Customer-Centered Pricing Strategy Based on Privacy-Preserving Load Disaggregation

被引:5
作者
Tao, Yuechuan [1 ]
Qiu, Jing [1 ]
Lai, Shuying [1 ]
Sun, Xianzhuo [1 ]
Ma, Yuan [1 ]
Zhao, Junhua [2 ,3 ]
机构
[1] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
[2] Chinese Univ Hong Kong Shenzhen, Sch Sci & Engn, Shenzhen 518100, Peoples R China
[3] Chinese Univ Hong Kong Shenzhen, Shenzhen Inst Artificial Intelligence & Robot Soc, Shenzhen 518100, Peoples R China
基金
澳大利亚研究理事会; 中国国家自然科学基金;
关键词
Signal processing algorithms; Pricing; Prediction algorithms; Power demand; Elasticity; Behavioral sciences; Smart meters; Demand response potential; pricing strategy; thermostatically controlled loads; non-intrusive load monitoring; privacy protection; ELECTRICITY; DEMAND; ENERGY; USAGE;
D O I
10.1109/TSG.2023.3238029
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Demand response (DR) is a demand reduction or shift of electricity use by customers to make electricity systems flexible and reliable, which is beneficial under increasing shares of intermittent renewable energy. For residential loads, thermostatically controlled loads (TCLs) are considered as major DR resources. In a price-based DR program, an aggregation agent, such as a retailer, formulates price signals to stimulate the customers to change electricity usage patterns. The conventional DR management methods fully rely on mathematical models to describe the customer ’s price responsiveness. However, it is difficult to fully master the customers ’ detailed demand elasticities, cost functions, and utility functions in practice. Hence, in this paper, we proposed a data-driven non-intrusive load monitoring (NILM) approach to study the customers ’ power consumption behaviors and usage characteristics. Based on NILM, the DR potential of the TCLs can be properly estimated, which assists the retailer in formulating a proper pricing strategy. To realize privacy protection, a privacy-preserving NILM algorithm is proposed. The proposed methodologies are verified in case studies. It is concluded that the proposed NILM algorithm not only reaches a better prediction performance than state-of-art works but also can protect privacy by slightly sacrificing accuracy. The DR pricing strategy with NILM integrated brings more profit and lower risks to the retailer, whose results are close to the fully model-based method with strong assumptions. Furthermore, a NILM algorithm with higher performance can help the retailer earn more benefits and help the grids better realize DR requirements.
引用
收藏
页码:3401 / 3412
页数:12
相关论文
共 50 条
  • [31] Privacy-preserving attribute-based access control for grid computing
    Park, Sang M.
    Chung, Soon M.
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2014, 5 (04) : 286 - 296
  • [32] SocialGuard: An adversarial example based privacy-preserving technique for social images
    Xue, Mingfu
    Sun, Shichang
    Wu, Zhiyu
    He, Can
    Wang, Jian
    Liu, Weiqiang
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [33] A Privacy-preserving Computation Offloading Method Based on k-Anonymity
    Zhao Xing
    Peng Jianhua
    You Wei
    Chen Lu
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (04) : 892 - 899
  • [34] Fully Homomorphic based Privacy-Preserving Distributed Expectation Maximization on Cloud
    Alabdulatif, Abdulatif
    Khalil, Ibrahim
    Zomaya, Albert Y.
    Tari, Zahir
    Yi, Xun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2020, 31 (11) : 2668 - 2681
  • [35] Lightweight fog based solution for privacy-preserving in IoT using blockchain
    Alkhazaali, Ali Haleem
    Ata, Oguz
    2ND INTERNATIONAL CONGRESS ON HUMAN-COMPUTER INTERACTION, OPTIMIZATION AND ROBOTIC APPLICATIONS (HORA 2020), 2020, : 83 - 92
  • [36] A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid
    Li, Kunchang
    Yang, Yifan
    Wang, Shuhao
    Shi, Runhua
    Li, Jianbin
    COMPUTERS & SECURITY, 2021, 103
  • [37] A Privacy-Preserving Scheme Based on Fragments Storage and Fragments Recombination in CCN
    Li, Ting
    Liang, Jie
    Geng, Liru
    Liu, Yinlong
    2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2019, : 794 - 799
  • [38] BMIF: Privacy-preserving Blockchain-based Medical Image Fusion
    Xiang, Tao
    Zeng, Honghong
    Chen, Biwen
    Guo, Shangwei
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2023, 19 (01)
  • [39] PPNS: A Privacy-Preserving Node Selection Scheme in Crowdsensing Based on Blockchain
    An, Jian
    Wang, Zhenxing
    He, Xin
    Gui, Xiaolin
    PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, : 428 - 433
  • [40] PLI-Assess: A Behavior Profile-Based Approach for Privacy-Preserving Log Assessment
    Wang, Geng
    Fang, Huan
    IEEE ACCESS, 2023, 11 : 133160 - 133173