# differential_privacy_for_stackelberg_games__45f86edf.pdf Differential Privacy for Stackelberg Games Ferdinando Fioretto1 , Lesia Mitridati2 and Pascal Van Hentenryck2 1Syracuse University 2Georgia Institute of Technology ffiorett@syr.edu, lmitridati3@gatech.edu, pvh@isye.gatech.edu This paper introduces a differentially private (DP) mechanism to protect the information exchanged during the coordination of sequential and interdependent markets. This coordination represents a classic Stackelberg game and relies on the exchange of sensitive information between the system agents. The paper is motivated by the observation that the perturbation introduced by traditional DP mechanisms fundamentally changes the underlying optimization problem and even leads to unsatisfiable instances. To remedy such limitation, the paper introduces the Privacy-Preserving Stackelberg Mechanism (PPSM), a framework that enforces the notions of feasibility and fidelity (i.e. near-optimality) of the privacy-preserving information to the original problem objective. PPSM complies with the notion of differential privacy and ensures that the outcomes of the privacy-preserving coordination mechanism are close-to-optimality for each agent. Experimental results on several gas and electricity market benchmarks based on a real case study demonstrate the effectiveness of the proposed approach. A full version of this paper [Fioretto et al., 2020b] contains complete proofs and additional discussion on the motivating application. 1 Introduction In the context of the liberalization of energy markets, the coordination of sequential and interdependent agents, such as gas and electricity market operators, has become central to achieve an efficient and sustainable operation of the energy system [Ordoudis, 2018]. Such coordination problems have traditionally been modeled as Stackelberg games [Simaan and Cruz, 1973], which require the exchange of proprietary information between the agents in order to achieve an optimal strategy. For instance, in the context of electricity and gas markets, relevant data may represent the costs of producers, the loads of consumers, or technical characteristics of the energy network. As has been observed in various works (e.g., Authors names listed alphabetically. All authors have equal contributions. [Zugno et al., 2013; Baringo and Conejo, 2013]), such information may be sensitive: It can provide a competitive advantage over other strategic agents in the system, it may induce financial losses, and it may even benefit external attackers [Maharjan et al., 2013]. To address this issue, several privacy-preserving frameworks have been proposed, with Differential Privacy (DP) [Dwork et al., 2006] emerging as a robust privacy framework for many applications. DP allows to measure and bound the risk associated with an individual participation in an analysis task. DP algorithms rely on the injection of carefully calibrated noise to the output of a computation. They can thus be used to obfuscate the sensitive data exchanged by the system agents in the market. However, as shown in Section 7, when perturbed data are used as input to Stackelberg games, they may produce results that are fundamentally different from those obtained on the original data: They often transform the nature of the underlying optimization problem and even lead to severe feasibility issues. This paper is a first step in addressing this challenge. It introduces the Privacy-Preserving Stackelberg Mechanism (PPSM) for the coordination of sequential and interdependent agents. PPSM is a two-stage protocol that allows the coordinating agents to exchange differentially private data of high fidelity. In particular, PPSM relies on an optimization-based fidelity phase (including fidelity constraints on the objectives and coordination variables of the agents) to redistribute the noise introduced on the privacy-preserving data exchanged between the agents, and ensure that it preserves the feasibility and near-optimality of the original Stackelberg game. PPSM has been analyzed both theoretically and experimentally. The theoretical guarantees ensure differential privacy and near optimality, while the experimental results validate the approach on a real test case for the coordination of electricity and natural gas markets in the Northeastern United States [Byeon and Van Hentenryck, 2019]. The case study shows that PPSM can bring up to two orders of magnitude error reduction over standard privacy-preserving mechanisms. Although the paper was motivated by the coordination between natural gas and electricity markets, the proposed methods may apply to any type of coordination mechanism between sequential and interdependent agents where the agents exchange information and synchronize through price signals. Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence (IJCAI-20) Leader s decisions Sensitive data Follower s decisions ! DL, DF P " ! DF P , DF S " Public data Public and sensitive data PF Follower s problem Leader s problem Figure 1: Stackelberg game in sequential interdependent markets. 2 Problem Definition and Privacy Goal The strategies of two sequential and interdependent agents, such as energy market operators, represent a classic Stackelberg game [Simaan and Cruz, 1973]. In this framework, which is schematically illustrated in Figure 1, the leader (e.g., the first market operator) optimizes its decisions while anticipating the reaction of the follower (e.g., the second market operator). The leader actions impact the reaction of the follower, which in turn impacts the leader objective value. As a result, the leader strategy in Stackelberg games can be modeled as a bilevel optimization problem PL DL, DF P , DF S : OL min x L,y F OL x L, DL (1a) s.t. px L, y F q P F Lp DLq (1b) y F dual sol. min x F OF x F, DF P , DF S (1c) s.t. px F, x Lq P F F p DF P , DF S q, (1d) where x L represents the vector of decision variables of the leader, and x F and y F the vectors of primal and dual variables of the follower. Additionally, DL and (DF P , DF S q are the inputs of the leader and follower problems, respectively. The follower inputs are either public (DF P ) or sensitive (DF S ). The upper-level problem minimizes the leader objective cost OLpx L, DLq (1a), constrained by its feasible decision space FLp DLq (1b), and the reaction of the follower in the lowerlevel problem (1c) and (1d). The follower problem, denoted by PF x L, DF P , DF S , minimizes the follower objective cost OF x F , DF P , DF S in (1c), constrained by the feasible space FF DF P , DF S of the follower decisions (1d). Coordination Variables. The leader primal variables x L, appear as fixed parameters in the expression of the follower feasible space FF . In return, the lower-level problem provides feedback from the follower dual variables y F , to the upper-level problem through its feasible space FL. In energy markets, primal variables typically represent commitment and energy production decisions, while dual variables represent energy prices. These variables shared between the follower and the leader are called coordination variables. Assumptions. Due to the sequential decision-making nature, the leader needs to anticipate the reaction of the follower. Therefore, this paper assumes that the leader has access to a prediction model MLp DL, DF P , DF S q that predicts the values y F of the follower dual variables. This is a natural assumption in energy markets applications that motivates this paper: Such forecasting models are used in practice since generators must predict energy prices in order to efficiently bid in the markets and the market needs to ensure reliability of the overall system. Similarly, the follower has access to a forecasting model MF px L, DF P , DF S q that predicts its objective value OF and the values of its dual variables y F . This is also a natural assumption in energy markets since the energy prices and costs, representing the dual variables values and objective cost of the follower problem PF x L, DF P , DF S , are public and can be used to train precise estimators. The PPSM mechanism in this paper applies these forecasting models on privacypreserving versions of the sensitive parameters. Motivation Problem. Byeon and Van Hentenryck [2019] recently showed that the coordination between electricity and natural gas markets can be modeled as a Stackelberg game between a leader, i.e. the gas-aware electricity unit commitment (GAUC), and two followers, i.e. the electricity market (EM) and natural gas market (GM). This game can alleviate the reliability issues that emerged in the recent polar vortex events. In this context, the leader coordination variables represent the commitment of Gas-Fired Power Plants (GFPPs), which impacts their participation in both EM and GM. The relevant follower coordination variables represent natural gas prices in the GM. These prices impact the GAUC decisions through coordination constraints representing the profitability of the bids of GFPPs. Privacy Goal. The paper focuses on situations where the follower inputs DF S contain sensitive information that should not be revealed. In the case of electricity and natural gas markets, a FERC directive allows the gas and electricity operators to share network data, while the bids of the generators are public information. Therefore, the sensitive parameters typically represent the gas demand profile of consumers. As discussed in the introduction, if released, they can provide a competitive advantage to strategic agents in the energy system and may result in financial losses for the follower, as