Risk Assessment of CO Injection Processes and Storage in Carboniferous Formations: A Review
Risk Assessment of CO Injection Processes and Storage in Carboniferous Formations: A Review
Manchao He1, Sousa Luis1, 2, Sousa Rita3, Gomes Ana2, Vargas Jr. Eurípedes4, Na Zhang1
1
State Key Laboratory for Geomechanics and Deep Underground Engineering, China University of Mining and Technology, Beijing, 100083, China
2
University of Porto, Porto, 4200-465, Portugal
3
Massachusetts Institute of Technology, Cambridge, MA 02139, USA
4
Catholic University of Rio de Janeiro, Rio de Janeiro, CEP 22451-900, Brazil
Received 15 January 2011; received in revised form 7 February 2011; accepted 10 February 2011
Abstract: Over the last decades, people from almost all over the world have realized that it is necessary to quickly develop
strategies for the control and reduction of greenhouse gases (GHG) emissions. Among various GHGs, carbon dioxide (CO2) is
the most abundant GHG. Its underground storage involves less risk and lower levels of dangerousness. The paper briefly
describes the most effective technologies available in the market for background processes to storage (capture and transport)
CO2, as well as the more secure solutions for its storage, in particular for the geological storage in carboniferous formations.
This paper also outlines the methodologies for the risk assessment involved in storage of CO2, with a particular focus on cases
where the injection is made into unminable coal seams and in abandoned coal mines. Methodologies used for risk analysis are
described in detail with particular emphasis on Bayesian network (BN). Some applications regarding the risk assessment of
CO2 injection processes and CO2 storage in carboniferous formations and contamination of aquifers are presented and
analyzed. Finally, based on the applications of BN, several conclusions are drawn.
Key words: risk assessment; underground storage of CO2; coal mines; monitoring
1 Introduction
Terrestrial
sequestration
Atmospheric CO2
There are several ways of mitigating greenhouse CO2
O2 Ethanol
gases (GHG) emissions to the atmosphere. The storage Coal and biomass plant
Cement/steel/
of large quantities of carbon in geological formations refineries,etc.
is presented today as one of the most effective methods Industrial Fuel CO2
capture
with visible results. Carbon dioxide (CO2) capture and uses and food
Electricity
products
storage (CCS) are a process consisting of the CO2 generation CO2
es
separation of CO2 from industrial and energy-related ip e lin
Rp CO2
EO
sources. Figure 1 brings together, in schematic form, CO2
Seal
the main sources and some of the possible storage sites. Geological CO2 displaces methane from coal
sequestration Oil Seal
Storage of CO 2 in deep, onshore and offshore CO2 CO2 stored in depleted oil/gas reservoirs
geological formations uses many technologies CO2 displaces trapped oil (enhanced oil recovery)
CO2 stored in saline formations
developed by oil and gas industries, and it has been Seal
proved to be economically feasible under specific Seal
conditions in oil and gas fields and saline formations Fig.1 Processes of capturing and storing CO2 1.
1. CO2 can also be stored in carboniferous formations,
either in unminable coal seams or in abandoned coal characterized and properly managed sites. Injecting
mines. CO2 can be safely injected and stored at well CO2 in deep geological formations can store it
underground for a long period of time. At the depth of
800–1 000 m underground, CO2 has a liquid-like
Doi: 10.3724/SP.J.1235.2011.00039
Corresponding author. Tel: +351-966012385;
density that permits the potential for an efficient use of
E-mail: ribeiro.e.sousa@gmail.com underground reservoirs in porous sedimentary rocks.
40 Manchao He et al. / J Rock Mech Geotech Eng. 2011, 3 (1): 39–56
Figure 2 illustrates the options for storing CO2 in Kyoto Protocol. The use of coal as a source of energy
deep underground geological formations [1]. Other is attractive due to its abundance and its low price.
geological options, which may serve as storage sites, However, research and development in technologies
include caverns in basalt, organic-rich shale and salt. for renewable energies, energy efficiency, CCS, etc.,
should also be considered in emerging countries. The
situation in China can be characterized by a large
number of abandoned coal mines of about one
Ocean
CO2-ECBM
thousand. Therefore, the storage of CO2 in abandoned
Depleted oil and gas reservoirs coal mines can be a viable option 2.
