A Privacy-Preserving Distributed Control of Optimal Power Flow
A Privacy-Preserving Distributed Control of Optimal Power Flow
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2021.3120056, IEEE
Transactions on Power Systems
Abstract—We consider a distributed optimal power flow differential privacy for preserving data privacy during
formulated as an optimization problem that maximizes a the algorithmic process [9]. Several DP algorithms have
nondifferentiable concave function. Solving such a problem been proposed to solve various distributed optimization
by the existing distributed algorithms can lead to data
privacy issues because the solution information exchanged problems. For example, (i) a DP alternating direction
within the algorithms can be utilized by an adversary to method of multipliers (ADMM) was proposed for solv-
infer the data. To preserve data privacy, in this paper we ing a distributed empirical risk minimization problem
propose a differentially private projected subgradient (DP- [10], [11], [12] and a distributed DC OPF [13], and
PS) algorithm that includes a solution encryption step. We (ii) a DP stochastic gradient descent (SGD) method
show that a sequence generated by DP-PS converges in
expectation, in probability, and with probability 1. More- was proposed for solving a classification problem [14],
over, we show that the rate of convergence in expectation a resource allocation problem [15], and deep neural
is affected by a target privacy level of DP-PS chosen by the networks [16].
user. We conduct numerical experiments that demonstrate We define target privacy level (TPL) as a user param-
the convergence and data privacy preservation of DP-PS.
eter for DP algorithms to control data privacy. While
Index Terms—Differential privacy, projected subgradient guaranteeing stronger privacy, increasing TPL of the DP
algorithm, optimal power flow, dual decomposition. algorithms may affect the convergence. For example,
I. I NTRODUCTION DP-ADMM with higher TPL is shown to find suboptimal
solutions, implying the need for a trade-off between
Optimal power flow (OPF) is an important problem
data privacy and solution quality [11], [13]. On the
in reliably and economically operating electric grids.
other hand, the numerical results in [14] show that the
Currently, the problem is solved by independent system
solution accuracy from DP-SGD may be close to that
operators in a centralized manner. Recently, however,
of non-private SGD. Also, Huang et al. [12] report
distributed OPF has been spotlighted as a result of the
numerical experiments that DP-SGD has good noise
introduction of microgrids with energy storage [1] and
resilience compared with that of DP-ADMM, but it
increasing penetrations of distributed energy resources
converges slowly. While numerical evidence has been
[2]. Distributed OPF consists of (i) a set of OPF sub-
demonstrated for the trade-off between the convergence
problems defined for each zone of the power grid and
of DP algorithms and TPL, only a few studies (e.g., DP-
(ii) consensus constraints that link the subproblems.
ADMM in [12]) develop the theoretical links.
Distributed OPF can be solved by the existing distributed
algorithms (e.g., [3], [4], [5], [6]), which do not require In this paper we present a DP projected subgradient
sharing private data information (e.g., demand data from (PS) algorithm for solving a distributed OPF while
each zone) but send the local solutions to the central preserving data privacy, and we study how TPL affects
machine. Unfortunately, an adversary may be able to the convergence of DP-PS theoretically and numerically.
estimate the data based on the solutions (e.g., reverse We first formulate the distributed second-order conic
engineering [7]), thus motivating the need for solution (SOC) and alternating current (AC) OPF (see, e.g., [17],
encryption. [18], [19]) based on dual decomposition by taking the
Differential privacy (DP) is a randomization tech- Lagrangian relaxation with respect to the consensus con-
nique that guarantees the existence of multiple datasets straints, where supergradients are computed by solving
with similar probabilities of resulting in the encrypted the OPF subproblems in parallel. Moreover, in order
solution, thus preserving data privacy [8]. A differen- to guarantee data privacy, the supergradients exchanged
tially private algorithm is an algorithm that incorporates within the algorithm are systematically randomized by
adding random noise extracted from a Laplace distri-
M. Ryu and K. Kim are with the Mathematics and Computer Science bution. Under three rules of specifying search direction
Division, Argonne National Laboratory, Lemont, IL, USA (Contact: and step size, we show that a sequence generated by
[email protected]). This material is based upon work supported by the
U.S. Department of Energy, Office of Science, Advanced Scientific DP-PS converges in expectation, in probability, and with
Computing Research, under Contract DE-AC02-06CH11357. probability 1. In particular, we show that the convergence
0885-8950 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2021.3120056, IEEE
Transactions on Power Systems
complexity is affected by a constant factor only as TPL For every generator g ∈ Gi , we denote the amounts of
increases. In summary, this paper answers the following active (resp., reactive) power generation by pGg (resp., qgG ).