shown in [Zugno et al., 2013; Baringo and Conejo, 2013]. Thus, the privacy goal is to ensure that the sensitive information DF S is not breached during the coordination process described in Problem (1). The next section introduces a formal notion that will be used to achieve this goal. 3 Background: Differential Privacy Differential privacy [Dwork et al., 2006] is a privacy notion used to protect disclosures of an individual s data in a computation. The paper considers datasets DF S pd1, . . . , dnq with each di P R describing a sensitive quantity, such as the participants demand value in the GM. DP relies on the notion of dataset adjacency, which captures the differential information to be protected. To protect the values in the dataset, the paper uses the following adjacency relation: D α D1 ô Di : |di d1 i| ď α @j i : dj d1 j, where D and D1 are two datasets and α is a positive real value. Such definition is useful to hide individual participation up to some quantity α [Chatzikokolakis et al., 2013]. In the paper context, it allows customers to reveal gas demand profiles that hide the real consumption by a factor of α. A randomized mechanism M:D ÑR with domain D and range R is ϵ-DP if, for any output response O Ď R and any Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence (IJCAI-20) two adjacent datasets D α D1 , for a fixed value α ą 0: Prr Mp Dq P Os ď exppϵq Prr Mp D1q P Os. (2) The parameter ϵ ě 0 is the privacy loss of the mechanism, with values close to 0 denoting strong privacy. The level of indistinguishability is controlled by the parameter α ą 0. The definition above was introduced by Chatzikokolakis et al. [2013]. It is a generalization of the classical DP definition, that protects individuals participation, to arbitrary metric spaces. W.l.o.g. the paper fixes ϵ 1.0 and focuses in the indistinguishability parameter α. In the context of this work, Definition (2) is referred to as α-indistinguishability. An important DP property is immunity to post-processing. Theorem1 (Post-Processing [Dwork and Roth, 2013]) Let M be an α-indistinguishable mechanism and g be an arbitrary mapping from the set of possible outputs to an arbitrary set. Then, g M is α-indistinguishable. A function Q (also called query) from a data set D P D to a result set R Ď Rn can be made differentially private by injecting random noise to its output. The amount of noise depends on the sensitivity of the query, denoted by Q and defined as Q max D D1 }Qp Dq Qp D1q}1 . In other words, the sensitivity of a query is the maximum l1-distance between the query outputs of any two adjacent datasets D and D1. 4 Privacy-Preserving Stackelberg Problem The Privacy-Preserving Stackelberg (PPS) problem establishes the fundamental desiderata to be delivered by the obfuscation mechanism. It operates on the follower sensitive parameters DF S exchanged to ensure coordination between the leader and the follower in the resolution of Problem (1). The goal is to produce a privacy-preserving version ˆDF S that is α-indistinguishable from DF S and which ensures that ˆOL OL , where ˆOL is the leader objective value in the Stackelberg game (1) when the sensitive data DF S is replaced by its privacy-preserving version ˆDF S . 5 The PPSM Mechanism The Privacy-Preserving Stackelberg Mechanism (PPSM) is described schematically in Figure 2 and consists of the following steps which will be described in detail subsequently: [1] [Follower]: Given the sensitive data DF S , the follower produces the obfuscated data DF S which is αindistinguishable from DF S using the Laplace mechanism. [2a] [Leader]: Given the obfuscated data ( DF S ) computed in [1] and the public data (DL,DF P ), the leader uses model ML to (privately) estimate the value of the dual coordination variables y F . [2b] [Leader]: It then solves the leader problem PL (1a)- (1b) with the values of the follower variables y F fixed to the estimates y F to obtain the estimates of the coordination variables x L. [3a] [Follower]: Given estimates x L and the obfuscated data p DF P , DF S q, the follower uses model MF to (privately) estimate the objective value OF and the values for the dual variables y F of the follower problem PF (1c) and (1d). Coordination Variable Estimation Phase Original sensitive data Privacy Phase Estimated coordination variables Estimated coordination variables Follower s fidelity recovery Post-processed sensitive data DF S Fidelity Phase Obfuscated sensitive data Leader s estimation Leader s problem Follower s estimation MF ML Eq. (4) Figure 2: PPSM Illustration. [3b] [Follower]: Finally, using DF S and the estimates computed in [2b] and [3a], the follower produces a new privacy-preserving vector ˆDF S to achieve fidelity, i.e. nearoptimality of the leader problem, such that ˆOL OL . Once PPSM produces the privacy-preserving demand ˆDF S , the leader can solve its problem PLp DL, DF P , ˆDF S q (1a) (1d) to produce x L which is communicated to the follower for solving its own problem PF px L , DF P , ˆDF S q (1c) and (1d), as depicted in Figure 1. 