Submitted:
01 November 2024
Posted:
01 November 2024
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Research Background
Growth in Photovoltaic Power Generation and Big Data Demand
The Potential of Secure Aggregation in Photovoltaic Power Generation
1.2. Research Significance
Significance of Big Data and Secure Aggregation in PV Power Generation
2. Related Work
2.1. Data Processing and Power Forecasting in Photovoltaic Power Generation
2.2. Data Privacy Protection Techniques
3. Data Collection Phase of Photovoltaic Power Generation Systems Based on Homomorphic Encryption
3.1. The Structure of a Photovoltaic Power Generation System

3.2. Data Collection Objects and Content in a Photovoltaic Power Generation System
- MPPT (maximum power point tracker): It is used to monitor the operation of the MPPT and guarantee that it efficiently optimizes the output power from the solar panel.
- Inverter: This keeps track of the inverter working and makes sure that DC electricity is converted to AC electricity in an efficient way.
- Controller: In order to guarantee that the controller is in good condition to manage everything in the system, it keeps track of its own operating status.
- Grid Interface: This is used to verify the grid interface performance and to ensure that the interface is correctly connected to the grid.

3.3. Operation Process of the Paillier Algorithm and BVG Algorithm
Key Generation
Encryption Process
Homomorphic Property

Key Generation
Encryption Process
Arbitrary Function Computation
4. Data Transmission Phase of Photovoltaic Power Generation Systems Based on Homomorphic Encryption
4.1. Edge Computing in the Context of the Paillier Algorithm
4.2. Application of the TLS Protocol in the Data Collection Phase

4.3. Two Different Kinds of Attrition in the Data Collection Stage Countermeasures
Active Adversaries
Honest but Curious Adversaries
5. Data Storage Phase of Photovoltaic Power Generation Systems Based on Homomorphic Encryption
5.1. Limitations of Traditional Photovoltaic Power Generation Data Storage
Insufficient Data Privacy Protection
Inadequate Support for Big Data Processing
5.2. Two Feasible Technological Approaches Analysis Based on Homomorphic Encryption
Key Management
Access Control and Auditing
6. Data Processing and Analysis Phase of Photovoltaic Power Generation Systems Based on Homomorphic Encryption
6.1. Data Preprocessing


Decryption Process
6.2. Clustering: Model Constructed with Improved K-means++ Algorithm





| Cluster 0 | Cluster 1 | Cluster 2 | Cluster 3 | Cluster 4 | |
|---|---|---|---|---|---|
| Temperature | 296 | 286 | 288 | 296 | 289 |
| Irradiance | 213 | 68 | 162 | 242 | 103 |
| Cloud Cover | 0.75 | 0.95 | 0.59 | 0.51 | 0.86 |
| precipitation | 0.0071 | 0.0115 | 0.0034 | 0.0022 | 0.0113 |
6.3. Based on the Information Criterion Model of the Silhouette Coefficient Method



6.4. Adaptive Noise Ensemble Empirical Mode Decomposition Model
6.5. Long Short-Term Memory (LSTM) Network Model

where is the weight matrix, is the bias term, is the hidden state from the previous time step, is the current input, and σ is the sigmoid function.
where is the candidate values, is the input gate values, is the weight matrix, is the bias term, is the hidden state from the previous time step, is the current input, σ is the sigmoid function, and is the hyperbolic tangent function.
where is the output of the forget gate, is the cell state from the previous time step, is the candidate values, and is the input gate values.


