CONSTRAINT -BASED DIFFERENTIAL PRIVACY Releasing Optimal Power - - PowerPoint PPT Presentation

constraint based differential privacy
SMART_READER_LITE
LIVE PREVIEW

CONSTRAINT -BASED DIFFERENTIAL PRIVACY Releasing Optimal Power - - PowerPoint PPT Presentation

CONSTRAINT -BASED DIFFERENTIAL PRIVACY Releasing Optimal Power Flow Benchmarks Privately Ferdinando Fioretto & Pascal Van Hentenryck University of Michigan CPAIOR 2018 Customers Loads optimization Customers Loads optimization Content


slide-1
SLIDE 1

CONSTRAINT

  • BASED

DIFFERENTIAL PRIVACY

Releasing Optimal Power Flow Benchmarks Privately

Ferdinando Fioretto & Pascal Van Hentenryck University of Michigan

CPAIOR 2018

slide-2
SLIDE 2
slide-3
SLIDE 3

Customers Loads

  • ptimization
slide-4
SLIDE 4
  • ptimization

Customers Loads

slide-5
SLIDE 5

Content

  • Private Data Release and Differential Privacy
  • Optimal Power Flow Problem
  • The CBDP Mechanism
  • Experimental Analysis on Private OPF
slide-6
SLIDE 6

Private data-release

Goal 1: Protect the privacy of the contributors Goal 2: The data analyst receives useful data contributors data curator data analyst D

slide-7
SLIDE 7

Differential Privacy

(Informal)

Contributor: Small participation risk (privacy loss) Data analyst: Analysis on original and modified data are 
 very similar (data distributions) contributors data curator data analyst ? D ˜ D

slide-8
SLIDE 8

Differential Privacy

(Informal)

Contributor: Small participation risk (privacy loss) Data analyst: Analysis on original and modified data are 
 very similar (data distributions) contributors data curator data analyst D ˜ D ?

slide-9
SLIDE 9

Differential Privacy

  • Two datasets are said neighbors ( ) if they

differ by ⍺ in at most one tuple

D1, D2

name load

Alice B 21.2 Bob 30.1 Carl 17.4 Diana 20.5 … …

D1 D2 D1 ∼α D2

name load

Alice B 21.2 Bob 30.1 Carl 27.4 Diana 20.5 … …

⍺ = 10

slide-10
SLIDE 10

Differential Privacy

  • In statistical databases, often, the1-hamming distance is used:

name age gender

Alice B 21 F Bob 39 M Carl 17 M Diana 25 F … … ….

name age gender

Alice B 21 F Bob 39 M Carl 17 M Diana 25 F Emily 26 F … … ….

D1 D2 D1 ⇠ D2 , kD1 D2k1  1

slide-11
SLIDE 11

Differential Privacy

A randomized mechanism M : D → R is ✏-differentially private if, for any pair D1, D2 ∈ D of neighboring datasets and any output O ∈ R: Pr[M(D1) = O] Pr[M(D2) = O] ≤ exp(✏), (✏ > 0)

  • The risk of a user to join the dataset or to change her value by at

most ⍺ is bounded (by ε)

[Dwork:06]

  • Two datasets are said neighbors ( ) if they

differ by ⍺ in at most one tuple

D1, D2

D1 ∼α D2

slide-12
SLIDE 12

How Can we Achieve DP?

The Laplace Mechanism

= true answer

Z ∼ Laplace(∆Q/✏)

Q(D) + Z

Q

Q(D)

[Dwork:06]

Let Q : D → R be a numerical query. The Laplace mech- anism M(D; Q, ✏) = Q(D) + Z, where Z ∼ Lap( ∆Q

✏ )

achieves ✏-differentially privacy.

f(x | µ = 0, b) = 1 2b exp ✓ −|x| b ◆

PDF

b =

ace(∆Q/✏)

Theorem (Laplace Mechanism)

How much does the output of Q changes if we 
 add/remove one tuple (or ⍺) from D ?

slide-13
SLIDE 13

Differential Privacy

Notable Properties

  • No linkage attack: Adversary knows arbitrary auxiliary

information

  • Composability: If M1 enjoys ε1-differential privacy and M2

enjoys ε2 differential privacy, then, their composition M1(D),

M2(D) enjoys ε1+ε2-differential privacy

  • Post-Processing immunity: If M enjoys ε-differential privacy

and g is an arbitrary mapping, g֯ M is ε-differential private

slide-14
SLIDE 14

Content

  • Private Data Release and Differential Privacy
  • Optimal Power Flow Problem
  • The CBDP Mechanism
  • Experimental Analysis on Private OPF
slide-15
SLIDE 15