5.1 Privacy Phase In Step [1], the follower takes as input its sensitive parameters DF S and constructs a privacy-preserving version DF S using the Laplace mechanism [Dwork et al., 2006]. Theorem2 (Laplace Mechanism) Let Q be a numeric query that maps datasets to Rn. The Laplace mechanism that outputs Qp Dq ξ, where ξ P Rn is drawn from the Laplace distribution Lapp Q{ϵqn, achieves α-indistinguishability. In the above, Lappλqn denotes the i.i.d. Laplace distribution with 0 mean and scale λ over n dimensions. As a result, the privacy-preserving parameters DF S are obtained as follows: DF S DF S Lappαqn. (3) Importantly, the Laplace mechanism has been shown to be optimal, i.e., it minimizes the mean-squared error for identity queries w.r.t. the L1-norm [Koufogiannis et al., 2015]. While (3) ensures α-indistinguishability, the obfuscated data may not achieve strong fidelity w.r.t. the original problem. Crucially, in energy systems, the inputs generated by this mechanism often fail to produce a feasible solution to the problem of interest, as highlighted in Section 7. To remedy this limitation, the proposed PPSM introduces an optimization-based approach that aims at producing a new privacy-preserving dataset ˆDF S establishing feasibility and fidelity (i.e. near-optimality) w.r.t. the constraints and objectives of the leader and follower problems. 5.2 Estimating the Coordination Variables After having received the Laplace-obfuscated data DF S from the follower, the leader uses model MLp DL, DF P , DF S q to estimate the value of the coordination variables y F of the follower (Step [2a]). Next, in Step [2b], the leader solves the optimization problem x L arg min x L OL x L, DL s.t. px L, y F q P FLp DLq. (4) Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence (IJCAI-20) Problem (4) describes, in fact, the leader subproblem (Equations (1a) and (1b)), in which the values of variables y F have been fixed to the estimates y F . The leader then communicates the estimates x L to the follower. In turn, the follower uses model MF p x L, DF P , DF S q to estimate the values of its subproblem objective value OF and dual variables y F (Step [3a]). 5.3 Fidelity Phase Finally, given the obfuscated parameters DF S , computed in Step [1], the estimated values x L, computed in Step [2b], and the follower objective value OF and dual variables y F , computed in Step [3a], the follower executes the following bilevel optimization problem: min ˆ DF S ,ˆx F ,ˆy F } ˆDF S DF S }2 2 (5a) s.t. | ˆOF OF | ď ηp (5b) |ˆy F y F | ď ηd (5c) ˆy F dual sol. of PF p x L,DF P , ˆDF S q, (5d) where ηp and ηd are parameters specifying the desired fidelity for the value of the objective and dual variables of the follower. Its objective is to find new values ˆDF S that minimize the distance to the Laplace-obfuscated DF S (5a), while ensuring (component-wise) fidelity w.r.t. the estimated objective value OF (5b) and dual variables y F (5c). The follower objective function ˆOF and dual variables ˆy F are defined as the solutions to the lower-level problem (5d), which represents the follower subproblem PF p x L, DF P , ˆDF S q with the new privacy-preserving parameters ˆDF S and the values of the coordination variables x L fixed to the estimates x L. Additionally, this lower-level problem (5d) enforces feasibility of the follower problem w.r.t. the estimates x L. Using the equivalent Karush-Kuhn-Tucker (KKT) conditions of the linear lower-level problem (5d) and the Fortuny-Amat linearization, this bilevel problem can be recast as a mixed-integer second-order cone program (MISOCP) [Gabriel et al., 2012]. The obfuscated data ˆDF S returned by the PPSM mechanism is α-indistinguishable from DF S , since Steps [2a] [3b] can be seen as a post-processing transformation. Indeed, they use exclusively public information and data-independent models. 