questions: In the following, we present a SOC OPF formulation:
X X
• How can we preserve the privacy of the data com- min c1,g pGg + c2,g (pGg )2 (2a)
municated in the distributed OPF setting? i∈N g∈Gi
`ij ∈ L, we denote active (resp., reactive) power flow is a set of adjacent buses of i; and a set of cuts Cz =
along line ` by pF` , pT` (resp., q`F , q`T ). For every i ∈ N , ∪z0 ∈Z\{z} (Lz ∩ Lz0 ). Note that {Nz }z∈Z is a collection
we denote the complex voltage by Vi = viR + iviI , and we of disjoint sets, while {Lz }z∈Z and {Vz }z∈Z are not.
introduce the following auxiliary variables: Using these notations, we rewrite problem (2) as
X
RR
wij = viR vjR , wij
II
= viI vjI , wij
RI
= viR vjI , ∀j ∈ N . (1) min fz (xz ) (3a)
z∈Z
0885-8950 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2021.3120056, IEEE
Transactions on Power Systems
0885-8950 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2021.3120056, IEEE
Transactions on Power Systems
[21] with the decomposition into 3 zones (see Table II). Definition 2. (Laplacian noise) Laplacian noise ξ˜ ∈ R
We solve the distributed OPF of (4) by using PS. At is a random variable following the Laplace distribu-
each iteration k, an approximation error is measured as ˜
tion whose probability density function is L(ξ|b) =
below and reported in Figure 1: 1 |ξ̃|
2b exp − b for b > 0.
AEk = 100|Z ∗ − Z k |/Z ∗ , ∀k ∈ [K], (7) The randomized function R(D) := Q(D) + ξ˜ provides
¯-differential privacy if ξ˜ is drawn from the Laplace dis-
where Z ∗ is the optimal objective value and Z k are tribution with b = max(D0 ,D00 )∈Dβ |Q(D0 ) − Q(D00 )|/¯ .
the objective values computed at the kth iteration of PS, The main idea of DP-PS is to perturb y k with the
respectively. noise ξ˜k such that
We consider the adversary who aims to estimate the
demand at node ˆl = 4 in zone ẑ = 1, namely, D̄14 =
k
ỹzi k
← yzi + ξ˜zi
k
, ∀z ∈ Z, ∀i ∈ C(z), (9)
47.8 MW. For every trial K ∈ K,
b we solve (6) and report
for every iteration k of PS. We describe the algorithmic
in Figure 1 a demand estimation error:
steps of DP-PS in Algorithm 1. In line 3, we find
DE(K) := 100|D̄ẑl̂ − Dẑl̂ (K)|/D̄ẑl̂ , ∀K ∈ K,
b (8) a supergradient y k of the concave function H at λk .
In lines 6–8, we generate the Laplacian noise ξ˜k and
where K b ← {1}, . . . , {K} (various K b will be dis- the noisy supergradient ỹ k . In line 9, we update dual
cussed in Section V). Figure 1 shows that the adversary variables based on the step size αk and the search
is highly likely to estimate D̄14 , and hence this situation direction sk (ỹ k ) determined in advance (see Section IV).
motivates the need for the solution encryption to preserve
data privacy. Algorithm 1 DP Projected Subgradient Algorithm
1: Set k ← 1 and λ1 ← 0.
