1 / 12

Opportunities and Perils in Ubiquitous Data Availability for the Open Access Environment

Opportunities and Perils in Ubiquitous Data Availability for the Open Access Environment. Panel: Grand Challenges in Electric Power Engineering Christopher L. DeMarco University of Wisconsin-Madison IEEE Power Engineering Society Summer Meeting Wednesday, July 24, 2002.

hao
Download Presentation

Opportunities and Perils in Ubiquitous Data Availability for the Open Access Environment

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Opportunities and Perils in Ubiquitous Data Availability for the Open Access Environment Panel: Grand Challenges in Electric Power Engineering Christopher L. DeMarco University of Wisconsin-Madison IEEE Power Engineering Society Summer Meeting Wednesday, July 24, 2002

  2. History: FERC Orders 888/889 • Order 889’s title coined OASIS for “Open Access Same-time Information System.” • To many, OASIS goals seem far from fully realized today, raising natural questions: • Is it a technical challenge to be overcome, to efficiently communicate & efficiently compute summary of available transmission capability? • Or are there valid institutional/policy reasons to question timely release of relevant data?

  3. Today: Pose Questions… • What if maximally feasible amount of transmission/distribution data were truly made universally available?

  4. Today: Pose Questions… • Would this create beneficial opportunities, and realize goals envisioned in OASIS? • Or would it be too perilous, endangering consumer privacy and infrastructure security?

  5. Specific Scenario Suppose: all control centers posted to universally accessible site the raw measurements typically fed to state estimator.

  6. Speculate - Potential Benefits • Create true competitive market for special purpose state estimators, culling useful information from data; • Decentralized & specialized ATC calculations; • Create more effective load management; • Open door to cost effective integration of micro-grids to large distribution/transmission system • Facilitate move to cost effective real time pricing. • General premise - observing example of GPS data - once useful data is made widely accessible, entrepreneurial opportunities to exploit data abound.

  7. Speculate - Potential Perils • Unacceptably compromise privacy, proprietary data of customers; • Ability to extract detailed individual consumption production patterns seems inevitable (isn’t it?); • Broadcast knowledge of grid’s Achilles heels; • Aid ill-intentioned players in design of “maximal disturbances” & malicious controllers

  8. Details - Potential Perils Author’s previous work on malicious control:Given power flow network data, and “reasonably accurate” (±20%) knowledge of generator dynamic parameters, one can design local generator controls to intentionally destabilize other machines.

  9. Details - Potential Perils Concern: earlier malicious control work postulated “only” over-aggressive, unethical competitor in the power market; How much worse if agent implementing control is unconstrained by concerns of remaining in the market after the event?

  10. Is There a Silver Lining(and a Grand Challenge?) (and a potential tie-in to state estimation grand challenges to follow… ?) Hypothesis - hope for acceptable trade-off in data opportunity vs. privacy/security lies in distributed, scalable, monitoring & data query systems.

  11. … Is There a Silver Lining(and a Grand Challenge?) • View extraction of raw data from power system as database queries; • Local “managers” of portions of the data-base perform automated negotiation for releases of data; • Queries could be legitimated by “tipping one’s own cards;” I get data only if I haveuseful data or computations to share.

  12. Conclusions • Strong reasons to believe that wide spread availability of transmission/distribution data could contribute to benefits of open access. • But … genuine security/privacy concerns make unfettered, universal release of data dangerous. • Challenge - can concepts from database security and query protocols be adapted to offer relatively open data, with decentralized verification and validation?

More Related