Customer-Centered Pricing Strategy Based on Privacy-Preserving Load Disaggregation

被引:5
作者
Tao, Yuechuan [1 ]
Qiu, Jing [1 ]
Lai, Shuying [1 ]
Sun, Xianzhuo [1 ]
Ma, Yuan [1 ]
Zhao, Junhua [2 ,3 ]
机构
[1] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
[2] Chinese Univ Hong Kong Shenzhen, Sch Sci & Engn, Shenzhen 518100, Peoples R China
[3] Chinese Univ Hong Kong Shenzhen, Shenzhen Inst Artificial Intelligence & Robot Soc, Shenzhen 518100, Peoples R China
基金
澳大利亚研究理事会; 中国国家自然科学基金;
关键词
Signal processing algorithms; Pricing; Prediction algorithms; Power demand; Elasticity; Behavioral sciences; Smart meters; Demand response potential; pricing strategy; thermostatically controlled loads; non-intrusive load monitoring; privacy protection; ELECTRICITY; DEMAND; ENERGY; USAGE;
D O I
10.1109/TSG.2023.3238029
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Demand response (DR) is a demand reduction or shift of electricity use by customers to make electricity systems flexible and reliable, which is beneficial under increasing shares of intermittent renewable energy. For residential loads, thermostatically controlled loads (TCLs) are considered as major DR resources. In a price-based DR program, an aggregation agent, such as a retailer, formulates price signals to stimulate the customers to change electricity usage patterns. The conventional DR management methods fully rely on mathematical models to describe the customer ’s price responsiveness. However, it is difficult to fully master the customers ’ detailed demand elasticities, cost functions, and utility functions in practice. Hence, in this paper, we proposed a data-driven non-intrusive load monitoring (NILM) approach to study the customers ’ power consumption behaviors and usage characteristics. Based on NILM, the DR potential of the TCLs can be properly estimated, which assists the retailer in formulating a proper pricing strategy. To realize privacy protection, a privacy-preserving NILM algorithm is proposed. The proposed methodologies are verified in case studies. It is concluded that the proposed NILM algorithm not only reaches a better prediction performance than state-of-art works but also can protect privacy by slightly sacrificing accuracy. The DR pricing strategy with NILM integrated brings more profit and lower risks to the retailer, whose results are close to the fully model-based method with strong assumptions. Furthermore, a NILM algorithm with higher performance can help the retailer earn more benefits and help the grids better realize DR requirements.
引用
收藏
页码:3401 / 3412
页数:12
相关论文
共 50 条
  • [21] Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids
    Zhao, Shuai
    Li, Fenghua
    Li, Hongwei
    Lu, Rongxing
    Ren, Siqi
    Bao, Haiyong
    Lin, Jian-Hong
    Han, Song
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 521 - 536
  • [22] Privacy-Preserving Digital Rights Management based on Attribute-based Encryption
    Petrlic, Ronald
    Sorge, Christoph
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [23] A Privacy-Preserving Blockchain-Based Method to Optimize Energy Trading
    Ping, Jian
    Yan, Zheng
    Chen, Sijie
    IEEE TRANSACTIONS ON SMART GRID, 2023, 14 (02) : 1148 - 1157
  • [24] Lightweight and Privacy-Preserving IoT Service Recommendation Based on Learning to Hash
    Wan, Haoyang
    Wu, Yanping
    Yang, Yihong
    Yan, Chao
    Chi, Xiaoxiao
    Zhang, Xuyun
    Shen, Shigen
    TSINGHUA SCIENCE AND TECHNOLOGY, 2025, 30 (04): : 1793 - 1807
  • [25] A Distortion-Based Approach to Privacy-Preserving Metering in Smart Grids
    He, Xingze
    Zhang, Xinwen
    Kuo, C. -C. Jay
    IEEE ACCESS, 2013, 1 : 67 - 78
  • [26] A Trajectory Privacy-Preserving Scheme Based on Transition Matrix and Caching for IIoT
    Zhang, Shiwen
    Hu, Biao
    Liang, Wei
    Li, Kuan-Ching
    Pathan, Al-Sakib Khan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (04): : 5745 - 5756
  • [27] A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid
    Li, Kunchang
    Yang, Yifan
    Wang, Shuhao
    Shi, Runhua
    Li, Jianbin
    COMPUTERS & SECURITY, 2021, 103
  • [28] Privacy-preserving Distributed Optimization Algorithm Based on Elliptic Curve ELGamal
    Zhao, Zhong-Yuan
    Gao, Wang
    Jiang, Lu-Yao
    Ge, Quan-Bo
    Zidonghua Xuebao/Acta Automatica Sinica, 2025, 51 (01): : 210 - 220
  • [29] A privacy-preserving mobile application recommender system based on trust evaluation
    Xu, Kun
    Zhang, Weidong
    Yan, Zheng
    JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 26 : 87 - 107
  • [30] SocialGuard: An adversarial example based privacy-preserving technique for social images
    Xue, Mingfu
    Sun, Shichang
    Wu, Zhiyu
    He, Can
    Wang, Jian
    Liu, Weiqiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63