102 100 2: for k ∈ {1, . . . , K} do
3: Given λk , find y k by solving (4b) in parallel.
101
50
4: Store Hbest (λk ) ← maxt∈[k] {H(λt )}.
5: # Perturbation of y k
0 6: Solve (11) to find {∆ ¯k }z∈Z,i∈C(z) .
10 zi
0
0 100 200 300 400 500 0 100 200 300 400 500 7: Extract ξ˜zi
k
from L(ξ˜zi
k ¯k
|∆zi /¯
) in Definition 2.
8: Compute ỹ k by (9).
Fig. 1: Approximation error (left) of PS and demand 9: # Update dual variables
estimation error (right) of the adversarial problem.
λk+1 ← ProjΛ λk + αk sk (ỹ k ) .
0885-8950 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2021.3120056, IEEE
Transactions on Power Systems
X X n 2
Rkzi (Dz ) := Qkzi (Dz ) + ξ˜zi
k
GU (¯ max |yiL |, |yiU | + ξ˜zi
U
)2 +
, ∀z ∈ Z, ∀i ∈ C(z), (12) ) := (¯
z∈Z i∈C(z)
where Qkzi is defined in (10), ξ˜zi k
is extracted from o
2ξ˜zi
U
) max |yiL |, |yiU | ,
L(ξ˜zi |∆¯zi /¯
k k
) in Definition 2, and ∆¯kzi is from (11). For (¯ (14)
all z ∈ Z, i ∈ C(z), we have and (ii) we have the following basic inequality:
k 0
ln P{Rzi (Dz ) ∈ Sk } ≤ ¯,
0
∀Dz ∈D
b β (D̄z ),
∀Sk ⊆Range(Rk
(13) kλk+1 − λ? k2 ≤ kλk − λ? k2 + αk2 ksk (ỹ k )k2 +
P{Rk (D̄z ) ∈ Sk }
zi zi ),
2αk H(λk ) − H(λ? ) + 2αk hsk (ỹ k ) − y k , λk − λ? i. (15)
where Rkzi (D̄z ) is equal to ỹzi
k
in (9). This implies that
¯-differential privacy on D̄ is ensured in the kth iteration Proof. (14) holds from (9), and Remarks 2 and 4.
of DP-PS. Moreover, DP-PS with K total iterations pro- (15) holds because of the nonexpansion property of
vides ¯-differential privacy against an adversary observ- the projection and the supergradient inequality, namely,
ing the information exchanged during the entire process H(λ) − H(λk ) ≤ hy k , λ − λk i for all λ ∈ Λ.
of DP-PS, if ξ˜zik
is extracted from L(ξ˜zik
|K ∆¯kzi /¯
). We emphasize that GU (¯ ) increases as ¯ decreases.
1) Rule 1: Under Rule 1 it follows from (15) that
Proof. See Appendix A.
kλk+1 − λ? k2 ≤ kλk − λ? k2 + αk2 GU (¯
)+
Remark 3. (Target Privacy Level) We denote by 1/¯ a
2αk H(λk ) − H(λ? ) + 2αk hξ˜k , λk − λ? i, ∀k ∈ N. (16)
target privacy level (TPL) inproportional to the privacy
loss ¯. As TPL increases, the variance of ξ˜zi k
, namely,
2(∆¯kzi /¯
)2 , increases for fixed ∆¯kzi and stronger data By taking the conditional expectation on (16), one can
privacy is achieved according to Definition 1. derive the following inequality:
E kλk+1 − λ? k2 | λk ≤ kλk − λ? k2 + αk2 GU (¯
IV. C ONVERGENCE OF DP-PS )+
k ?
