, Portugal — June 29 – July 3, 2020
PSCC 2020
PF-OPF Centralized PF-OPF Centralized PF-OPF Centralized
= 0.05 = 0.1 = 0.05 = 0.1 = 0.05 175
= 0.1
70
L2 distance from Laplace sol. (p.u.)

L2 distance from Laplace sol. (p.u.)

L2 distance from Laplace sol. (p.u.)

L2 distance from Laplace sol. (p.u.)

L2 distance from Laplace sol. (p.u.)

L2 distance from Laplace sol. (p.u.)


80
40 140 150
80 60
120
50 60 125
30 60 100
40 100
80 40
20 40 30 60 75
20 40 20 50
10 20
10 20 25
0 0.1 0.01 0 0.1 0.01 0 0.1 0.01 0 0.1 0.01 0 0.1 0.01 0 0.1 0.01

Fig. 5. L2 distance between the Laplace obfuscated data and the PD-OPF and the Centralized obfuscated data. IEEE-39 (left), IEEE-57 (center), IEEE-189
(right). α 0.05, 0.1 , β r s r
0.01, 0.1 . PD-OPF mechanism: blue bars; Centralized mechanism: brown bars. s

TABLE II optimization procedure that redistributes the noise introduced


P RIMAL & DUAL INFEASIBILITY, AND S IM . RUNTIME . α  0.1, β  0.1. by traditional DP algorithms to satisfy the desired properties.
Primal Primal  Dual Dual  Time (min.) Extensive experimental evaluations on the NESTA benchmark
nesta case3 lmbd 0.036 0.001 0.173 0.079 1.147 showed that the PD-OPF can be used to generate privacy-
nesta case4 gs 0.023 0.001 0.092 13.953 2.110 preserving data providing high-quality AC-feasible solutions
nesta case5 pjm 1.580 0.015 3.094 380.243 3.501
nesta case6 c 0.203 0.001 0.835 7.088 2.607 and that the results attained are comparable with those ob-
nesta case6 ww 0.094 0.001 0.419 7.919 3.215 tained by a centralized routine approach.
nesta case9 wscc 0.197 0.001 1.224 5.908 2.776
nesta case14 ieee 0.579 0.001 2.228 19.762 5.141 A fine-tuning of the ADMM parameters, including the effect
nesta case24 ieee rts 0.293 0.006 1.276 540.403 11.157
nesta case29 edin 0.216 0.128 2.393 3027.724 38.686
of variable initialization will be subject of future investigation.
nesta case30 as 0.386 0.001 1.685 15.223 12.592
nesta case30 fsr 0.416 0.001 2.215 14.001 10.738
nesta case30 ieee 0.621 0.001 2.831 37.137 11.167
A PPENDIX
nesta case39 epri 0.291 0.026 1.597 1849.358 15.273
nesta case57 ieee 0.584 0.001 2.951 62.776 19.614 A. PD-OPF with the Piecewise Mechanism
nesta case73 ieee rts 0.402 0.008 2.762 691.576 45.131
nesta case118 ieee 0.968 0.004 4.427 394.885 82.160 The PD-OPF framework can also be extended to work with
nesta case189 edin 3.214 0.017 14.780 871.245 86.908
other Local Differential Privacy mechanism (LDP). Instead
of using Polar Laplace mechanism in the Privacy Phase, this
15000 Primal Infeas. Primal Infeas.
section showcases another LDP mechanism: the Piecewise
600
Infeasibilities (p.u.)

Infeasibilities (p.u.)

Dual Infeas. Dual Infeas. Mechanism [29]. The Piecewise Mechanism also satisfies the
10000
400 L1 -LDP for α distances definition. It requires all input data
5000 xi to be normalized within r1, 1s from rxi , xi s. Let:
200
 2α{
0
0 2000
Iterations
4000 0
4400 4600 4800
Iterations
5000 C  ee{2α  11 ,
C 1
Lpxi q  xi 
1 C
100000 , and
97500 2 2
80000
95000 Rpxi q  Lpxi q C  1.
penalty