CO2 EOR
In 2010, the State Key Laboratory of Geomechanics (3) The heterogeneity of the mass taken as a whole
and Deep Underground Engineering, China University (stratigraphic heterogeneity, existence of discontinuities,
of Mining and Technology (Beijing), was selected to etc.).
conduct a project on the risk assessment of CO2 (4) Knowledge of the existence of abandoned
injection and sequestration in carboniferous reservoirs injection/pumping wells nearby.
by the State Administration of Foreign Experts Affairs, (5) The adequacy of the injection system.
China. The importance of the project is related to the (6) Changing biogeochemistry.
fact that China is the major producer of coal in the (7) Geomechanical weathering (generation of cracks
world. Therefore, there are several possibilities for and fractures).
selecting appropriate sites for reservoirs, even in (8) Methods of abandonment of the wells when the
abandoned coal mines. Coal formations contain cleats reservoir reaches the limit.
that impart some permeability to the system. Between Duguid et al. 7 suggested that, as one of the first
cleats, coal has a large number of micropores, into requirements to be met by a site candidate for the
which gas molecules can diffuse and be tightly reservoir, it was to have several layers of sealing. Thus
absorbed. Gaseous CO2 injected through wells will the system is redundant and it is possible to make early
flow through the cleat system, and diffuse in the coal detection of potential problems. If CO2 escapes, the
matrix and be absorbed onto the coal micropore system gives an indication to the authorities. If the
problem is not resolved, the secondary layers of
surfaces. If CO2 is injected into coal seams, it can
protection is in charge of retaining leakage.
displace gas methane, enhancing coal bed methane
In accordance to Ref.1, the commercial projects of
recovery.
CO2 storage in large scale should be adopted if it is
This paper reviews the literatures published on
assumed that the location is well chosen, designed,
geological storage of CO2 in deep saline aquifers and
operated and monitored. The data available from
carboniferous formations, including abandoned coal
existing projects suggest that it is very likely that the
mines with special emphasis on the problematic risk
fraction of stored CO2 trapped in the first 100 years is
assessment.
over 99%, and it is possible that the fraction of stored
CO2 trapped in the first 1 000 years is over 99%.
2 Injection and safety storage 2.2 Risks associated with the earlier stages of
storage
2.1 Introduction Various stages leading up to the storage itself cause
CO2 is a common constituent of the atmosphere, the changes in the state of stress and strain of the rock
non-toxic. However, high concentrations can be mass. In turn, flow paths may be generated, through
dangerous 3. An uncontrolled release of CO2 from an which CO2 can escape due to the discontinuities (pre-
underground reservoir will not have long-term effects existing or not), such as faults or other fractures.
once the CO2 is diluted in air or water, as that happens Associated with the existence of faults, seismic
in cases of highly toxic or nuclear waste. Thus, slow episodes may occur, which may bring more risks to the
migration of gas toward the surface is not a direct CCS project.
threat to humans. However, high concentrations can be To understand the influence of entire storage system
attained by a sudden release or other processes. Due to on the rock mass, it is necessary to study each phase
the high density of CO2 in relation to air in the case of separately. Different phases 8 that may be considered
leakage of large volumes, depressions or enclosures are as follows: (1) drilling and completion of wells; (2)
can be created near the earth’s surface, causing loss of formation dewatering and methane production; and (3)
consciousness or asphyxiation to humans who are in CO2 injection with or without secondary production of
the vicinity 4. methane.
The main risks of geological storage of CO2 vary Wellbore stability is a geomechanical problem that
from place to place, mainly depending on such factors can be encountered during drilling. Rock failure and
1, 5, 6: displacements associated with wellbore instability
(1) The configuration of the storage facility, generate potential leakage paths. These drilling issues
including the geological characteristics of the stratum and the main causes of instabilities are analyzed in
selected. detail in Ref.9. The risk of leakage will be minimized
(2) The heterogeneity of the sealing caprock. by cementing the case. Two constructive methods are
42 Manchao He et al. / J Rock Mech Geotech Eng. 2011, 3 (1): 39–56
connection between surface and underground and masonry is represented. Path (f) shows another
reservoirs, crossing all rock strata, even the most way of leakage between the cement and the strata
impervious. An eventual path to the leakage of CO2 is surrounding the well.