In this section we study how TPL affects the con- 2αk H(λ ) − H(λ ) , ∀k ∈ [K], (17)
vergence of DP-PS. In Table I we describe three rules where the inequality holds because of E[ξ˜zi
k
|λk ] = 0 for
for determining step size and search direction. Note that all z ∈ Z and i ∈ C(z). By the law of total expectation
the step size in Rule 1 is deterministic and square- with respect to λk in (17), we obtain
summable but not summable and that the step sizes
E kλk+1 − λ? k2 ≤ E kλk − λ? k2 + αk2 GU (¯
in Rule 2 and Rule 3 are stochastic and affected by )+
ỹ k , which are a variant of Polyak [22] and CFM [23], k ?
2αk E H(λ ) − H(λ ) , ∀k ∈ [K]. (18)
respectively. As compared with the previous work in [12]
that proposes DP-ADMM guaranteeing the convergence We recursively add (18) from k = 1 to k = K to obtain
in expectation, the DP-PS with the three rules provides E kλK+1 − λ? k2 ≤ kλ1 − λ? k2 +
the convergence in expectation and probability, and the K
X X K
almost sure convergence, which is a stronger result. GU (¯ αk2 + 2 αk E H(λk ) − H(λ? ) .
) (19)
k=1 k=1
TABLE I: Three rules for DP-PS.
Since
∃λU : λU ≥ kλ1 − λ? k2 by Assumption 1 and
Rule Step size
αk = a/k,
Search direction
E kλK+1 − λ? k2 ≥ 0, (19) can be expressed as
1 sk (ỹ k ) := ỹ k
where a > 0. K K
? k
X X
H(λ )−H(λ )
λU + GU (¯ αk2 ≥ 2 αk H(λ? ) − E H(λk )
2 αk := ksk (ỹ k )k2
sk (ỹ k ) := ỹ k )
sk (ỹ k ) := ỹ k + ζk sk−1 (ỹ k−1 ), k=1 k=1
H(λ? )−H(λk ) hsk−1 (ỹ k−1 ),ỹ k i K
3 αk := ksk (ỹ k )k2
ζk := max{0, −χk ksk−1 (ỹk−1 )k2 }, X
where s0 = 0 and χk ∈ [0, 2] ≥ 2 αk H(λ? ) − max E[H(λk )]
k∈[K]
k=1
K
X
Assumption 1. Λ is compact and λ∗ ∈ Λ maximizes H. αk H(λ? ) − E max H(λk ) ,
≥ 2 (20)
k∈[K]
k=1
Remark 4. For the Laplacian noise ξ˜zi k
in (9), we where the last inequality holds due to Jensen’s inequal-
˜ U
) ∈ R+ , which increases
notice that there exists ξzi (¯ ity. By substituting αk = a/k in (20), we obtain
as ¯ decreases, such that ξ˜zi
k
∈ [−ξ˜zi
U
), ξ˜zi
(¯ U
(¯
)] for all
) ∞ (a/k)2
λU + GU (¯
P
k ∈ [K], where K is the total number of iterations. H(λ? ) − E Hbest (λK ) ≤ PK k=1
, (21)
2 k=1 (a/k)
Lemma 1. For all k ∈ [K], (i) kỹ k k2 ∈ [GL , GU (¯
)], where Hbest (λK ) := maxk∈[K] H(λk ).
where GL is a small positive number, and
0885-8950 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2021.3120056, IEEE
Transactions on Power Systems
Theorem 2. Algorithm 1 with Rule 1 provides a se- increases as ¯ decreases, it implies that there exists a
quence that converges in expectation and probability, trade-off between TPL and solution accuracy.
namely,
We show, however, that the trade-off vanishes under
lim E Hbest (λK ) = H(λ? ),
(22a) the following assumption.
K→∞
Proof. See Appendix B. where the first inequality indicates that the function H
To show that Algorithm 1 provides a sequence that has a sharp set of maxima over a convex set Λ and the
converges with probability 1, we introduce the notion of second inequality indicates that the distance between the
the stochastic quasi-Feyer sequence in Definition 3. search direction and the supergradient is bounded.