60000
Cost

92500 40000
90000 20000 The mechanism perform obfuscation based as in Algorithm
87500 Dispatch Cost 2. To implement the Piecewise Mechanism, linear transforma-
0
0 2000 4000 0 2000 4000 tions are used by each of the load agents Di to normalize active
Iterations Iterations
and reactive parts of the load value Sid into [-1,1]. To transform
from a bounded domain xi P rxi , xi s to yi P r1, 1s (and vice
Fig. 6. IEEE-39 bus: Primal p and dual d infeasibilities (Full-scale: top left,
¡ 4400 iterations: top right), generator dispatch costs (bottom left), penalty x x
ρ (bottom right); α  0.1, β  0.1. The vertical dotted line marks the versa), the following equation is used: yi  2 xii xii  1.
activation of the boosting procedure.
Table III shows the primal and dual convergence quality
and simulation runtime similar as in previous section. Figure 7
VII. C ONCLUSION
This paper presented a framework for releasing privacy- Algorithm 2: Piecewise Mechanism for LDP
Sample p  Uniformpr0, 1sq
preserving OPF load data of a decentralized operated power
17
system. The proposed framework, called Privacy-preserving {2α
Distributed OPF (PD-OPF), is based on the Alternating Direc- 18 if p ¤ ee{2α 1 then
tion Method of Multipliers (ADMM) and satisfies the notion 19 Sample x̃i  UniformprLpxi q, Rpxi qsq
of differential privacy to guarantee strong privacy protection 20 else
for the customer loads while also ensuring that the released 21 Sample x̃i  UniformprC, Lpxi qs Y rRpxi q, C sq
data retains high fidelity and satisfies the AC power flow 22 Return x̃i
constraints. The key component of PD-OPF is a distributed

21st Power Systems Computation Conference Porto, Portugal — June 29 – July 3, 2020
PSCC 2020
shows the fidelity can again be restored by the ADMM mech- PD-OPF Centralized
= 0.05 = 0.1

L2 dist. from Piecewise Linear (p.u.)

L2 dist. from Piecewise Linear (p.u.)


anism. Figure 8 shows comparable obfuscation quality when 250
500
comparing to the Laplace mechanism in Figure 4. Finally, 200 400
Figure 9 shows the ADMM algorithm can achieve comparable 150 300
privacy loss minimization results to centralized optimization. 100 200
50 100
TABLE III 0 0.1 0.01 0 0.1 0.01
P RIMAL AND DUAL INFEASIBILITY, AND SIMULATION RUNTIME .
α 0.1, β 0.1.   = 0.05
PD-OPF Centralized
= 0.1

L2 dist. from Piecewise Linear (p.u.)

L2 dist. from Piecewise Linear (p.u.)


Primal Primal  Dual 
Dual Time (min.) 120 250
nesta case3 lmbd 0.001 0.001 0.015 0.015 0.089 100 200
nesta case4 gs 0.031 0.001 0.151 11.733 3.505 80
150
nesta case5 pjm 1.820 0.015 3.290 382.929 3.416 60
nesta case6 c 0.006 0.001 0.038 0.180 0.479 100
40
nesta case6 ww 0.217 0.072 1.064 20667.869 4.165 20 50
nesta case9 wscc 0.023 0.001 0.119 1.596 1.445
nesta case14 ieee 0.085 0.001 0.392 5.402 8.722 0 0.1 0.01 0 0.1 0.01
nesta case24 ieee rts 0.133 0.008 0.859 611.856 11.294
nesta case29 edin 0.197 0.098 2.676 3810.460 82.134 Fig. 9. L2 distance between ADMM/Centralized Mechanisms and Piecewise
nesta case30 as 0.161 0.001 0.847 5.090 9.244 Linear Obfuscated Dataset on the IEEE-39 (top) and IEEE-57 (bottom) bus
nesta case30 fsr 0.050 0.001 0.250 1.525 9.824 systems, with α 0.05, 0.1 , and β r
0.01, 0.1 . PD-OPF: blue bars; s r s
nesta case30 ieee 0.211 0.001 1.074 9.788 9.714 AC-OPF: brown bars.
nesta case39 epri 0.920 0.020 4.371 1029.756 37.142
nesta case57 ieee 1.201 0.001 4.947 104.336 40.772
nesta case73 ieee rts 0.219 0.011 1.654 777.139 43.815
nesta case189 edin 1.432 0.016 6.904 799.463 83.319 R EFERENCES
[1] F. Fioretto, T. W. K. Mak, and P. V. Hentenryck, “Privacy-preserving
obfuscation of critical infrastructure networks,” in Proceedings of the
International Joint Conference on Artificial Intelligence (IJCAI), 2019,
10 Mechanism pp. 1086–1092.
10 Mechanism PD-OPF AC-OPF
PD-OPF AC-OPF [2] C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to
5 5 sensitivity in private data analysis,” in TCC, vol. 3876. Springer, 2006,
pp. 265–284.
percentage (%)