| Cluster 0 | Cluster 1 | Cluster 2 | Cluster 3 | Cluster 4 | |
|---|---|---|---|---|---|
| Error rate | 5.32% | 1.55% | 1.34% | 4.37% | 2.61% |
7. Discussion and Future Outlook
7.1. Research Limitations
Challenges in PV Power Forecasting
Issues with Secure Data Aggregation
7.2. Future Work
Improve the Efficiency and Scale of Similarity Between Homogeneous Encryption Algorithm and Computing
Integration of Intelligent Prediction Models with Dynamic Security Strategies
8. Conclusion
References
- Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191).
- Hu, L., & Evans, D. (2003, January). Secure aggregation for wireless networks. In 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings. (pp. 384-391). IEEE.
- Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2016). Practical secure aggregation for federated learning on user-held data. arXiv preprint arXiv:1611.04482.
- Fereidooni, H., Marchal, S., Miettinen, M., Mirhoseini, A., Möllering, H., Nguyen, T. D., ... & Zeitouni, S. (2021, May). SAFELearn: Secure aggregation for private federated learning. In 2021 IEEE Security and Privacy Workshops (SPW) (pp. 56-62). IEEE.
- Kadhe, S., Rajaraman, N., Koyluoglu, O. O., & Ramchandran, K. (2020). Fastsecagg: Scalable secure aggregation for privacy-preserving federated learning. arXiv preprint arXiv:2009.11248.
- Acar, A., Aksu, H., Uluagac, A. S., & Conti, M. (2018). A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys (Csur), 51(4), 1-35.
- Naehrig, M., Lauter, K., & Vaikuntanathan, V. (2011, October). Can homomorphic encryption be practical?. In Proceedings of the 3rd ACM workshop on Cloud computing security workshop (pp. 113-124).
- Gentry, C. (2009, May). Fully homomorphic encryption using ideal lattices. In Proceedings of the forty-first annual ACM symposium on Theory of computing (pp. 169-178).
- Fan, J., & Vercauteren, F. (2012). Somewhat practical fully homomorphic encryption. Cryptology ePrint Archive.
- Gentry, C., & Halevi, S. (2011, May). Implementing gentry’s fully-homomorphic encryption scheme. In Annual international conference on the theory and applications of cryptographic techniques (pp. 129-148). Berlin, Heidelberg: Springer Berlin Heidelberg.
- Hazay, C., Mikkelsen, G. L., Rabin, T., & Toft, T. (2012). Efficient RSA key generation and threshold paillier in the two-party setting. In Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA Conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings (pp. 313-331). Springer Berlin Heidelberg.
- Bahmani, B., Moseley, B., Vattani, A., Kumar, R., & Vassilvitskii, S. (2012). Scalable k-means++. arXiv preprint arXiv:1203.6402.
- Arthur, D., & Vassilvitskii, S. (2006). k-means++: The advantages of careful seeding. Stanford.
- Gao, B., Huang, X., Shi, J., Tai, Y., & Zhang, J. (2020). Hourly forecasting of solar irradiance based on CEEMDAN and multi-strategy CNN-LSTM neural networks. Renewable Energy, 162, 1665-1683.
- Yu, Y., Si, X., Hu, C., & Zhang, J. (2019). A review of recurrent neural networks: LSTM cells and network architectures. Neural computation, 31(7), 1235-1270.
- Sherstinsky, A. (2020). Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Physica D: Nonlinear Phenomena, 404, 132306.
- Staudemeyer, R. C., & Morris, E. R. (2019). Understanding LSTM--a tutorial into long short-term memory recurrent neural networks. arXiv preprint arXiv:1909.09586.
- Singh, G. K. (2013). Solar power generation by PV (photovoltaic) technology: A review. Energy, 53, 1-13.
- Das, U. K., Tey, K. S., Seyedmahmoudian, M., Mekhilef, S., Idris, M. Y. I., Van Deventer, W., ... & Stojcevski, A. (2018). Forecasting of photovoltaic power generation and model optimization: A review. Renewable and Sustainable Energy Reviews, 81, 912-928.
- Hosenuzzaman, M., Rahim, N. A., Selvaraj, J., Hasanuzzaman, M., Malek, A. A., & Nahar, A. (2015). Global prospects, progress, policies, and environmental impact of solar photovoltaic power generation. Renewable and sustainable energy reviews, 41, 284-297.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).