Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3372454.3372487acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdrConference Proceedingsconference-collections
research-article

Encrypted Decentralized Optimization for Data Masking in Energy Scheduling

Published: 21 January 2020 Publication History

Abstract

In agent-based, decentralized optimization for coordinated energy generation in virtual power plants, often plain information on possible generation (or consumption) profiles is communicated to other agents in the network. If the virtual power plant consists of members from a local vicinity like an energetic neighborhood, e.g. an industrial estate, schedules can easily be assigned to specific entities in the neighborhood. Patterns of generation and consumption can be derived from collected schedules and from the aggregated information therein. We present a fully decentralized, agent-based optimization algorithm for orchestration of generation and consumption that works with encrypted schedules and thus masks the sent data, preventing machine learning methods from deriving information on other agents. We demonstrate the feasibility of still being able to conduct optimization for energy scheduling when using order preserving encryption.

References

[1]
R. Khatoun and S. Zeadally, "Smart cities: Concepts, architectures, research opportunities," Commun. ACM, vol. 59, pp. 46--57, July 2016.
[2]
T. Becker, S. Boschert, L. Hempel, S. Höffken, and B. Obst, "Complex urban simulations and sustainable urban planning with spatial and social implications," in Int Ann Photogrammetry, Remote Sensing Spat Inf Sci, ISPRS 8th 3DGeoInfo conference and WG II/2 workshop, vol. 2, p. W1, 2013.
[3]
S. Karnouskos, "Demand side management via prosumer interactions in a smart city energy marketplace," in 2011 2nd IEEE PES International Conference and Exhibition on Innovative Smart Grid Technologies, pp. 1--7, IEEE, 2011.
[4]
B. Nikonowicz and J. Milewski, "Virtual power plants -- general review: structure, application and optimization.," Journal of Power Technologies, vol. 92, no. 3, 2012.
[5]
M. Sonnenschein, O. Lünsdorf, J. Bremer, and M. Tröschel, "Decentralized control of units in smart grids for the support of renewable energy supply," Environmental Impact Assessment Review, no. 0, pp. -, 2014.
[6]
S. Thiem, V. Danov, M. Metzger, J. Schäfer, and T. Hamacher, "Project-level multi-modal energy system design-novel approach for considering detailed component models and example case study for airports," Energy, vol. 133, pp. 691--709, 2017.
[7]
C. Hinrichs, S. Lehnhoff, and M. Sonnenschein, "A Decentralized Heuristic for Multiple-Choice Combinatorial Optimization Problems," in Operations Research Proceedings 2012, pp. 297--302, Springer, 2014.
[8]
C. Hinrichs and M. Sonnenschein, Design, Analysis and Evaluation of Control Algorithms for Applications in Smart Grids, pp. 135--155. Progress in IS, Springer International Publishing, 2016.
[9]
M. Othman, Y. Hegazy, and A. Abdelaziz, "A review of virtual power plant definitions, components, framework and optimization," International Electrical Engineering Journal (IEEJ), vol. 6, pp. 2010--2024, 11 2015.
[10]
T. Dethlefs, D. Beewen, T. Preisler, and W. Renz, "A consumer-orientated architecture for distributed demand-side-optimization," in EnviroInfo, pp. 349--356, BIS-Verlag, 2014.
[11]
C. Hinrichs and M. Sonnenschein, "A distributed combinatorial optimisation heuristic for the scheduling of energy resources represented by self-interested agents," International Journal of Bio-Inspired Computation, vol. 10, p. 69, 07 2017.
[12]
K. Dabrock, "Privacy in der automatisierten prädiktiven Einsatzplanung von Energieanlagen im Smart Grid," Master's thesis, University of Oldenburg, Oldenburg, Germany, 2018.
[13]
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Order preserving encryption for numeric data," in Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, SIGMOD '04, (New York, NY, USA), pp. 563--574, ACM, 2004.
[14]
S. Awerbuch and A. M. Preston, eds., The Virtual Utility: Accounting, Technology & Competitive Aspects of the Emerging Industry, vol. 26 of Topics in Regulatory Economics and Policy. Kluwer Academic Publishers, 1997.