0
percentage (%)

0 [3] T. Mak, F. Fioretto, L. Shi, and P. Van Hentenryck, “Privacy-preserving


5 5 power system obfuscation: A bilevel optimization approach,” IEEE
Transactions on Power Systems, vol. 35, no. 2, pp. 1627–1637, March
10 10 2020.
[4] F. Fioretto, T. W. K. Mak, and P. Van Hentenryck, “Differential privacy
15 15 for power grid obfuscation,” IEEE Transactions on Smart Grid, vol. 11,
20 20 0.1 0.01
no. 2, pp. 1356–1366, March 2020.
0.1 0.01 [5] F. Fioretto and P. Van Hentenryck, “Constrained-based differential pri-
vacy: Releasing optimal power flow benchmarks privately,” in Proceed-
ings of Integration of Constraint Programming, Artificial Intelligence,
Fig. 7. IEEE 57 bus. Percentage Difference on the Dispatch Costs af- and Operations Research (CPAIOR), 2018, pp. 215–231.
ter ADMM mechanism and AC validation: α = 0.01 (left), 0.1 (right), [6] C. Dwork and A. Roth, “The algorithmic foundations of differential
β=[0.1,0.01]. Average over 50 instances. PD-OPF: blue bars; AC-OPF: brown privacy,” Theoretical Computer Science, vol. 9, no. 3-4, pp. 211–407,
bars. 2013.
[7] S. Vadhan, “The complexity of differential privacy,” in Tutorials on the
Foundations of Cryptography. Springer, 2017, pp. 347–450.
[8] G. Ács and C. Castelluccia, “I have a dream!(differentially private smart
metering).” in Information hiding, vol. 6958. Springer, 2011, pp. 118–
= 0.005 = 0.01 132.
Reactive load (p.u.)

2 [9] J. Zhao, T. Jung, Y. Wang, and X. Li, “Achieving differential privacy


of data disclosure in the smart grid,” in INFOCOM, 2014 Proceedings
IEEE. IEEE, 2014, pp. 504–512.
[10] X. Liao, P. Srinivasan, D. Formby, and A. R. Beyah, “Di-prida: Differ-
0 entially private distributed load balancing control for the smart grid,”
IEEE Transactions on Dependable and Secure Computing, 2017.
[11] A. Halder, X. Geng, P. R. Kumar, and L. Xie, “Architecture and
2 algorithms for privacy preserving thermal inertial load management by

5 0 5 5 0 5
a load serving entity,” IEEE Transactions on Power Systems, vol. 32,
no. 4, pp. 3275–3286, July 2017.
Active Load (p.u.) Active Load (p.u.) [12] F. Zhou, J. Anderson, and S. H. Low, “Differential privacy of aggregated
DC optimal power flow data,” arXiv preprint arXiv:1903.11237, 2019.
Fig. 8. Loads from the original dataset and the Piecewise Linear & ADMM
[13] T. Zhang and Q. Zhu, “Dynamic differential privacy for ADMM-based
Mechanisms on the IEEE-57 bus system, at varying of the indistinguishability
value α 
0.005 (left) and α 0.01 (right) with β 0.1. PD-  distributed classification learning,” IEEE Transactions on Information
Forensics and Security, vol. 12, no. 1, pp. 172–187, 2016.
OPF mechanism: green triangle; Piecewise Linear mechanism: yellow cross;
[14] Z. Huang, R. Hu, Y. Guo, E. Chan-Tin, and Y. Gong, “DP-ADMM:
Original: blue dot.
ADMM-based distributed learning with differential privacy,” IEEE
Transactions on Information Forensics and Security, 2019.