Optimal Power Flow (OPF)

1 The AC Optimal Power Flow Problem (AC-OPF)

variables: Sg

i , Vi @i P N, Sij @pi, jq P E Y ER

minimize: ÿ

iPN

c2ip<pSg

i qq2 ` c1i<pSg i q ` c0i

subject to: =Vr “ 0, r P N vl

i § |Vi| § vu i

@i P N ´ θ∆

ij § =pViV ˚ j q § θ∆ ij @pi, jq P E

Sgl

i

§ Sg

i § Sgu i

@i P N |Sij| § su

ij @pi, jq P E Y ER

Sg

i ´ Sd i “ ∞ pi,jqPEYER Sij @i P N

Sij “ Y ˚

ij |Vi|2 ´ Y ˚ ij ViV ˚ j

@pi, jq P E Y ER

generators’ cost demands are met conservation of flow engineering limits s

slide-16
SLIDE 16

Optimal Power Flow (OPF)

  • AC-OPF Relaxations:
  • SOC Relaxation [Jabr 2006]


Relaxes the product of voltage variables with second-order cone constraints

  • QC Relaxation [Hijazi, Coffrin, and Van Hentenryck 2017]


Relaxes voltage constraints by taking tight convex envelops of their nonlinear terms

  • DC Relaxation [Wood and Wollenberg 1996]


Relates real power to voltage phase angles, ignore reactive power, and assume voltages are colse to their nominal values

slide-17
SLIDE 17

Differential Privacy Challenge for OPF

  • Privacy in OPF test cases:
  • Hide user participation: not sensitive


(load location is typically known)
 


  • Load magnitude: sensitive
  • Associated with customer’s 


activity

  • May reveal strategic investments, 


decreases in sales, etc.

slide-18
SLIDE 18

The Laplace mechanism for private OPF

  • Undesirable outcomes when

applied to protect load profiles

  • Significant higher loads than 


the actual demand

  • Recall: Larger privacy budget 


= less noise Average L1 error

slide-19
SLIDE 19

The Laplace mechanism for private OPF

Average L1 error

Satisfiable OPF solutions %

  • The Laplace mechanism is
  • blivious to the structure of the

dataset and the constraints and

  • bjective of the optimization

problem

  • It produces private datasets that

are not representative for the actual OPF

slide-20
SLIDE 20

Content

  • Private Data Release and Differential Privacy
  • Optimal Power Flow Problem
  • The CBDP Mechanism
  • Experimental Analysis on Private OPF
slide-21
SLIDE 21

DP for Complex Optimization Problems

  • Consider a generic optimization problem



 
 
 
 where D is the data whose privacy we want to protect.

  • Desiderata:
  • Data privacy
  • Faithfulness to the optimal objective value
  • The private data must satisfy the problem constraints

q minimizexPRn fpD, xq subject to gipD, xq § 0, i “ 1, . . . , p

slide-22
SLIDE 22

Constraint-Based Differential Privacy

Definition 3 ((✏, )-CBDP). Given ✏ ° 0, • 0, a DP-data-release mecha- nism M : D Ñ D is p✏, q-CBDP iff, for each private database ˆ D “ MpDq, there exists a solution x such that

  • 1. ✏-privacy: M satisfies ✏-DP;
  • 2. -faithfulness: |fp ˆ

D, xq ´ fpD, x˚q| § ;

  • 3. Consistency: Constraints gip ˆ

D, xq § 0 (i “ 1, . . . , p) are satisfied.

  • Consider a generic optimization problem



 
 


q minimizexPRn fpD, xq subject to gipD, xq § 0, i “ 1, . . . , p

slide-23
SLIDE 23

The CBDP Mechanism

  • 1. Uses the Laplace mechanism to query each dimension of D: 



 where is the vector of noisy values

  • 2. Solves the following optimization problem:



 
 


  • 3. Releases

MLappD, Q, ✏q “ ˜ D “ D ` Lapp1{✏qn,

minimize ˆ

D,xPRn} ˆ

D ´ ˜ D}2

2

subject to |fp ˆ D, xq ´ f ˚| § β gip ˆ D, xq § 0, i “ 1, . . . , p M where ˜ D “ p˜ c1, . . . , ˜ cnq

ˆ D

slide-24
SLIDE 24

The CBDP Mechanism

  • 1. Uses the Laplace mechanism to query each dimension of D: 



 where is the vector of noisy values

  • 2. Solves the following optimization problem:



 
 


  • 3. Releases

MLappD, Q, ✏q “ ˜ D “ D ` Lapp1{✏qn,

minimize ˆ

D,xPRn} ˆ

D ´ ˜ D}2

2

subject to |fp ˆ D, xq ´ f ˚| § β gip ˆ D, xq § 0, i “ 1, . . . , p M where ˜ D “ p˜ c1, . . . , ˜ cnq

ˆ D

Decision variables: post-processed loads

slide-25
SLIDE 25

The CBDP Mechanism

  • 1. Uses the Laplace mechanism to query each dimension of D: 



 where is the vector of noisy values

  • 2. Solves the following optimization problem:



 
 


  • 3. Releases

MLappD, Q, ✏q “ ˜ D “ D ` Lapp1{✏qn,

minimize ˆ

D,xPRn} ˆ

D ´ ˜ D}2

2

subject to |fp ˆ D, xq ´ f ˚| § β gip ˆ D, xq § 0, i “ 1, . . . , p M where ˜ D “ p˜ c1, . . . , ˜ cnq

ˆ D

Decision variables:

  • ptimization problem
slide-26
SLIDE 26

The CBDP Mechanism

  • 1. Uses the Laplace mechanism to query each dimension of D: 



 where is the vector of noisy values

  • 2. Solves the following optimization problem:



 
 


  • 3. Releases

MLappD, Q, ✏q “ ˜ D “ D ` Lapp1{✏qn,

minimize ˆ

D,xPRn} ˆ

D ´ ˜ D}2

2

subject to |fp ˆ D, xq ´ f ˚| § β gip ˆ D, xq § 0, i “ 1, . . . , p M where ˜ D “ p˜ c1, . . . , ˜ cnq

ˆ D

Differential Privacy

slide-27
SLIDE 27

The CBDP Mechanism

  • 1. Uses the Laplace mechanism to query each dimension of D: 



 where is the vector of noisy values

  • 2. Solves the following optimization problem:



 
 


  • 3. Releases

MLappD, Q, ✏q “ ˜ D “ D ` Lapp1{✏qn,

minimize ˆ

D,xPRn} ˆ

D ´ ˜ D}2

2

subject to |fp ˆ D, xq ´ f ˚| § β gip ˆ D, xq § 0, i “ 1, . . . , p M where ˜ D “ p˜ c1, . . . , ˜ cnq

ˆ D

Faithfulness to the

  • bjective
slide-28
SLIDE 28

The CBDP Mechanism

  • 1. Uses the Laplace mechanism to query each dimension of D: 



 where is the vector of noisy values

  • 2. Solves the following optimization problem:



 
 


  • 3. Releases

MLappD, Q, ✏q “ ˜ D “ D ` Lapp1{✏qn,

minimize ˆ

D,xPRn} ˆ

D ´ ˜ D}2

2

subject to |fp ˆ D, xq ´ f ˚| § β gip ˆ D, xq § 0, i “ 1, . . . , p M where ˜ D “ p˜ c1, . . . , ˜ cnq

ˆ D

Constraint consistency

slide-29
SLIDE 29

The CBDP Mechanism

Properties

  • Thm. (Privacy): It achieves (ε,β)-CBDP
  • By composition, post-processing, and noticing that a solution to

the optimization model (step 2) always exists


  • Thm. (Accuracy): The optimal solution to the
  • ptimization model of CBDP satisfies:



 


  • Cor. CBDP is at most a factor 2 away from optimality

h ˆ D+, x+i

k ˆ D+ Dk2  2k ˜ D Dk2

slide-30
SLIDE 30

Content

  • Private Data Release and Differential Privacy
  • Optimal Power Flow Problem
  • The CBDP Mechanism
  • Experimental Analysis on Private OPF
slide-31
SLIDE 31

Experimental analysis

Settings

  • Data sets: NESTA power network test cases (44

networks). Number of buses: 3 - 9241

  • OPF Models: AC, QC, SOC, DC
  • Privacy budget:
  • Faithfulness parameter:

✏ ∈ {0.1, 1.0, 10.0} β ∈ {0.01, 1.0, 100.0}

slide-32
SLIDE 32

Experimental Analysis

Analysis of OPF cost

Summary:

  • 1-2 order of magnitude improvements, for all ε and β
  • Difference of OPF values between CBDP and original data is <10%

CBDP Mechanism Laplace Mechanism

β=0.01 β=1 β=100

more private less private

slide-33
SLIDE 33

M5 M5+g M5−β M5+g,−β

Summary: 


  • CBDP (M5) preserves the optimality gaps very closely (<1% for ε ≥ 1 and

< 3% for ε < 1).