[15]
A. Nieße, S. Beer, J. Bremer, C. Hinrichs, O. Lünsdorf, and M. Sonnenschein, "Conjoint dynamic aggrgation and scheduling for dynamic virtual power plants," in Federated Conference on Computer Science and Information Systems - FedCSIS 2014, Warsaw, Poland (M. Ganzha, L. A. Maciaszek, and M. Paprzycki, eds.), 9 2014.
[16]
J. Bremer, B. Rapp, and M. Sonnenschein, "Encoding distributed search spaces for virtual power plants," in IEEE Symposium Series on Computational Intelligence 2011 (SSCI 2011), (Paris, France), 4 2011.
[17]
J. Bremer and M. Sonnenschein, "Constraint-handling for optimization with support vector surrogate models -- a novel decoder approach," in ICAART 2013 -- Proceedings of the 5th International Conference on Agents and Artificial Intelligence (J. Filipe and A. Fred, eds.), vol. 2, (Barcelona, Spain), pp. 91--105, SciTePress, 2013.
[18]
C. Hinrichs, J. Bremer, and M. Sonnenschein, "Distributed Hybrid Constraint Handling in Large Scale Virtual Power Plants," in IEEE PES Conference on Innovative Smart Grid Technologies Europe (ISGT Europe 2013), IEEE Power & Energy Society, 2013.
[19]
S. D. Ramchurn, P. Vytelingum, A. Rogers, and N. R. Jennings, "Agent-based homeostatic control for green energy in the smart grid," ACM Trans. Intell. Syst. Technol., vol. 2, pp. 35:1--35:28, July 2011.
[20]
R. Kamphuis, C. Warmer, M. Hommelberg, and K. Kok, "Massive coordination of dispersed generation using powermatcher based software agents," in 19th International Conference on Electricity Distribution, 05 2007.
[21]
A. Nieße, S. Lehnhoff, M. Tröschel, M. Uslar, C. Wissing, H. J. Appelrath, and M. Sonnenschein, "Market-based self-organized provision of active power and ancillary services: An agent-based approach for smart distribution grids," in Complexity in Engineering (COMPENG), 2012, pp. 1--5, June 2012.
[22]
S. D. Ramchurn, P. Vytelingum, A. Rogers, and N. R. Jennings, "Putting the 'smarts' into the smart grid: A grand challenge for artificial intelligence," Commun. ACM, vol. 55, pp. 86--97, Apr. 2012.
[23]
C. Hinrichs, S. Lehnhoff, and M. Sonnenschein, "A Decentralized Heuristic for Multiple-Choice Combinatorial Optimization Problems," in Operations Research Proceedings 2012, pp. 297--302, Springer, 2014.
[24]
C. Hinrichs, M. Sonnenschein, and S. Lehnhoff, "Evaluation of a Self-Organizing Heuristic for Interdependent Distributed Search Spaces," in International Conference on Agents and Artificial Intelligence (ICAART 2013) (J. Filipe and A. L. N. Fred, eds.), vol. Volume 1 - Agents, pp. 25--34, SciTePress, 2013.
[25]
D. Karaboga and B. Basturk, "A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm," Journal of Global Optimization, vol. 39, pp. 459--471, Nov. 2007.
[26]
T. Lust and J. Teghem, "The multiobjective multidimensional knapsack problem: a survey and a new approach," CoRR, vol. abs/1007.4063, 2010.
[27]
D. Watts and S. Strogatz, "Collective dynamics of 'small-world' networks," Nature, vol. 393, no. 6684, pp. 440--442, 1998.
[28]
S. P. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Gossip algorithms: design, analysis and applications," Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies., vol. 3, pp. 1653--1664 vol. 3, 2005.
[29]
C. Hinrichs, Selbstorganisierte Einsatzplanung dezentraler Akteure im Smart Grid. PhD thesis, Carl von Ossietzky Universität Oldenburg, 2014.
[30]
J. Bremer and M. Sonnenschein, "Sampling the search space of energy resources for self-organized, agent-based planning of active power provision," in 27th International Conference on Environmental Informatics for Environmental Protection, Sustainable Development and Risk Management, EnviroInfo 2013, Hamburg, Germany, September 2-4, 2013. Proceedings (B. Page, A. G. Fleischer, J. Göbel, and V. Wohlgemuth, eds.), Berichte aus der Umweltinformatik, pp. 214--222, Shaker, 2013.
[31]
G. Ravikumar, T. Manjunath, R. S. Hegadi, and I. Umesh, "A survey on recent trends, process and development in data masking for testing," International Journal of Computer Science Issues (IJCSI), vol. 8, no. 2, p. 535, 2011.