then created. The sealing caprock of the well, the walls
of well, the annular area of interface with the walls, the
first layer of cement case and the involved rock mass
3 Associated risks
are the main elements that should be carefully
analyzed. 3.1 General description
In the presence of water, CO2 becomes carbonic acid, Risk assessment and mitigation strategies are
which can affect the integrity of the casing cement, or developed with the goal of avoiding major problems
even the first cement layer that lies between the walls described above. There are many definitions for risk
and the rock mass. Thus the resistance of the cement assessment. More generally, for an undesirable event E
can be affected. In order to prevent this degradation, an with different consequences, vulnerability levels are
extra thick wall and the introduction of additives to the associated and the risk 14 can be defined as
cement should be considered 5. Figure 12 shows R P[ E ]P[C | E ]u[C ] (1)
potential escape paths of CO 2 along injecting or where R is the risk; P[ E ] is the hazard, i.e. the
pumping wells. In abandoned wells, the types of probability of the event; P[C | E ] is the vulnerability
escape mechanisms along the walls are similar to those of event E; and u[C ] is the utility of consequence C.
in the wells still in operation. Path (a) in Fig.12 focuses More generally, for different failure events Ej, with
on the flow through the interface of the well casing and which different consequences and hence vulnerability
cement layer on the inside face of the coating. Since levels are associated, expected risk 15 can be defined
both materials are very permeable, runoff is very as
focused in the vertical direction. In path (b), there is an
E[ R] P[ E j ]P[u (Ci ) | E j ]u (Ci ) (2)
escape mechanism similar to path (a), but it is only j j
between the casing and the cement that leads to the where P[u (Ci ) | E j ] is the vulnerability to the failure
closing hole. In path (c), the mechanism of percolation mode j, P[ E j ] is the probability of failure mode j, and
of CO2 through the cement seal is illustrated. In paths u (Ci ) is the utility of consequence i.
(d) and (e), flow crossing the final layer of concrete For risk evaluation, it is necessary to identify the
tools or models to be used to represent this existing
(a)
knowledge and to perform risk and decision analyses.
Well casing
Cement fill
Risk assessment and risk management for CCS
systems require an evaluation of the hazard and the
(b) assessment of the likelihood of the harmful effects.
Formation Cement
well plug Risk assessment starts with the hazard identification,
rock
which refers to the identification of the major possible
(c) hazards, and focuses on the likelihood of extent of
damage. After the hazard identification, risk
characterization is followed, which involves a detailed
assessment of each hazard in order to evaluate the risk
(d)
associated with each hazard 16.
Based on studies presented in several publications 1,
8, 15, 16, nine hazard identification scenarios are
(e) characterized (Table 1). Once the risks associated with
each hazard are identified, the decision-makers can
develop a basis for their evaluation and the time
(f) necessarily to develop and carry actions to reduce the
risks 16.
3.2 Leakage of CO2 from pipelines or pumping
stations and shipping
Fig.12 Potential escape pathways along wells 9. CO2 from power plants or other industrial facilities
Manchao He et al. / J Rock Mech Geotech Eng. 2011, 3 (1): 39–56 45
CO2, the accurate estimation of the density is very data provide information on the state of the CO2
important for improving the measurement accuracy. (supercritical, liquid or gaseous) and precise values of
Small changes in temperature, pressure and the quantity of CO2 injected. This information may be
composition can have large effects on the density. used for verification and possible updating of the
Measurements of injection pressure at the surface and model adopted.
in the rock formations are also usually performed. Figure 14 presents a methodology that can be used
Gauges are installed in most injection wells through by monitoring for the long-term integrity analysis of a
holes on the surface piping near the wellhead. well in terms of risk evaluation.
Measurements of pressure in the well are routine. A
wide variety of pressure sensors are available and
adequate to monitor pressures at the wellhead or in the
rock formations. The data are continuously available.
The surface pressure gauges are often linked to shut-off
valves that will stop or reduce the injection pressure to a
certain limit if the pressure exceeds a pre-determinated
safe value, or if there is a drop in pressure as a result of
a leakage 1 . Fiber-optic pressure sensors and
temperature sensors are available. These systems should
provide more reliable results, as well as better control of
the well. The current state of technology is more Fig.14 General methodology for integrity analysis of a well.
sufficient to meet the needs of monitoring rates of
injection, and the pressures on the top of the hole. The way that CO2 distributes and moves under-
Combining with temperature measurements, the ground can be monitored in several ways. Table 2 [1]
Table 2 Summary of direct and indirect techniques that can be used to monitor CO2 storage projects 1.
a graph 22 that consists of: (1) a set of random of a variable (or subset of variables) given the
variables that make up the nodes of the network; (2) a observation:
set of directed links between nodes (these links reflect P( A, e )
P( A | e ) (5)
cause-effect relations within the domain); (3) each P( X1 ,, X k , A, e)
variable has a finite set of mutually exclusive states; (4) X1 Xk A
the variables together with the direct links form a where e is the vector of all the evidence.