6 Error Analysis This section analyzes the impact of the data perturbation induced by PPSM on the optimal objective value of both agents in the privacy-preserving problem. The results below hold under the assumption that the estimated values x L, OF , and y F are accurate. Theorem3 (Error) After the fidelity phase, the expected error induced by PPSM on the original, sensitive, parameters DF S is bounded by the inequality: Er} ˆDF S DF S }s ď 4α2, where ˆDF S is the solution to Problem (5). Proof Sketch. The proof relates the distance between ˆDF S and DF S to that between the noisy DF S and DF S , and relies on triangular inequality on norms, optimality of ˆDF S , and the fact that the Laplace mechanism is an unbiassed estimator. l The next theorem bounds the difference in objective value for the leader problem when the leader problem is convex and the coordination constraints are linear. Theorem4 (Cost of privacy) Consider a convex leader problem whose coordination constraints (6c) are linear; ˆOL min x L,y FOL x L, DL (6a) s.t. x L P FL DL (6b) Ax L By F ě b (6c) y F dual sol. of PF px L,DF P , ˆDF S q, (6d) where PF px L,DF P , ˆDF S q uses the privacy-perserving ˆDF S . After the fidelity phase, the error induced by PPSM on the objective value ˆOL of the leader problem (6) is bounded by: } ˆOL OL } ď ηd}BT y L }1, (7) where y L are the dual variables values associated with the constraints (6c) of the original leader problem PL. Proof Sketch. The proof relies on the bestand worst-case counterparts of the linear coordination constraints (6c). The fidelity criteria (5c) can be reformulated as a perturbation on the dual variables y F y F ηdϵ, where each component of the random vector ϵ is such that |ϵi| ď 1. Therefore, the difference p ˆOL OL q can be upperand lower-bounded by the objective value of the perturbed leader problem, in which the right-hand sides of the coordination constraints (6c) are perturbed by the small quantity ηd ˇˇˇˇBT ˇˇˇˇ 1. l While fidelity w.r.t. the follower objective value is explicitly enforced by Constraint (5b), the result above ensures fidelity w.r.t. the leader objective value. This fidelity is implicitly enforced by Constraint (5c) on the follower coordination variables y F , and their impact on the leader objective value via the coordination constraints (6c). This sub-optimality in the leader cost represents the so-called cost of privacy. 7 Experimental Evaluation The performance of the proposed PPSM is illustrated on the motivation problem introduced in Section 2. The leader represents the GAUC problem, and the two followers represent the EM and GM problems. The PPSM aims at preserving privacy on the sensitive gas demand profiles (Dg S) in the GM, and fidelity w.r.t. the original Stackelberg game. Fidelity constraints are explicitly enforced on the original objective value of the GM p Og q and gas prices pyg q. Additionally, the implicit impact of the PPSM on the original objective values of the GAUC (Ouc ) and the EM (Oe ) is analyzed. Case Study Setup. The PPSM is evaluated on a test system representing the joint natural gas and electricity systems in the Northeastern US [Byeon and Van Hentenryck, 2019]. The system is composed of the IEEE 36-bus power system Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence (IJCAI-20) M α sat.(%) Dg S (L1) Oucp%q Oep%q Ogp%q Laplace 0.1 71.49 5.08 0.1237 0.3222 0.3335 1.0 18.13 50.85 1.2959 3.5538 3.5540 10.0 4.47 508.55 22.940 52.414 52.414 PPSMp 0.1 98.45 4.45 0.0631 0.1503 0.1503 1.0 91.30 21.87 0.1216 0.1764 0.1761 10.0 80.71 24.31 0.2143 0.3851 0.3853 PPSM 0.1 99.10 3.89 0.0192 0.1056 0.1057 1.0 95.09 12.71 0.0698 0.1465 0.1465 10.0 91.35 14.16 0.1367 0.2330 0.2331 Table 1: Left: Satisfactory instances (%) and L1 errors (MWh) on the gas demands ( Dg S) for varying indistinguishability parameters α, and ηp ηd 0.1% of the leaders objective value and the dual variables values, respectively. Right: Errors (%) on the leader objective ( Ouc) and followers objectives ( Oe and Og). [Allen et al., 2008] and a gas transmission network covering the Pennsylvania-to-northeast New England area. This case study analyzes the performance of PPSM under various operating conditions of the gas and electricity systems. The electricity demand profile is uniformly increased by a stress factor ranging from 30% to 60%, and the gas demand profile is increased by a stress factor ranging from 10% to 130%, producing increasingly stressed and difficult operating conditions. The experiments compare the proposed PPSM to a version (PPSMp) that omits the fidelity constraint on the dual variables (5c). Both versions are compared with the standard Laplace mechanism for varying values of the privacy parameter α P t0.1, 1, 10u ˆ 102 MWh, and the fidelity parameters ηp ηd P t0.01, 0.1, 10.0u% of the original objective value of the GM p Og q and gas prices pyg q, respectively. In the GAUC problem, the original, sensitive, gas demand vector is denoted Dg S (in lieu of DF S ). Notice that, in the highest stress factor adopted, this demand vector has minimum, median, and maximum values: 0, 3.38 ˆ 102, 98.31 ˆ 102, respectively. Therefore, the privacy parameters adopted ensure a very low privacy risk. The uncertainty resulting by predicting the gas cost estimates yg (in lieu of y F ) is simulated by using a noisy version obtained by perturbing the original quantities yg using Normal noise with standard deviation of 10% the average value of yg . The experiments also evaluated benchmarks that use precise