[32]
M. F. Mushtaq, S. Jamel, A. H. Disina, Z. A. Pindar, N. S. A. Shakir, and M. M. Deris, "A survey on the cryptographic encryption algorithms," International Journal of Advanced Computer Science and Applications, vol. 8, no. 11, 2017.
[33]
G. Singh, "A study of encryption algorithms (rsa, des, 3des and aes) for information security," International Journal of Computer Applications, vol. 67, no. 19, 2013.
[34]
G. Bebek, "Anti-tamper database research: Inference control techniques," 05 2019.
[35]
Y. H. Hwang, S. Kim, and J. W. Seo, "Fast order-preserving encryption from uniform distribution sampling," in Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, CCSW '15, (New York, NY, USA), pp. 41--52, ACM, 2015.
[36]
G. Ozsoyoglu, D. Singer, and S. S. Chung, "Anti-tamper databases: Querying encrypted databases," International Federation for Information Processing Digital Library; Data and Applications Security XVII;, vol. 142, 01 2003.
[37]
R. A. Popa, F. H. Li, and N. Zeldovich, "An ideal-security protocol for order-preserving encoding," in Proceedings of the 2013 IEEE Symposium on Security and Privacy, SP '13, (Washington, DC, USA), pp. 463--477, IEEE Computer Society, 2013.
[38]
C. Tex, M. Schäler, and K. Böhm, "Towards meaningful distance-preserving encryption," pp. 1--12, 07 2018.
[39]
A. Boldyreva, N. Chenette, and A. O'Neill, "Order-preserving encryption revisited: Improved security analysis and alternative solutions," in Advances in Cryptology -- CRYPTO 2011 (P. Rogaway, ed.), (Berlin, Heidelberg), pp. 578--595, Springer Berlin Heidelberg, 2011.
[40]
J. Bremer and M. Sonnenschein, "Automatic reconstruction of performance indicators from support vector based search space models in distributed real power planning scenarios," in Informatik 2013, 43. Jahrestagung der Gesellschaft für Informatik e.V. (GI), Informatik angepasst an Mensch, Organisation und Umwelt, 16.-20. September 2013, Koblenz (M. Horbach, ed.), vol. 220 of LNI, pp. 1441--1454, GI, 2013.
[41]
C. Hinrichs, J. Bremer, S. Martens, and M. Sonnenschein, "Partitioning the Data Domain of Combinatorial Problems for Sequential Optimization," in 9th International Workshop on Computational Optimization, Proceedings of the 2016 Federated Conference on Computer Science and Information Systems (M. Ganzha, L. Maciaszek, and M. Paprzycki, eds.), (Gdansk), 2016.
[42]
J. Bremer and S. Lehnhoff, Decentralized Surplus Distribution Estimation with Weighted k-Majority Voting Games, pp. 327--339. Cham: Springer International Publishing, 2017.
[43]
J. Bremer and S. Lehnhoff, Hybrid Multi-ensemble Scheduling, pp. 342--358. Cham: Springer International Publishing, 2017.
[44]
A. Nieße, J. Bremer, and S. Lehnhoff, "On local minima in distributed energy scheduling," in Position Papers of the 2017 Federated Conference on Computer Science and Information Systems, FedCSIS 2017, Prague, Czech Republic, September 3-6, 2017. (M. Ganzha, L. A. Maciaszek, and M. Paprzycki, eds.), vol. 12 of Annals of Computer Science and Information Systems.
[45]
O. Kramer and F. Gieseke, "Short-term wind energy forecasting using support vector regression," vol. 87, pp. 271--280, 01 2011.

Cited By

View all

Index Terms

  1. Encrypted Decentralized Optimization for Data Masking in Energy Scheduling

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICBDR '19: Proceedings of the 3rd International Conference on Big Data Research
    November 2019
    192 pages
    ISBN:9781450372015
    DOI:10.1145/3372454
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • Shandong Univ.: Shandong University
    • The University of Versailles Saint-Quentin: The University of Versailles Saint-Quentin, Versailles, France

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 January 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. COHDA
    2. Encrypted Optimization
    3. Order Preserving Encryption
    4. Predictive Scheduling
    5. Smart Cities

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICBDR 2019

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 56
      Total Downloads
    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media