21st Power Systems Computation Conference Porto, Portugal — June 29 – July 3, 2020
PSCC 2020
[15] J. Ding, Y. Gong, M. Pan, and Z. Han, “Optimal differentially
private ADMM for distributed machine learning,” arXiv preprint
arXiv:1901.02094, 2019.
[16] S. Boyd, N. Parikh, E. Chu, B. Peleato, J. Eckstein et al., “Distributed
optimization and statistical learning via the alternating direction method
of multipliers,” Foundations and Trends R in Machine learning, vol. 3,
no. 1, pp. 1–122, 2011.
[17] S. Mhanna, G. Verbič, and A. C. Chapman, “Adaptive admm for dis-
tributed ac optimal power flow,” IEEE Transactions on Power Systems,
vol. 34, no. 3, pp. 2025–2035, May 2019.
[18] J. M. Abowd, “The us census bureau adopts differential privacy,” in
Proceedings of the 24th ACM SIGKDD International Conference on
Knowledge Discovery & Data Mining. ACM, 2018, pp. 2867–2867.
[19] F. Fioretto and P. V. Hentenryck, “Differential privacy of hierarchical
census data: An optimization approach,” in Principles and Practice of
Constraint Programming - 25th International Conference, CP, 2019, pp.
639–655.
[20] G. Fanti, V. Pihur, and Ú. Erlingsson, “Building a rappor with the
unknown: Privacy-preserving learning of associations and data dictionar-
ies,” Proceedings on Privacy Enhancing Technologies, vol. 2016, no. 3,
pp. 41–61, 2016.
[21] C. Dwork, K. Kenthapadi, F. McSherry, I. Mironov, and M. Naor,
“Our data, ourselves: Privacy via distributed noise generation,” in
Annual International Conference on the Theory and Applications of
Cryptographic Techniques. Springer, 2006, pp. 486–503.
[22] K. Chatzikokolakis, M. E. Andrés, N. E. Bordenabe, and C. Palamidessi,
“Broadening the scope of differential privacy using metrics,” in Inter-
national Symposium on Privacy Enhancing Technologies Symposium.
Springer, 2013, pp. 82–102.
[23] M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi,
“Geo-indistinguishability: Differential privacy for location-based sys-
tems,” in Proceedings of the 2013 ACM SIGSAC conference on Com-
puter & communications security. ACM, 2013, pp. 901–914.
[24] A. Sinha, P. Malo, and K. Deb, “A review on bilevel optimization: from
classical to evolutionary approaches and applications,” IEEE Transac-
tions on Evolutionary Computation, vol. 22, no. 2, pp. 276–295, 2018.
[25] S. Mhanna, A. C. Chapman, and G. Verbič, “Component-based dual
decomposition methods for the opf problem,” Sustainable Energy, Grids
and Networks, vol. 16, pp. 91 – 110, 2018.
[26] C. Coffrin, D. Gordon, and P. Scott, “Nesta, the NICTA energy system
test case archive,” CoRR, vol. abs/1411.0359, 2014. [Online]. Available:
http://arxiv.org/abs/1411.0359
[27] C. Coffrin, R. Bent, K. Sundar, Y. Ng, and M. Lubin, “Powermodels.jl:
An open-source framework for exploring power flow formulations,” in
PSCC, June 2018.
[28] A. Wächter and L. T. Biegler, “On the implementation of an interior-
point filter line-search algorithm for large-scale nonlinear programming,”
Mathematical Programming, vol. 106, no. 1, pp. 25–57, 2006.
[29] N. Wang, X. Xiao, Y. Yang, J. Zhao, S. C. Hui, H. Shin, J. Shin,
and G. Yu, “Collecting and analyzing multidimensional data with local
differential privacy,” in 2019 IEEE 35th International Conference on
Data Engineering (ICDE). IEEE, 2019, pp. 638–649.

21st Power Systems Computation Conference Porto, Portugal — June 29 – July 3, 2020
PSCC 2020

You might also like