Experimental Analysis

Analysis of Optimality Gap

slide-34
SLIDE 34

✏ 10.0 1.0 0.1 ✏ 10.0 1.0 0.1 ✏ 10.0 1.0 0.1

4-bus 73-bus 300-bus

Summary: 


  • Load variation is often significant for a portion of the loads
  • Yet, the CBDP mechanism preserves the problem structure accurately

Experimental Analysis

Analysis of the Private Network Loads

slide-35
SLIDE 35

Conclusions

  • Motivated by the Differential Privacy Challenge for OPF
  • Proposed a CBDP Mechanism which ensures:

  • 1. Differential private data release

  • 2. Faithfulness to the optimal objective value

  • 3. Constraint consistency
  • We have applied CBDP to Optimal Power Flows
  • CBDP improves the accuracy of the Laplace Mechanism by orders of

magnitude while preserving salient computational features of the test cases

slide-36
SLIDE 36

Thank you

PRIVATE DATA-RELEASE

Publish a modified version of the data such that:

  • 1. The contributors’ privacy is adequately protected
  • 2. The modified data is useful for the intended purpose

contributors data curator data analyst D ˜ D

DIFFERENTIAL PRIVACY CHALLENGE FOR OPF

  • Privacy in OPF test cases:
  • Hide user participation: not sensitive


(load location is typically known)
 


  • Load magnitude: sensitive
  • Associated with customer’s activity
  • May reveal strategic investments,

decreases in sales, etc.

CBDP MECHANISM

  • 1. Uses the Laplace mechanism to query each dimension of

the dataset: 


where is the vector of noisy values.

  • 2. Solves the following optimization problem:



 
 


  • 3. Releases

MLappD, Q, ✏q “ ˜ D “ D ` Lapp1{✏qn,

minimize ˆ

D,xPRn} ˆ

D ´ ˜ D}2

2

subject to |fp ˆ D, xq ´ f ˚| § β gip ˆ D, xq § 0, i “ 1, . . . , p

M where ˜ D “ p˜ c1, . . . , ˜ cnq

ˆ D

EXPERIMENTAL ANALYSIS

Analysis of OPF cost

CBDP Mechanism

AC QC SOC DP

Laplace Mechanism

MLap AC QC SOC DP

Summary:

  • 1-2 order of magnitude improvements, for all ε and β
  • Difference of OPF values between CBDP and original data is <10%
slide-37
SLIDE 37

Thank you

Differential Privacy

(Informal)

Contributor: Small participation risk (privacy loss) Data analyst: Analysis on original and modified data are 
 very similar (data distributions) contributors data curator data analyst D ˜ D ?

Differential Privacy Challenge for the OPF

  • Privacy in OPF test cases:
  • Hide user participation: not sensitive


(load location is typically known)
 


  • Load magnitude: sensitive
  • Associated with customer’s activity
  • May reveal strategic investments,

decreases in sales, etc.

The CBDP Mechanism

  • The main idea: Let’s exploit the problem structure
  • Ask additional queries on aggregate counts (problem features), e.g.,
  • The total number trips
  • The number of trips in each zone
  • The number of trips made with each combination of transportation modes
  • Use this (noisy) information to redistribute the noise introduced on the individual trips counts
  • Also, enforce consistency!

minimize: kx ˜ ck2

2,w = k

i=1

1 ni

ni

j=1

(xij ˜ cij)2 (O1) subject to: ∀i0, i : Fi0 Fi, j 2 [ni] : xij = ’

l:di0l ✓dij

xi0l (O2) ∀i, j : xij 0. (O3)

Lil’bit of shameless ad: I am in the faculty job market! fioretto@umich.edu

slide-38
SLIDE 38

References

[Jabr 2006] R. Jabr. Radial distribution load flow using conic programming. Power Systems, IEEE Transactions on, 21(3):1458–1459, Aug 2006.
 [Hijazi, Coffrin, and Van Hentenryck 2017] H. Hijazi, C. Coffrin, and P . Van Hentenryck. Convex Quadratic Relaxations of Nonlinear Programs in Power Systems. Mathematical Programming Computation, 32(5): 3549–3558, 2017.
 [ Wood and Wollenberg 1996] A. J. Wood and B. F. Wollenberg. Power Generation, Operation, and

  • Control. Wiley-Interscience, 1996.