Definition 3. (Stochastic quasi-Feyer sequence [24]) Assumption 2 is mild since the function H is polyhe-
A sequence of random vectors {z k }∞
k=1 is a stochastic
dral for our case with a reasonable choice of TPL.
quasi-Feyer sequence for a set Z ⊂ Rn if E[kz 1 k2 ] < Theorem 4. Under Assumption 2, Algorithm 1 with Rule
∞, and for any z ∈ Z, 2 provides a sequence that converges in expectation,
E kz − z k+1 k2 | z 1 , . . . , z k ≤ kz − z k k2 + dk , ∀k ∈ N,
in probability, and with probability 1.
√ The rate of con-
X∞ vergence in expectation is O(GU (¯)/ K), where GU (¯)
dk ≥ 0, ∀k ∈ N, E[dk ] < ∞. increases as ¯ decreases.
k=1
Proof. See Appendix D.
Theorem 3. Algorithm 1 with Rule 1 provides a se- 3) Rule 3: Under Rule 3 the search direction sk (ỹ k )
quence that converges with probability 1, namely, 0
is a linear combination of {ỹ k }k−1
k0 =1 .
P lim Hbest (λK ) = H(λ? ) = 1.
(23) Lemma 2. Under Rule 3 we have
K→∞
Proof. See Appendix C. ksk (ỹ k )k2 = kỹ k + ζk sk−1 (ỹ k−1 )k2 ≤ kỹ k k2 , ∀k ∈ N.
2) Rule 2: Under Rule 2 it follows from (15) that
2 Proof. If ζk = 0, then sk (ỹ k ) = ỹ k . If ζk > 0, then
k+1 ? 2 k H(λ? ) − H(λk )
? 2
kλ − λ k ≤ kλ − λ k − + kỹ k + ζk sk−1 k2 − kỹ k k2 = ζk2 ksk−1 k2 + 2ζk hsk−1 , ỹ k i
kỹ k k2
? k
H(λ ) − H(λ ) ˜k hsk−1 , ỹ k i2 hsk−1 , ỹ k i2
2 kξ k · kλk − λ? k (24) = χ2k − 2χk ≤ 0,
kỹ k k2 ks k−1 k 2 ksk−1 k2
2
k ? 2 H(λ? ) − H(λk ) where the last inequality holds since χk ∈ [0, 2] as
≤ kλ − λ k − + M (¯ ), defined in Table I.
GU (¯
)
From Lemma 2, similar results from Rule 2 can be
where the first inequality holds due to the Cauchy–
derived. Under Rule 3 it follows from (15) that
Schwarz inequality and the last inequality holds due to 2
) ∈ (0, ∞) based on Remark 4,
the existence of M (¯ k+1 ? 2 k H(λ? ) − H(λk )
? 2
kλ − λ k ≤ kλ − λ k − +
Lemma 1, and Assumption 1. By taking the expectation ksk (ỹ k )k2
and applying Jensen’s inequality, we have ? k
H(λ ) − H(λ ) k k
2 ks (ỹ ) − y k k · kλk − λ? k (28)
ksk (ỹ k )k2
E kλk+1 − λ? k2 ≤ E kλk − λ? k2 −
2
2 H(λ? ) − H(λk )
H(λ? ) − E H(λk ) /GU (¯ k ? 2
) + M (¯). (25) ≤ kλ − λ k − + R(¯ ),
GU (¯
)
Following the similar derivation from Rule 1, we obtain where the last inequality holds due to Lemma 2 and the
existence of R(¯ ) ∈ (0, ∞) based on the boundness of
s
λU + KM (¯
) GU (¯
)
H(λ? ) − E Hbest (λK ) ≤ sk (ỹ k ) by its construction, Lemma 1, and Assumption 1.
. (26)
K
We emphasize that (28) is similar to (24). Thus one can
Based on (26), we state the following proposition. derive results similar to (26), Proposition 1, and Theorem
4 under Rule 3.
