Differential privacy for symbolic systems with application to Markov Chains

被引:11
作者
Chen, Bo [1 ]
Leahy, Kevin [2 ]
Jones, Austin [2 ,3 ]
Hale, Matthew [1 ]
机构
[1] Univ Florida, Dept Mech & Aerosp Engn, Gainesville, FL 32611 USA
[2] MIT, Lincoln Lab, Lexington, MA USA
[3] Arbor Biotechnol, Cambridge, MA USA
关键词
Differential privacy; Symbolic systems; Markov chains;
D O I
10.1016/j.automatica.2023.110908
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data-driven systems are gathering increasing amounts of data from users, and sensitive user data requires privacy protections. In some cases, the data gathered is non-numerical or symbolic, and conventional approaches to privacy, e.g., adding noise, do not apply, though such systems still require privacy protections. Accordingly, we present a novel differential privacy framework for protecting trajectories generated by symbolic systems. These trajectories can be represented as words or strings over a finite alphabet. We develop new differential privacy mechanisms that approximate a sensitive word using a random word that is likely to be near it. An offline mechanism is implemented efficiently using a Modified Hamming Distance Automaton to generate whole privatized output words over a finite time horizon. Then, an online mechanism is implemented by taking in a sensitive symbol and generating a randomized output symbol at each timestep. This work is extended to Markov chains to generate differentially private state sequences that a given Markov chain could have produced. Statistical accuracy bounds are developed to quantify the accuracy of these mechanisms, and numerical results validate the accuracy of these techniques for strings of English words.(c) 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:13
相关论文
共 53 条
  • [1] Akkaya K, 2015, IEEE WIREL COMMUNN, P58, DOI 10.1109/WCNCW.2015.7122529
  • [2] Optimization of hybrid systems
    Barton, Paul I.
    Lee, Cha Kun
    Yunt, Mehmet
    [J]. COMPUTERS & CHEMICAL ENGINEERING, 2006, 30 (10-12) : 1576 - 1589
  • [3] Symbolic planning and control of robot motion - Finding the missing pieces of current methods and ideas
    Belta, Calin
    Bicchi, Antonio
    Egerstedt, Magnus
    Frazzoli, Emilio
    Klavins, Eric
    Pappas, George J.
    [J]. IEEE ROBOTICS & AUTOMATION MAGAZINE, 2007, 14 (01) : 61 - 70
  • [4] A better bound on the variance
    Bhatia, R
    Davis, C
    [J]. AMERICAN MATHEMATICAL MONTHLY, 2000, 107 (04) : 353 - 357
  • [5] Bloom C, 2017, PROCEEDINGS OF THIRTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2017), P357
  • [6] Cortes J, 2016, IEEE DECIS CONTR P, P4252, DOI 10.1109/CDC.2016.7798915
  • [7] Home Appliance Management System for Monitoring Digitized Devices Using Cloud Computing Technology in Ubiquitous Sensor Network Environment
    Cui, Yun
    Kim, Myoungjin
    Gu, Yi
    Jung, Jong-jin
    Lee, Hanku
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [8] Differential privacy: A survey of results
    Dwork, Cynthia
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 : 1 - 19
  • [9] The Algorithmic Foundations of Differential Privacy
    Dwork, Cynthia
    Roth, Aaron
    [J]. FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4): : 211 - 406
  • [10] Hale MT, 2015, P AMER CONTR CONF, P1235, DOI 10.1109/ACC.2015.7170902