direct acyclic graph (DAG); and (5) attached to each 5.2.1 Inference for BN
random variable A with parents B1, B2, . . . , Bn, there is There are two main groups of inference algorithms:
a conditional probability table P(A | B1, B2, . . . , Bn), exact inference method and approximate inference
algorithm. The most common and exact inference
except for the variables in the root nodes. The root
method is the variable elimination algorithm that
nodes have prior probabilities.
consists of eliminating (by integration or summation)
Figure 17 is an illustration of a simple BN. The
the non-query, non-observed variables one by one by
arrows going from one variable to another reflect the
summing over the product. The approximate inference
relations between variables. In this example, the arrow
algorithms are used when exact inference may be
from C to B1 means that C has a direct influence on B1.
computationally infeasible, such as that in temporal
models (dynamic BN), where the structure of the
network is very repetitive, or in highly connected
networks.
(1) Dynamic Bayesian network (DBN)
DBN is the BN that represents sequences of
variables. It is often applied to temporal data such as
speech recognition, visual tracking, and financial
forecasting; however, it is also used in sequence data
analysis, e.g. Biosequence analysis, text processing
Fig.17 An illustration of a simple BN.
among others. It is mostly used for the problems such
as classification, state estimation, fault diagnosis,
Specifically, a BN is a graphical and concise
prediction, etc..
representation of a joint probability distribution over A specific case of a DBN is presented in Fig.18.
all the variables, taking into account that some This DBN represents a hidden Markov model (HMM),
variables are conditionally independent. The simplest where each state Xi generates an observation Yi. The
conditional independence relationship encoded in BN structure and the variables are repeated over time.
is that a node is independent of its ancestors, given its
parents, i.e. a node only depends on its direct parents.
Thus, the joint probability of a BN over the variables U =
{A1, A2, . . . , An} can be represent by the chain rule:
n
P(U ) P( Ai parents ( Ai )) (3) Fig.18 DBN representing a HMM.
i
where parents (Ai) is the parent set of Ai. In order to represent such DBN, we need: (a) initial
Since a BN defines a model for variables in a certain distribution P( X 1 ) ; (b) transition model, i.e. transition
domain, its relationships can be used to answer probability distributions P( X i 1| X i ) ; and (c) sensor
probabilistic queries about them. The most common model P(Yi | X i ) .
types of queries are as follows: (2) Inference in DBN
(1) A priori probability distribution of a variable: The problem of inference in DBN is NP-hard. There
P( A) P( X 1 , , X k , A) (4) are several algorithms divided into two groups, i.e.
X1 Xk exact inference algorithm and approximate algorithm.
where A is the query-variable; and X i (i = 1, 2, . . . , k) For exact algorithm, we need: (a) forwards-
is the remaining variables of the network. backwards smoothing algorithm (on any discrete-state
(2) Posterior distribution of variables given evidence DBN); (b) the frontier algorithm; (c) the interface
(observation). This query consists of updating the state algorithm; and (d) Kalman filtering and smoothing.
50 Manchao He et al. / J Rock Mech Geotech Eng. 2011, 3 (1): 39–56
tsunami or a hurricane). The chance node “warning Fig.20 Influence diagram connections.
Manchao He et al. / J Rock Mech Geotech Eng. 2011, 3 (1): 39–56 51
(b)
Fig.21 Value influences.
Contamination Contamination
Contamination
level of aquifer (t = 1) level of aquifer (t = 2)
level of aquifer
Remedial Leakage
measures rate of CO2 (t)
Fig.25 BN for risk analysis of storage of CO2 with the existence Contamination
of active faults. level of aquifer (t)
CO2 leakage CO2 leakage (t = 1) CO2 leakage (t = 2) CO2 leakage (t = 3) CO2 leakage (t = 4) CO2 leakage (t = 5)
Water quality Water quality Water quality Water quality Water quality Water quality
measurement measurement (t = 1) measurement (t = 2) measurement (t = 3) measurement (t = 4) measurement (t = 5)
CO2 leakage CO2 leakage (t = 1) CO2 leakage (t = 2) CO2 leakage (t = 3) CO2 leakage (t = 4) CO2 leakage (t = 5)
Water quality Water quality Water quality Water quality Water quality Water quality
measurement measurement (t = 1) measurement (t = 2) measurement (t = 3) measurement (t = 4) measurement (t = 5)
CO2 leakage CO2 leakage (t = 1) CO2 leakage (t = 2) CO2 leakage (t = 3) CO2 leakage (t = 4) CO2 leakage (t = 5)
Water quality Water quality Water quality Water quality Water quality Water quality
measurement measurement (t = 1) measurement (t = 2) measurement (t = 3) measurement (t = 4) measurement (t = 5)
1.0
0.8 No
is made at time t0 and enters into the network (in grey).