Proposition 1. Algorithm 1 with Rule 2 produces a
sequence that converges in expectation to a point within
p Remark 5. We remark that all the results related to the
M (¯
)GU (¯
) of the optimal value. Since M (¯ )GU (¯
) convergence of DP-PS also hold when solving AC OPF
0885-8950 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2021.3120056, IEEE
Transactions on Power Systems
0885-8950 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2021.3120056, IEEE
Transactions on Power Systems
500 35
0 0
10
10
10
10
01
05
1
01
05
1
01
05
1
01
05
1
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
0.
Fig. 4: Total iterations of DP-PS for solving case 14 Fig. 6: Summary for case 14 (left) and case 118 (right).
(left) and case 118 (right) required to enter within 1%
of the optimality gap.
2 buses for each zone of case 14 and case 118 systems
when |Z| = 7 and |Z| = 50, respectively. We observe
Figure
P 5 an average demand estimation error (DEE): that the optimality gap slightly increases as the number
b ) DE(K)/|K(T )|, where DE(K) is defined in of zones increases, but not significantly.
b
K∈K(T
(8). The results show (i) decreasing trends of the average
DEE as ¯ increases for fixed T and (ii) decreasing trends 102 102
of the average DEE as T increases for fixed ¯. Moreover,
the average DEE for fixed ¯ seems to converge to a 101 101
point as T increases. The results imply that increasing
0
TPL produces stronger data privacy (e.g., see K(100)
b in 10 100
Figure 5 (right) when ¯ = 0.01).
0 1000 2000 3000 0 50 100
100 30
Fig. 7: The impact of the number of zones on the
20 convergence when ¯ = 0.1 for case 14 (left) and case
50
10
118 (right).
10
10
01
05
1
01
05
1
0.
0.
0.
0.
0.
101 101
where G is a prespecified value (e.g., G = 1%), T
is a collection of various T , K(Tb ) is in (29), DE(K)
is in (8), I(DE(K) ≤ G) = 1 if DE(K) ≤ G and 100 100
0885-8950 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2021.3120056, IEEE
Transactions on Power Systems
100
[12] Z. Huang, R. Hu, Y. Guo, E. Chan-Tin, and Y. Gong, “DP-
30
ADMM: ADMM-based distributed learning with differential pri-
20 vacy,” IEEE Transactions on Information Forensics and Security,
50 vol. 15, pp. 1002–1012, 2019.
10 [13] V. Dvorkin, P. Van Hentenryck, J. Kazempour, and P. Pinson,
“Differentially private distributed optimal power flow,” in 2020
0 0 59th IEEE Conference on Decision and Control (CDC). IEEE,
10
5
10
01
05
1
01
05
1
2020, pp. 2092–2097.
0.
0.
0.
0.
0.
0.
[14] S. Song, K. Chaudhuri, and A. D. Sarwate, “Stochastic gradient
descent with differentially private updates,” in 2013 IEEE Global
Fig. 9: Average demand estimation error under various Conference on Signal and Information Processing. IEEE, 2013,
K(T
b ) for case 14 (left) and case 118 (right). pp. 245–248.
[15] S. Han, U. Topcu, and G. J. Pappas, “Differentially private
distributed constrained optimization,” IEEE Transactions on Au-
tomatic Control, vol. 62, no. 1, pp. 50–64, 2016.
level of DP-PS is chosen by users, which affects not [16] M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov,
only the data privacy but also the convergence of the K. Talwar, and L. Zhang, “Deep learning with differential pri-
vacy,” in Proceedings of the 2016 ACM SIGSAC Conference on
algorithm. We showed that a sequence provided by Computer and Communications Security, 2016, pp. 308–318.