cost estimates and present consistent trends. We generate 30 repetitions for each test case and report average results in all experiments and impose a 1-hour wallclock limit. A wall-clock limit of 1 hour is given to generate and solve each of the instances. The resolution of the privacypreserving demand profiles (phases [1] and [2] of PPSM) takes less than 30s for any of the instances. Limits of the Laplace Mechanism This section studies the applicability of the Laplace mechanism to our context of interest. Table 1 (left) reports the percentage of the feasible solutions (over 1260 instances) across different values of the privacy parameter α. It compares the Laplace mechanism with PPSMp and PPSM. When α ą 0.1 the Laplace-obfuscated gas demands rarely produce a feasible solution to the GAUC problem. These results justify the need for more advanced privacy-preserving mechanisms for Stackelberg games, and hence the proposed PPSM. In contrast, the PPSMs result in a much higher number of feasible solutions. M η Oucp%q Oep%q Ogp%q Laplace NA 22.9400 52.4141 52.4141 PPSMp 0.1% 0.1915 0.3851 0.3851 1.0% 0.1946 0.4102 0.4102 10.0% 0.2224 0.4543 0.4543 PPSM 0.1% 0.1367 0.2330 0.2330 1.0% 0.1242 0.2060 0.2060 10.0% 0.2086 0.3601 0.3605 Table 2: Cost objective differences (%) at varying fidelity parameters η ηp ηd %, and indistinguishability parameter α 10. Indeed, all unsolved PPSM cases are due to timeout and not as a direct result of infeasibility. Additionally, we verified that the two PPSMs are always able to find a feasible solution to the GM follower problem with the gas demand profile ˆDg S. Table 1 (left) also reports the L1 distance d between the original gas demand Dg S and the privacy-preserving versions obtained with each of the mechanisms analyzed. Unsurprisingly, the L1 errors increase with the increasing of parameter α, as larger values of α induce more noise. However, the L1 errors introduced by the PPSM are much more contained than the Laplace ones, producing more than an order of magnitude more accurate results for the larger privacy parameters. These results indicate that the highly-perturbed demand profiles induced by the Laplace mechanism lead to infeasibility in the GAUC problem, whereas both PPSM and PPSMp manage to restore feasibility of the post-processed demand profiles. Leader and Follower Objectives The next results evaluate the ability of PPSM to preserve the optimal objective values of the leader and the follower problems. Table 1 (right) tabulates the errors, in percentage, on the objective costs of the GAUC problem (leader), the EM problem and the GM problem (followers) at varying indistinguishability parameters α, and for a fixed fidelity parameter η ηp ηd 0.1%. The errors O are defined as |O O | O %, where O P t Ouc, Oe, Ogu and are computed in expectation over the feasible instances only. Parameter α controls the amount of noise being added to the gas demand profiles, therefore, the objective costs are closer to their original values when α is small. Observe that the PPSMs induce objective costs differences that are from one to two orders of magnitude more accurate than those induced by the Laplace mechanism, and that are at most 0.4% of the original objective costs. Additionally, PPSM is consistently more accurate than PPSMp; By enforcing fidelity of the coordination variables yg, PPSM better limits the impact of the noise on the leader objective (GAUC), which in turn results in more faithful solutions for the followers problems. These results are further illustrated in Table 2, that analyzes the difference in objective costs at varying fidelity parameters ηp and ηd, for a fixed privacy parameter α 10 (i.e., the largest privacy level attainable in our experimental setting). Once again, the results of the PPSM mechanisms are at least two orders of magnitude more precise than those obtained by the Laplace mechanism. Additionally, notice that the fidelity parameters ηp and ηd impact the accuracy of the privacy-preserving objective costs. Indeed, they indirectly Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence (IJCAI-20) 1.0 1.3 1.6 e 1.0 1.3 1.6 e 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0 2.1 2.2 2.3 g 1.0 1.3 1.6 e 0.05 0.10 0.15 0.20 0.25 1.0 1.3 1.6 e 1.0 1.3 1.6 e 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0 2.1 2.2 2.3 g 1.0 1.3 1.6 e 0.5 1.0 1.5 2.0 2.5 1.0 1.3 1.6 e 1.0 1.3 1.6 e 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2.0 2.1 2.2 2.3 g 1.0 1.3 1.6 e Figure 3: GAUC objective cost difference (%) at varying gas (g) and electricity (e) stress levels for Dg S obtained via Laplace (top), PPSMp (middle), PPSM (bottom). Privacy: α 0.1 (left), 1.0 (center), 10.0 (right). Fidelity: ηp ηd 0.1% of respective quantities. control the deviation of the privacy-preserving GAUC and GM