Customer-Centered Pricing Strategy Based on Privacy-Preserving Load Disaggregation

被引:5
作者
Tao, Yuechuan [1 ]
Qiu, Jing [1 ]
Lai, Shuying [1 ]
Sun, Xianzhuo [1 ]
Ma, Yuan [1 ]
Zhao, Junhua [2 ,3 ]
机构
[1] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
[2] Chinese Univ Hong Kong Shenzhen, Sch Sci & Engn, Shenzhen 518100, Peoples R China
[3] Chinese Univ Hong Kong Shenzhen, Shenzhen Inst Artificial Intelligence & Robot Soc, Shenzhen 518100, Peoples R China
基金
澳大利亚研究理事会; 中国国家自然科学基金;
关键词
Signal processing algorithms; Pricing; Prediction algorithms; Power demand; Elasticity; Behavioral sciences; Smart meters; Demand response potential; pricing strategy; thermostatically controlled loads; non-intrusive load monitoring; privacy protection; ELECTRICITY; DEMAND; ENERGY; USAGE;
D O I
10.1109/TSG.2023.3238029
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Demand response (DR) is a demand reduction or shift of electricity use by customers to make electricity systems flexible and reliable, which is beneficial under increasing shares of intermittent renewable energy. For residential loads, thermostatically controlled loads (TCLs) are considered as major DR resources. In a price-based DR program, an aggregation agent, such as a retailer, formulates price signals to stimulate the customers to change electricity usage patterns. The conventional DR management methods fully rely on mathematical models to describe the customer ’s price responsiveness. However, it is difficult to fully master the customers ’ detailed demand elasticities, cost functions, and utility functions in practice. Hence, in this paper, we proposed a data-driven non-intrusive load monitoring (NILM) approach to study the customers ’ power consumption behaviors and usage characteristics. Based on NILM, the DR potential of the TCLs can be properly estimated, which assists the retailer in formulating a proper pricing strategy. To realize privacy protection, a privacy-preserving NILM algorithm is proposed. The proposed methodologies are verified in case studies. It is concluded that the proposed NILM algorithm not only reaches a better prediction performance than state-of-art works but also can protect privacy by slightly sacrificing accuracy. The DR pricing strategy with NILM integrated brings more profit and lower risks to the retailer, whose results are close to the fully model-based method with strong assumptions. Furthermore, a NILM algorithm with higher performance can help the retailer earn more benefits and help the grids better realize DR requirements.
引用
收藏
页码:3401 / 3412
页数:12
相关论文
共 50 条
  • [41] An Efficient and Secure Privacy-Preserving Federated Learning Framework Based on Multiplicative Double Privacy Masking
    Shen, Cong
    Zhang, Wei
    Zhou, Tanping
    Zhang, Yiming
    Zhang, Lingling
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (03): : 4729 - 4748
  • [42] Efficient Privacy-Preserving Electricity Theft Detection With Dynamic Billing and Load Monitoring for AMI Networks
    Ibrahem, Mohamed I.
    Nabil, Mahmoud
    Fouda, Mostafa M.
    Mahmoud, Mohamed M. E. A.
    Alasmary, Waleed
    Alsolami, Fawaz
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02): : 1243 - 1258
  • [43] A privacy-preserving logistic regression-based diagnosis scheme for digital healthcare
    Zhou, Yousheng
    Song, Liyuan
    Liu, Yuanni
    Vijayakumar, Pandi
    Gupta, Brij B.
    Alhalabi, Wadee
    Alsharif, Hind
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 144 : 63 - 73
  • [44] Privacy-preserving federated learning based on partial low-quality data
    Wang, Huiyong
    Wang, Qi
    Ding, Yong
    Tang, Shijie
    Wang, Yujue
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [45] A blockchain-based scheme for privacy-preserving and secure sharing of medical data
    Huang, Haiping
    Zhu, Peng
    Xiao, Fu
    Sun, Xiang
    Huang, Qinglong
    [J]. COMPUTERS & SECURITY, 2020, 99
  • [46] A novel privacy-preserving matrix factorization recommendation system based on random perturbation
    Hu Zhaoyan
    Luo Yonglong
    Zheng Xiaoyao
    Zhao Yannian
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (04) : 4525 - 4535
  • [47] Efficient privacy-preserving online medical pre-diagnosis based on blockchain
    Zhou, Sufang
    Fan, Jianing
    Yuan, Ke
    Du, Xiaoyu
    Jia, Chunfu
    [J]. JOURNAL OF SUPERCOMPUTING, 2025, 81 (01)
  • [48] Privacy-Preserving Retrieval Scheme Over Medical Images Based on Vision Transformer
    Du, Ruizhong
    Wang, Yifan
    Li, Mingyue
    Shang, Tao
    [J]. ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT VIII, ICIC 2024, 2024, 14869 : 403 - 415
  • [49] A Blockchain-based Privacy-Preserving Mechanism with Aggregator as Common Communication Point
    Yahaya, Adamu Sani
    Javaid, Nadeem
    Khalid, Rabiya
    Imran, Muhammad
    Guizani, Mohsen
    [J]. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
  • [50] Privacy-preserving federated learning based on multi-key homomorphic encryption
    Ma, Jing
    Naas, Si-Ahmed
    Sigg, Stephan
    Lyu, Xixiang
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (09) : 5880 - 5901