DP-PS converges to an optimal solution regardless of [17] C. Coffrin, H. L. Hijazi, and P. Van Hentenryck, “The QC
the ¯ value, but more iterations are required for the relaxation: A theoretical and computational study on optimal
power flow,” IEEE Transactions on Power Systems, vol. 31, no. 4,
convergence as ¯ decreases. Also, we demonstrated that, pp. 3008–3018, 2015.
as ¯ decreases, the adversarial’s chance of successful [18] ——, “Strengthening the SDP relaxation of AC power flows with
demand data inference decreases while the optimality convex envelopes, bound tightening, and valid inequalities,” IEEE
Transactions on Power Systems, vol. 32, no. 5, pp. 3549–3558,
gap remains the same. Finally, as stated in Remarks 1 2016.
and 5, the proposed DP-PS can lead to an infeasible [19] B. Kocuk, S. S. Dey, and X. A. Sun, “Strong SOCP relaxations
solution with respect to the AC OPF model, calling for for the optimal power flow problem,” Operations Research,
vol. 64, no. 6, pp. 1177–1196, 2016.
privacy-preserving algorithms for the model. [20] M. Bynum, A. Castillo, J.-P. Watson, and C. D. Laird, “Strength-
ened SOCP relaxations for AC OPF with McCormick envelopes
and bounds tightening,” in Computer Aided Chemical Engineer-
R EFERENCES ing. Elsevier, 2018, vol. 44, pp. 1555–1560.
[21] R. D. Zimmerman, C. E. Murillo-Sánchez, and R. J. Thomas,
[1] Y. Levron, J. M. Guerrero, and Y. Beck, “Optimal power flow
“MATPOWER: steady-state operations, planning, and analysis
in microgrids with energy storage,” IEEE Transactions on Power
tools for power systems research and education,” IEEE Transac-
Systems, vol. 28, no. 3, pp. 3226–3234, 2013.
tions on power systems, vol. 26, no. 1, pp. 12–19, 2010.
[2] D. K. Molzahn, F. Dörfler, H. Sandberg, S. H. Low, [22] B. T. Polyak, “Introduction to optimization. 1987,” Optimization
S. Chakrabarti, R. Baldick, and J. Lavaei, “A survey of distributed Software, Inc, New York.
optimization and control algorithms for electric power systems,” [23] P. M. Camerini, L. Fratta, and F. Maffioli, “On improving
IEEE Transactions on Smart Grid, vol. 8, no. 6, pp. 2941–2962, relaxation methods by modified gradient techniques,” in Non-
2017. differentiable optimization. Springer, 1975, pp. 26–34.
[3] A. X. Sun, D. T. Phan, and S. Ghosh, “Fully decentralized ac [24] Y. M. Ermoliev and R.-B. Wets, Numerical techniques for
optimal power flow algorithms,” in 2013 IEEE Power & Energy stochastic optimization. Springer-Verlag, 1988.
Society General Meeting. IEEE, 2013, pp. 1–5. [25] A. Nedić and D. P. Bertsekas, “The effect of deterministic noise
[4] S. Mhanna, G. Verbič, and A. C. Chapman, “Adaptive ADMM in subgradient methods,” Mathematical programming, vol. 125,
for distributed AC optimal power flow,” IEEE Transactions on no. 1, pp. 75–99, 2010.
Power Systems, vol. 34, no. 3, pp. 2025–2035, 2018. [26] A. Wächter and L. T. Biegler, “On the implementation of an
[5] S. Mhanna, A. C. Chapman, and G. Verbič, “Component-based interior-point filter line-search algorithm for large-scale nonlinear
dual decomposition methods for the OPF problem,” Sustainable programming,” Mathematical programming, vol. 106, no. 1, pp.
Energy, Grids and Networks, vol. 16, pp. 91–110, 2018. 25–57, 2006.
[6] K. Sun and X. A. Sun, “A two-level ADMM algorithm for AC [27] J. Guo, G. Hug, and O. K. Tonguz, “Intelligent partitioning
OPF with convergence guarantees,” IEEE Transactions on Power in distributed optimization of electric power systems,” IEEE
Systems, 2021. Transactions on Smart Grid, vol. 7, no. 3, pp. 1249–1258, 2015.
