Customer-Centered Pricing Strategy Based on Privacy-Preserving Load Disaggregation

被引:3
|
作者
Tao, Yuechuan [1 ]
Qiu, Jing [1 ]
Lai, Shuying [1 ]
Sun, Xianzhuo [1 ]
Ma, Yuan [1 ]
Zhao, Junhua [2 ,3 ]
机构
[1] Univ Sydney, Sch Elect & Informat Engn, Sydney, NSW 2006, Australia
[2] Chinese Univ Hong Kong Shenzhen, Sch Sci & Engn, Shenzhen 518100, Peoples R China
[3] Chinese Univ Hong Kong Shenzhen, Shenzhen Inst Artificial Intelligence & Robot Soc, Shenzhen 518100, Peoples R China
基金
中国国家自然科学基金; 澳大利亚研究理事会;
关键词
Signal processing algorithms; Pricing; Prediction algorithms; Power demand; Elasticity; Behavioral sciences; Smart meters; Demand response potential; pricing strategy; thermostatically controlled loads; non-intrusive load monitoring; privacy protection; ELECTRICITY; DEMAND; ENERGY; USAGE;
D O I
10.1109/TSG.2023.3238029
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Demand response (DR) is a demand reduction or shift of electricity use by customers to make electricity systems flexible and reliable, which is beneficial under increasing shares of intermittent renewable energy. For residential loads, thermostatically controlled loads (TCLs) are considered as major DR resources. In a price-based DR program, an aggregation agent, such as a retailer, formulates price signals to stimulate the customers to change electricity usage patterns. The conventional DR management methods fully rely on mathematical models to describe the customer ’s price responsiveness. However, it is difficult to fully master the customers ’ detailed demand elasticities, cost functions, and utility functions in practice. Hence, in this paper, we proposed a data-driven non-intrusive load monitoring (NILM) approach to study the customers ’ power consumption behaviors and usage characteristics. Based on NILM, the DR potential of the TCLs can be properly estimated, which assists the retailer in formulating a proper pricing strategy. To realize privacy protection, a privacy-preserving NILM algorithm is proposed. The proposed methodologies are verified in case studies. It is concluded that the proposed NILM algorithm not only reaches a better prediction performance than state-of-art works but also can protect privacy by slightly sacrificing accuracy. The DR pricing strategy with NILM integrated brings more profit and lower risks to the retailer, whose results are close to the fully model-based method with strong assumptions. Furthermore, a NILM algorithm with higher performance can help the retailer earn more benefits and help the grids better realize DR requirements.
引用
收藏
页码:3401 / 3412
页数:12
相关论文
共 50 条
  • [31] Blockchain-based Networking Strategy for Privacy-Preserving Demand Side Management
    Abouyoussef, Mahmoud
    Ismail, Muhammad
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [32] Enhancing frequent location privacy-preserving strategy based on geo-Indistinguishability
    Luo, Huiwen
    Zhang, Haoming
    Long, Shigong
    Lin, Yi
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (14) : 21823 - 21841
  • [33] Dynamic Pricing for Privacy-Preserving Mobile Crowdsensing: A Reinforcement Learning Approach
    Mang, Mengyuan
    Chen, Jiming
    Yang, Lei
    Zhang, Junshan
    [J]. IEEE NETWORK, 2019, 33 (02): : 160 - 165
  • [34] Load Balancing for Privacy-Preserving Access to Big Data in Cloud
    Li, Peng
    Guo, Song
    [J]. 2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 524 - 528
  • [35] A Lightweight and Privacy-Preserving Data Aggregation for Dynamic Pricing-based Billing in Smart Grids
    Gope, Prosanta
    Sikdar, Biplab
    [J]. 2018 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE EUROPE (ISGT-EUROPE), 2018,
  • [36] ADMM Based Privacy-Preserving Decentralized Optimization
    Zhang, Chunlei
    Ahmad, Muaz
    Wang, Yongqiang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (03) : 565 - 580
  • [37] A Cash Flow Blockchain Based Privacy-Preserving
    Zhai, Xiaojun
    Zhang, Chongyang
    [J]. PROCEEDINGS OF 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2018, : 809 - 813
  • [38] Privacy-preserving Techniques for Proximity Based LBS
    Freni, Dario
    [J]. MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, : 387 - 388
  • [39] Privacy-preserving Density-based Clustering
    Bozdemir, Beyza
    Canard, Sebastien
    Ermis, Orhan
    Moellering, Helen
    Onen, Melek
    Schneider, Thomas
    [J]. ASIA CCS'21: PROCEEDINGS OF THE 2021 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 658 - 671
  • [40] Privacy-preserving photo sharing based on blockchain
    Pfister, Pablo
    Ebrahimi, Touradj
    [J]. APPLICATIONS OF DIGITAL IMAGE PROCESSING XLIII, 2020, 11510