Privacy-Preserving Distributed Processing: Metrics, Bounds, and Algorithms
Autor: | Qiongxiu Li, Jaron Skovsted Gundersen, Mads Grasboll Christensen, Richard Heusdens |
---|---|
Rok vydání: | 2020 |
Předmět: |
Signal processing
Signal Processing (eess.SP) FOS: Computer and information sciences Distributed databases Computer Science - Cryptography and Security Computer Networks and Communications Computer science information-theoretic Distributed computing 0211 other engineering and technologies Context (language use) 02 engineering and technology Distributed processing subspace perturbation differential privacy FOS: Electrical engineering electronic engineering information engineering Differential privacy privacy-utility metric Electrical Engineering and Systems Science - Signal Processing Safety Risk Reliability and Quality Computer Science::Cryptography and Security 021110 strategic defence & security studies Measurement Distributed database Eavesdropping secure multiparty computation Adversary Mutual information consensus Secure multi-party computation Key (cryptography) Signal processing algorithms Algorithm Cryptography and Security (cs.CR) Adversary model |
Zdroj: | Li, Q, Gundersen, J S, Heusdens, R & Christensen, M G 2021, ' Privacy-Preserving Distributed Processing: Metrics, Bounds and Algorithms ', I E E E Transactions on Information Forensics and Security, vol. 16, 9316966, pp. 2090-2103 . https://doi.org/10.1109/TIFS.2021.3050064 IEEE Transactions on Information Forensics and Security, 16 |
ISSN: | 1556-6013 |
DOI: | 10.48550/arxiv.2009.01098 |
Popis: | Privacy-preserving distributed processing has recently attracted considerable attention. It aims to design solutions for conducting signal processing tasks over networks in a decentralized fashion without violating privacy. Many algorithms can be adopted to solve this problem such as differential privacy, secure multiparty computation, and the recently proposed distributed optimization based subspace perturbation. However, how these algorithms relate to each other is not fully explored yet. In this paper, we therefore first propose information-theoretic metrics based on mutual information. Using the proposed metrics, we are able to compare and relate a number of existing well-known algorithms. We then derive a lower bound on individual privacy that gives insights on the nature of the problem. To validate the above claims, we investigate a concrete example and compare a number of state-of-the-art approaches in terms of different aspects such as output utility, individual privacy and algorithm robustness against the number of corrupted parties, using not only theoretical analysis but also numerical validation. Finally, we discuss and provide principles for designing appropriate algorithms for different applications. Comment: 12 pages, 3 figures |
Databáze: | OpenAIRE |
Externí odkaz: |