[7] R. Shokri, M. Stronati, C. Song, and V. Shmatikov, “Membership [28] G. Karypis and V. Kumar, “Multilevel k-way partitioning scheme
inference attacks against machine learning models,” in 2017 IEEE for irregular graphs,” Journal of Parallel and Distributed com-
Symposium on Security and Privacy (SP). IEEE, 2017, pp. 3–18. puting, vol. 48, no. 1, pp. 96–129, 1998.
[8] C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating
noise to sensitivity in private data analysis,” in Theory of cryp-
tography conference. Springer, 2006, pp. 265–284.
[9] C. Dwork, A. Roth et al., “The algorithmic foundations of differ-
ential privacy.” Foundations and Trends in Theoretical Computer
Science, vol. 9, no. 3-4, pp. 211–407, 2014.
[10] T. Zhang and Q. Zhu, “Dynamic differential privacy for ADMM-
based distributed classification learning,” IEEE Transactions on
Information Forensics and Security, vol. 12, no. 1, pp. 172–187,
2016.
[11] ——, “A dual perturbation approach for differential private
ADMM-based distributed empirical risk minimization,” in Pro-
ceedings of the 2016 ACM Workshop on Artificial Intelligence
and Security, 2016, pp. 129–137.
0885-8950 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2021.3120056, IEEE
Transactions on Power Systems
10
K
A PPENDIX A =
Y k
L(ỹzi ¯kzi /¯
− Qkzi (Dz )|K ∆ )
P ROOF OF T HEOREM 1 k=1
0885-8950 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TPWRS.2021.3120056, IEEE
Transactions on Power Systems
11
2
≤ kλk − λ? k2 − GL /GU (¯
) H(λ? ) − H(λk ) ,
(32) Algorithm 2 DP-ADMM
where the first inequality holds since ξ˜k = sk (ỹ k ) − y k , 1: Set k ← 1, λ1 ← 0, and φ1 ← 0.
the second inequality holds due to Assumption 2, and the 2: for k ∈ {1, . . . , K} do
last inequality holds due to (1 − 2ksk − ŷ k k/µ) ∈ (0, 1] 3: Given λk and φk , find y k+1 by solving (34a).
from Assumption 2 and Lemma 1. By taking similar 4: # Perturbation of y k+1
steps in Section IV-2, we obtain 5: Solve (11) to find {∆¯kzi }z∈Z,i∈C(z) .
r 6: Extract ξ˜zi
k
from L(ξ˜zi
k ¯k
|∆zi /¯
) in Definition 2.
0 ≤ H(λ ) − E max H(λk ) ≤
? λU GU (¯
)
. (33) 7: ỹzi ← yzi + ξ˜zi , ∀z ∈ Z, ∀i ∈ C(z)..
k+1 k+1 k
k∈[K] GL K 8: # Solve the second-block problem
Taking similar steps in the proof of Theorem 2, we 9: Solve (34b) with ỹ k+1 .
conclude from (33) that the sequence produced by DP- 10: # Update dual variables
PS with Rule 2 under Assumption 2 converges in expec- λk+1 = λkzi + ρ(φk+1 k+1
− ỹzi ), ∀z ∈ Z, ∀i ∈ C(z).
zi i
tation and in probability. Also, the rate of convergence
in expectation is O(GU (¯
)/K). It follows from (32) that 11: end for
kλk+1 − λ? k2 ≤ kλk − λ? k2 . By taking a conditional
expectation, we obtain
E kλk+1 − λ? k2 |λ1 , . . . , λk ≤ kλk − λ? k2 .
A PPENDIX E
DP-ADMM
We present the augmented Lagrangian dual problem
given by
Xn X ρ 2
o
max min fz (xz ) + λzi (φi − yzi ) + (φi − yzi )
λ
z∈Z
2
i∈C(z)
0885-8950 (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.