Regional Load Forecasting Scheme for Security Outsourcing Computation

被引:0
|
作者
Chen, Qizhan [1 ]
Zhao, Ruifeng [2 ]
Li, Bin [1 ]
Liu, Zewei [3 ]
Zhuang, Huijun [3 ]
Hu, Chunqiang [3 ]
机构
[1] Guangdong Power Grid Co Ltd, Zhongshan Power Supply Bur, Zhongshan 528400, Peoples R China
[2] Guangdong Power Grid Co Ltd, Power Dispatching Control Ctr, Guangzhou 510600, Peoples R China
[3] ChongQing Univ, Sch Big Data & Software Engn, Chongqing 400044, Peoples R China
关键词
load forecasting; privacy leakage; outsourcing computation;
D O I
10.3390/electronics13183712
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart grids generate an immense volume of load data. When analyzed using intelligent technologies, these data can significantly improve power load management, optimize energy distribution, and support green energy conservation and emissions reduction goals. However, in the process of data utilization, a pertinent issue arises regarding potential privacy leakage concerning both regional and individual user power load data. This paper addresses the scenario of outsourcing computational tasks for regional power load forecasting in smart grids, proposing a regional-level load forecasting solution based on secure outsourcing computation. Initially, the scheme designs a secure outsourcing training protocol to carry out model training tasks while ensuring data security. This protocol guarantees that sensitive information, including but not limited to individual power consumption data, remains comprehensively safeguarded throughout the entirety of the training process, effectively mitigating any potential risks of privacy infringements. Subsequently, a secure outsourcing online prediction protocol is devised, enabling efficient execution of prediction tasks while safeguarding data privacy. This protocol ensures that predictions can be made without compromising the privacy of individual or regional power load data. Ultimately, experimental analysis demonstrates that the proposed scheme meets the requirements of privacy, accuracy, and timeliness for outsourcing computational tasks of load forecasting in smart grids.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] A Secure and Verifiable Outsourcing Scheme for Matrix Inverse Computation
    Hu, Chunqiang
    Alhothaily, Abdulrahman
    Alrawais, Arwa
    Cheng, Xiuzhen
    Sturtivant, Carl
    Liu, Hang
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [2] Reliable Fully Homomorphic Disguising Matrix Computation Outsourcing Scheme
    Chen, Yonghui
    Gu, Bo
    Zhang, Cheng
    Shu, Hongzhang
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 482 - 487
  • [3] A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts
    Wang, Hao
    Ge, Chunpeng
    Zhou, Lu
    Liu, Zhe
    Lan, Dongwan
    Lu, Xiaozhen
    Jiang, Danni
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2024, 12 (01) : 70 - 83
  • [4] West - Mediterranean regional security complex: outsourcing and securing migration
    Benantar, Abdennour
    ANNEE DU MAGHREB, 2013, 9
  • [5] Regional Power Load Forecasting Based on PSOSVM
    Ji, Guoqiang
    Li, Shunxin
    Shi, Zhiping
    Zhang, Xinyan
    Zhao, Weibo
    PROCEEDINGS OF 2018 IEEE 4TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2018), 2018, : 1685 - 1688
  • [6] Functional privacy-preserving outsourcing scheme with computation verifiability in fog computing
    Tang, Wenyi
    Qin, Bo
    Li, Yanan
    Wu, Qianhong
    KSII Transactions on Internet and Information Systems, 2020, 14 (01) : 281 - 298
  • [7] Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing
    Tang, Wenyi
    Qin, Bo
    Li, Yanan
    Wu, Qianhong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 281 - 298
  • [8] A novel privacy-preserving outsourcing computation scheme for Canny edge detection
    Bowen Li
    Fazhi He
    Xiantao Zeng
    The Visual Computer, 2022, 38 : 4437 - 4455
  • [9] Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain
    Huo, Lijuan
    Wu, Libing
    Zhang, Zhuangzhuang
    Li, Chunshuo
    He, Debiao
    Wang, Jing
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5725 - 5737
  • [10] A novel privacy-preserving outsourcing computation scheme for Canny edge detection
    Li, Bowen
    He, Fazhi
    Zeng, Xiantao
    VISUAL COMPUTER, 2022, 38 (12): : 4437 - 4455