Back to Search Start Over

Federated learning‐based privacy‐preserving electricity load forecasting scheme in edge computing scenario.

Authors :
Wang, Haolin
Zhao, Yun
He, Shan
Xiao, Yong
Tang, Jianlin
Cai, Ziwen
Source :
International Journal of Communication Systems. 3/25/2024, Vol. 37 Issue 5, p1-17. 17p.
Publication Year :
2024

Abstract

Summary: In the era of big data, massive amounts of data hold great value. However, much data exists as isolated islands, and the maximum value of the data cannot be fully utilized. Federated learning allows each client to train local data and then share the training model parameters securely, which can address the isolated data island problem and exploit data value while ensuring data privacy and security. Accordingly, in order to securely complete the electric power load forecasting using existing data, this paper constructs a federated learning‐based privacy‐preserving scheme to support electricity load forecasting in edge computing scenarios. To address the problems of the data‐isolated islands and data privacy in electric power systems, this paper proposes a decentralized distributed solution based on the federated learning technique. Our scheme achieves electricity load forecasting for power systems through the federated learning‐based framework and uses edge computing architecture to improve real‐time data capability and reduce network latency. For the hierarchical scheduling structure in power systems, we divide the system into a cloud‐side‐device three‐layer architecture, which achieves structural coordination and balance, and each layer collects information according to the scheduling control tasks, promoting scheduling effectiveness. Finally, different privacy protection methods are used on the cloud‐edge and edge‐device sides to significantly enhance data security. Moreover, We have conducted extensive experimental simulations for our proposed scheme. The experimental results show that the relative error of electricity load forecasting is around 1.580%. Meanwhile, our scheme achieves high accuracy and low memory usage. The security analysis proves the feasibility and security of our scheme. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
10745351
Volume :
37
Issue :
5
Database :
Academic Search Index
Journal :
International Journal of Communication Systems
Publication Type :
Academic Journal
Accession number :
175447966
Full Text :
https://doi.org/10.1002/dac.5670