高晗, 李正烁. 具有完全隐私保护的电-气综合能源系统分布式协同算法[J]. 电力系统自动化, 2023, 47(8): 71-79.
引用本文: 高晗, 李正烁. 具有完全隐私保护的电-气综合能源系统分布式协同算法[J]. 电力系统自动化, 2023, 47(8): 71-79.
GAO Han, LI Zheng-shuo. Full Privacy-preserving Decentralized Coordination Algorithm for Integrated Electricity-Gas Energy Systems[J]. Automation of Electric Power Systems, 2023, 47(8): 71-79.
Citation: GAO Han, LI Zheng-shuo. Full Privacy-preserving Decentralized Coordination Algorithm for Integrated Electricity-Gas Energy Systems[J]. Automation of Electric Power Systems, 2023, 47(8): 71-79.

具有完全隐私保护的电-气综合能源系统分布式协同算法

Full Privacy-preserving Decentralized Coordination Algorithm for Integrated Electricity-Gas Energy Systems

  • 摘要: 电-气综合能源系统中,电力系统和天然气系统分属不同代理,需要进行分布式协同。“弱中心化架构”下的分布式协同过程中,代理与协调中心之间通过直接的信息交互实现算法收敛,各代理隐私数据面临严重的泄露风险。针对这一问题,文中提出了具有完全隐私保护的分布式协同算法,将多方安全计算理论引入分布式协同框架,通过同态加密技术以密文形式进行电-气协同,实现了“弱中心化架构”下的完全隐私保护。同时,提出自适应凸松弛和恢复方法求解非凸天然气系统子问题,提升了求解速度。最后,通过算例分析验证了所提算法的有效性。

     

    Abstract: In the integrated electricity-gas energy system, the power system and the natural gas system belong to different agents and need to be collaborated distributedly. In the distributed collaboration process under the weakly-centralized framework, the algorithm convergence is achieved through direct information interaction between the agents and the coordination center, and the private information of each agent faces serious risk of leakage. To solve this problem, a full privacy-preserving decentralized coordination algorithm is proposed to achieve the full privacy preservation under the “weakly-centralized framework”. The algorithm introduces the theory of multi-party security computation into the distributed collaborative framework and achieves full privacy preservation in a “weakly-centralized framework” by means of homomorphic encryption technology in the form of ciphertexts for electricity-gas collaboration. Meanwhile, this paper proposes an adaptive convexification and feasibility recovery method to solve the nonconvex natural gas system subproblem, which improves the solution speed. Finally, the effectiveness of the proposed algorithm is verified through the analysis of cases.

     

/

返回文章
返回