0.6
Prob
0.6
Once the prediction model has been employed, one 0.4 High
can use its results (Fig.29) to determine the optimal 0.2
remedial measure, which can be invalid if no remedial 0.0
0 1 2 3 4 5 6 7 8 9
measure is considered, by minimizing the risk. Figure 30 Time slice
(b)
shows the decision model with evidence (coming from Fig.29 Results of the execution of BN of Fig.26 with one
the prediction model) entered into the network. observation at time t0.
Manchao He et al. / J Rock Mech Geotech Eng. 2011, 3 (1): 39–56 55
exceptional conditions to store CO2 in carboniferous Carboniferous Formations and Abandoned Coal Mines. Beijing: [s.n.],
Based on the applications of BN, several [6] Vargas E. Simulation of storage processes in geological media. Rio de
conclusions can be drawn: Janeiro: Catholic University of Rio de Janeiro, 2008 (in Portuguese).
CO2 leakage (t =
3)
[7] Duguid A, Couëslan M, Tombari J, et al. MMV technologies for [14] Einstein H. Landslide risk: systematic approaches to assessment and
effective and efficient monitoring of geologic carbon capture and management. In: Cruden A, Fell R ed. Landslide Risk Assessment.
storage projects. New Orleans: GWPC/US EPA CO2 MMV Rotterdam: A. A. Balkema, 1997: 25–50.
Workshop, 2007. [15] Sousa R. Risk analysis for tunneling projects. Cambridge: MIT Press,
[8] Myer L R. Geomechanical risks in coal bed carbon dioxide 2010: 589.
sequestration. Berkeley: Lawrence Berkeley National Laboratory, [16] Price P, McKone T, Sohn, M. Carbon sequestration risks and risk
Earth Sciences Division, 2003. management. Berkeley: Lawrence Berkeley National Laboratory,
[9] Gomes A. CO2 injection processes in carboniferous formations. MS Environment Energy Technologies Division, 2008.
Thesis. Porto: University of Porto, 2010 (in Portuguese). [17] Solomon S. Carbon dioxide storage: geological security and
[10] Sousa L, Sousa R. Risk associated to storage in carboniferous environmental issues—case study on the Sleipner gas field in Norway.
formations: application of Bayesian Networks. In: International Oslo: The Bellone Foundation, 2006.
Workshop on CO2 Storage in Carboniferous Formations and [18] Eiken O, Brevik I, Arts R, et al. Seismic monitoring of CO2 injected
Abandoned Coal Mines. Beijing: [s.n.], 2011 (to be published). into a marine aquifer. In: SEG Calgary 2000 International Conference
[11] Elsworth D. Complex process couplings in systems pushed far-far- and 70th Annual Meeting. Calgary: [s.n.], 2000.
from equilibrium: applications to deep geologic sequestration and [19] Henrion M, Breese J, Horvitz E. Decision analysis and expert systems.
energy recovery. In: International Workshop on CO2 Storage in AI Magazine, 1991, 12 (4): 64-91.
Carboniferous Formations and Abandoned Coal Mines. Beijing: [s.n.],
[20] Heckerman D. A tutorial on learning with Bayesian networks. Data
2011 (to be published).
Mining and Knowledge Discovery, 1997, (1): 79–119.
[12] Liu J. Multiphysics of coal-gas interactions. Something old,
[21] Faber M. Risk and safety in civil surveying and environmental
something new and something very new. In: International Workshop
engineering. Switzerland: Swiss Federal Institute of Technology, 2005.
on CO2 Storage in Carboniferous Formations and Abandoned Coal
[22] Russel S, Norvig P. Artificial intelligence: a modern approach. 2nd ed.
Mines. Beijing: [s.n.], 2011 (to be published).
[S.l.]: Prentice Hall, 2003.
[13] Piessens K. CO2 storage in abandoned coal mines. pressure constraints.
[23] Jordan M. Learning in graphical models. Cambridge: MIT Press, 1998.
In: International Workshop on CO2 Storage in Carboniferous
Formations and Abandoned Coal Mines. Beijing: [s.n.], 2011 (to be [24] Jensen F. Bayesian networks and decision graphs. London: Taylor and