On the Security of Distributed Multi-Agent K-Means Clustering With Local Differential Privacy

被引:0
作者
Shi, Congcong [1 ]
Huang, Xiuli [1 ]
Yu, Pengfei [1 ]
机构
[1] State Grid Smart Grid Res Inst Co ltd, State Grid Lab Power Cyber Security Protect & Moni, Nanjing 210003, Peoples R China
关键词
Servers; Privacy; Vectors; Clustering algorithms; Security; Distributed databases; Proposals; Multi-agent systems; Differential privacy; distributed k-means; local differential privacy; security problem; ESTIMATION MECHANISM;
D O I
10.1109/ACCESS.2024.3454823
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a distributed scenario, the process of multiple agents collaborating and interacting with the server to iteratively implement k-means clustering analysis can be easily exploited by attackers, posing a huge privacy threat. Therefore, a local differential privacy k-means method (LDPKmeans) was proposed, which can effectively address the privacy protection problem in multi-agent systems. In this paper, we propose an effective attack method based on multi-agent model, which shows that the basic proposal of LDPKmeans will leak the real information of user agents if the attacker only obtains the cluster information and cluster centroid of each user. Furthermore, we enhance the attack method to crack the improved LDPKmeans method with privacy enhancement, enabling us to infer the cluster information of each user agent in the server. In other words, LDPKmeans seriously leak user agent privacy in distributed multi-agent systems if the server is untrusted. Theoretical analysis and experiments evaluate the effectiveness of our attack scheme. The results show that our method can effectively attack the distributed LDPKmeans scheme compared with the state-of-the-art attack methods. Specifically, our attack method can reduce the average relative error of inferring the true value before k-menas convergence on the 3D Road Network and Shuttle datasets by about 54% and 75% respectively when k=5.
引用
收藏
页码:124751 / 124763
页数:13
相关论文
共 37 条
[1]   Privacy Preserving Approximate K-means Clustering [J].
Biswas, Chandan ;
Ganguly, Debasis ;
Roy, Dwaipayan ;
Bhattacharya, Ujjwal .
PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19), 2019, :1321-1330
[2]  
Blum A., 2005, P 24 ACM SIGMOD SIGA, P128, DOI 10.1145/1065167.1065184
[3]  
Bunn P, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P486
[4]   Compressive learning with privacy guarantees [J].
Chatalic, A. ;
Schellekens, V ;
Houssiau, F. ;
de Montjoye, Y. A. ;
Jacques, L. ;
Gribonval, R. .
INFORMATION AND INFERENCE-A JOURNAL OF THE IMA, 2022, 11 (01) :251-305
[5]   The Algorithmic Foundations of Differential Privacy [J].
Dwork, Cynthia ;
Roth, Aaron .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4) :211-406
[6]   Resilient consensus for multi-agent systems subject to differential privacy requirements [J].
Fiore, Davide ;
Russo, Giovanni .
AUTOMATICA, 2019, 106 :18-26
[7]  
Foner L. N., 1996, ICMAS-96 Proceedings. Second International Conference on Multi-Agent Systems, P80
[8]   Private bipartite consensus control for multi-agent systems: A hierarchical differential privacy scheme [J].
Gao, Chen ;
Zhao, Di ;
Li, Jiahui ;
Lin, Hong .
INFORMATION FUSION, 2024, 105
[9]  
Ghazi B, 2023, AAAI CONF ARTIF INTE, P7696
[10]  
Goldreich O., 2009, Basic Applications, V2