objectives w.r.t. the original counterparts. While the results differences are small, in percentage, their impact on the objective functions (in the 106 order) is non-negligible. Stress Levels Analysis Figure 3 reports heatmaps of the total (GAUC) objective cost difference, in percentage, at varying electricity (e) and gas (g) stress levels for the privacy-preserving data obtained via the Laplace mechanism (top), PPSMp (middle), and PPSM (bottom). Each square represents the objective cost difference averaged over 30 instances for a particular electricity and gas stress level. The darker the color, the more pronounced are the errors committed by the mechanisms, as reported in the legends on top of each subfigure. Gray squares represent the set of instances for which no feasible solution of the GAUC problem was found or when a timeout is reached. The illustration reports the cost differences for privacy parameters α 0.1 (left) α 1.0 (middle), and α 10.0 (right). These results illustrate three trends: Firstly, for every mechanism, the objective differences become more pronounced as the electricity and gas stress levels increase. This can be explained by the increased impact of the Laplace perturbations on higher values of gas demand profiles. Secondly, they remark that the PPSMs produce privacy-preserving Stackelberg problems that are consistently more faithful to the original problems w.r.t. those produced by the Laplace mechanism. Finally, they show that PPSM is consistently more accurate than PPSMp across all stress levels. These results are significant, as they show the robustness of the proposed PPSMs over different electricity and natural gas demand profiles. They indicate that PPSM can provide a realistic and efficient solution for the coordination of these markets. 8 Related Work The obfuscation of data values under the lens of differential privacy is a challenging task that has been studied from several angles. Often, the released data is generated from a data synopsis in the form of a noisy histogram [Li et al., 2010; Hay et al., 2016; Qardaji et al., 2014; Xiao et al., 2010]. These methods are typically adopted in the context of statistical queries. The design of markets for private data has also received considerable attention, see for instance [Ghosh and Roth, 2010; Niu et al., 2018]. However, all the proposals above, do not involve data used as input to a complex optimization problem, as in the case of this work. The closest work related to the proposal in this paper can be considered [Fioretto and Van Hentenryck, 2018; Fioretto et al., 2020a], which, in the context energy networks, propose a privacy-preserving mechanism for releasing datasets that can be used as input to an optimal power flow problem. A similar line of work uses hierarchical (bilevel) optimization for obfuscating the energy network parameters or locations while ensuring high utility for the problem of interest [Fioretto et al., 2019; Mak et al., 2020]. In contrast to these studies, the proposed PPSM focuses on solving Stackelberg games in which the follower parameters are sensitive. PPSM also enforces the notion of fidelity of the privacy-preserving information w.r.t. the leader and follower objectives. Finally, to the best of our knowledge, this is the first DP mechanism that is applied to the coordination of sequential electricity and natural gas markets. 9 Conclusions This paper introduced a differentially private (DP) mechanism to protect the sensitive information exchanged during the coordination of the sequential electricity and natural gas market clearings. The proposed Privacy-Preserving Stackelberg Mechanism (PPSM) obfuscates the gas demand profile exchanged by the gas market, while also ensuring that the resulting problem preserves the fundamental properties of the original Stackelberg game. The PPSM was shown to enjoy strong properties: It complies with the notion of DP and ensures that the outcomes of the privacy-preserving Stackelberg mechanism are close-to-optimality for each agent. Experimental results on several gas and electricity market benchmarks based on a real case study demonstrated the effectiveness of the approach: The PPSM was shown to obtain up to two orders of magnitude improvement on the cost of the agents when compared to a traditional Laplace mechanism. Future work will focus on several avenues, including extended theoretical bounds on the cost of privacy, studying the game-theoretic properties of this privacy-preserving Stackelberg game, accounting for uncertainty on the public data, and, studying the applicability of the PPSM to other domains. Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence (IJCAI-20) References [Allen et al., 2008] Eric H Allen, Jeffrey H Lang, and Marija D Ilic. A combined equivalenced-electric, economic, and market representation of the northeastern power coordinating council us electric power system. IEEE Transactions on Power Systems, 23(3):896 907, 2008. [Baringo and Conejo, 2013] Luis Baringo and Antonio J Conejo. Strategic offering for a wind power producer. IEEE Transactions on Power Systems, 28(4):4645 4654, 2013. [Byeon and Van Hentenryck, 2019] Geunyeong Byeon and Pascal Van Hentenryck. Unit commitment with gas network awareness. ar Xiv preprint ar Xiv:1902.03236, 2019. [Chatzikokolakis et al., 2013] Konstantinos Chatzikokolakis, Miguel E Andr es, Nicol as Emilio Bordenabe, and Catuscia Palamidessi. Broadening the scope of differential privacy using metrics. In International Symposium on Privacy Enhancing Technologies Symposium, pages 82 102. Springer, 2013. [Dwork and Roth, 2013] Cynthia Dwork and Aaron Roth. The algorithmic foundations of differential privacy. Theoretical Computer Science, 9(3-4):211 407, 2013. [Dwork et al., 2006] Cynthia Dwork, Frank Mc Sherry, Kobbi Nissim, and Adam Smith. Calibrating noise to sensitivity in private data analysis. In Theory of Cryptography Conference (TCC), volume 3876, pages 265 284. Springer, 2006. [Fioretto and Van Hentenryck, 2018] Ferdinando Fioretto and Pascal Van Hentenryck. Constrained-based differential privacy: Releasing optimal power flow benchmarks privately. In Proceedings of Integration of Constraint Programming, Artificial Intelligence, and Operations Research (CPAIOR), pages 215 231, 2018. [Fioretto et al., 2019] Ferdinando Fioretto, Terrence W. K. Mak, and Pascal Van Hentenryck. Privacy-preserving obfuscation of critical infrastructure networks. pages 1086 1092, 2019. [Fioretto et al., 2020a] F. Fioretto, T.W.K. Mak, and P. Van Hentenryck. Differential privacy for power grid obfuscation. IEEE Transactions on Smart Grid, 11(2):1356 1366, 2020. [Fioretto et al., 2020b] Ferdinando Fioretto, Lesia Mitridati, and Pascal Van Hentenryck. Differential privacy for stackelberg games, 2020. [Gabriel et al., 2012] Steven A Gabriel, Antonio J Conejo, J David Fuller, Benjamin F Hobbs, and Carlos Ruiz. Complementarity modeling in energy markets, volume 180. Springer Science & Business Media, 2012. [Ghosh and Roth, 2010] Arpita Ghosh and Aaron Roth. Selling privacy at auction, 2010. [Hay et al., 2016] Michael Hay, Ashwin Machanavajjhala, Gerome Miklau, Yan Chen, and Dan Zhang. Principled evaluation of differentially private algorithms using dpbench. In Proceedings of the 2016 International Con- ference on Management of Data, pages 139 154. ACM, 2016. [Koufogiannis et al., 2015] Fragkiskos Koufogiannis, Shuo Han, and George J Pappas. Optimality of the laplace mechanism in differential privacy. ar Xiv preprint ar Xiv:1504.00065, 2015. [Li et al., 2010] Chao Li, Michael Hay, Vibhor Rastogi, Gerome Miklau, and Andrew Mc Gregor. Optimizing linear counting queries under differential privacy. In Proceedings of the twenty-ninth ACM SIGMOD-SIGACTSIGART symposium on Principles of database systems, pages 123 134. ACM, 2010. [Maharjan et al., 2013] Sabita Maharjan, Quanyan Zhu, Yan Zhang, Stein Gjessing, and Tamer Basar. Dependable demand response management in the smart grid: A stackelberg game approach. IEEE Transactions on Smart Grid, 4(1):120 132, 2013. [Mak et al., 2020] Terrence WK Mak, Ferdinando Fioretto, Lyndon Shi, and Pascal Van Hentenryck. Privacypreserving power system obfuscation: A bilevel optimization approach. IEEE Transactions on Power Systems, 35(2):1627 1637, 2020. [Niu et al., 2018] Chaoyue Niu, Zhenzhe Zheng, Fan Wu, Shaojie Tang, Xiaofeng Gao, and Guihai Chen. Unlocking the value of privacy: Trading aggregate statistics over private correlated data. In Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, KDD 18, pages 2031 2040, New York, NY, USA, 2018. ACM. [Ordoudis, 2018] Christos Ordoudis. Market-based approaches for the coordinated operation of electricity and natural gas systems. 2018. [Qardaji et al., 2014] Wahbeh Qardaji, Weining Yang, and Ninghui Li. Priview: practical differentially private release of marginal contingency tables. In Proceedings of the 2014 ACM SIGMOD international conference on Management of data, pages 1435 1446. ACM, 2014. [Simaan and Cruz, 1973] Marwaan Simaan and Jose B Cruz. On the stackelberg strategy in nonzero-sum games. Journal of Optimization Theory and Applications, 11(5):533 555, 1973. [Xiao et al., 2010] Yonghui Xiao, Li Xiong, and Chun Yuan. Differentially private data release through multidimensional partitioning. In Workshop on Secure Data Management, pages 150 168. Springer, 2010. [Zugno et al., 2013] Marco Zugno, Juan M Morales, Pierre Pinson, and Henrik Madsen. Pool strategy of a pricemaker wind power producer. IEEE Transactions on Power Systems, 28(3):3440 3450, 2013. Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence (IJCAI-20)