Privacy input design for concealing transient output of linear SISO systems

被引:0
作者
Sato, Kazuhiro [1 ]
Azuma, Shun-ichi [2 ]
机构
[1] Kitami Inst Technol, Sch Reg Innovat & Social Design Engn, Kitami, Hokkaido 0908507, Japan
[2] Nagoya Univ, Grad Sch Engn, Chikusa Ku, Furo Cho, Nagoya, Aichi 4648603, Japan
来源
2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC) | 2017年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to conceal the output information of a given linear SISO system, this paper considers a design problem of an artificial noise called privacy input, which is added to the output. To measure the confidential level of the output, we use the mutual information between the output and the concealed output. We then formulate a problem of designing a privacy input and a feedback gain such that a given linear SISO system is mean square asymptotically stable and satisfies a desired confidential level of the output. The solution is a generalization of our previous study. Numerical experiments demonstrate that the result is useful for concealing the transient output information.
引用
收藏
页数:6
相关论文
共 16 条
[1]  
[Anonymous], 2001, Probability, Random Variables and Stochastic Processes
[2]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[3]  
Fang S., 2016, INTEGRATING CONTROL
[4]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[5]   Differentially Private Distributed Constrained Optimization [J].
Han, Shuo ;
Topcu, Ufuk ;
Pappas, George J. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (01) :50-64
[6]   Differentially Private Filtering [J].
Le Ny, Jerome ;
Pappas, George J. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (02) :341-354
[7]  
Lee EA, 2008, ISORC 2008: 11TH IEEE SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING - PROCEEDINGS, P363, DOI 10.1109/ISORC.2008.25
[8]  
Mo YL, 2014, IEEE DECIS CONTR P, P2154, DOI 10.1109/CDC.2014.7039717
[9]   Tutorial on maximum likelihood estimation [J].
Myung, IJ .
JOURNAL OF MATHEMATICAL PSYCHOLOGY, 2003, 47 (01) :90-100
[10]   Attack Detection and Identification in Cyber-Physical Systems [J].
Pasqualetti, Fabio ;
Doerfler, Florian ;
Bullo, Francesco .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2013, 58 (11) :2715-2729