Convex optimization-based Privacy-Preserving Distributed Least Squares via Subspace Perturbation

被引:0
作者
Li, Qiongxiu [1 ]
Heusdens, Richard [2 ,3 ]
Christensen, Mads Graesboll [1 ]
机构
[1] Aalborg Univ, CREATE, Audio Anal Lab, Aalborg, Denmark
[2] Delft Univ Technol, Circuits & Syst Grp, Delft, Netherlands
[3] Netherlands Def Acad, The Hague, Netherlands
来源
28TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2020) | 2021年
关键词
Distributed least squares; subspace; privacy; noise perturbation; convex optimization;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
Over the past decades, privacy-preservation has received considerable attention, not only as a consequence of regulations such as the General Data Protection Regulation in the EU, but also from the fact that people are more concerned about data abuse as the world is becoming increasingly digitized. In this paper we propose a convex optimization-based subspace perturbation approach to solve privacy-preserving distributed least squares problems. Based on the primal-dual method of multipliers, the introduced dual variables will only converge in a subspace determined by the graph topology and do not converge in its orthogonal complement. We, therefore, propose to exploit this property for privacy-preservation by using the non-converging part of the dual variables to perturb the private data, thereby protecting it from being revealed. Moreover, we prove that the proposed approach is secure under both eavesdropping and passive adversaries. Computer simulations are conducted to demonstrate the benefits of the proposed approach through its convergence properties and accuracy.
引用
收藏
页码:2110 / 2114
页数:5
相关论文
共 16 条
[1]  
[Anonymous], 2012, ELEMENTS INFORM THEO
[2]   Privacy-preserving ridge regression on distributed data [J].
Chen, Yi-Ruei ;
Rezapour, Amir ;
Tzeng, Wen-Guey .
INFORMATION SCIENCES, 2018, 451 :34-49
[3]   Random geometric graphs [J].
Dall, J ;
Christensen, M .
PHYSICAL REVIEW E, 2002, 66 (01)
[4]  
Damgård I, 2012, LECT NOTES COMPUT SC, V7417, P643
[5]  
Degue KH, 2017, IEEE GLOB CONF SIG, P487, DOI 10.1109/GlobalSIP.2017.8308690
[6]   PERFECTLY SECURE MESSAGE TRANSMISSION [J].
DOLEV, D ;
DWORK, C ;
WAARTS, O ;
YUNG, M .
JOURNAL OF THE ACM, 1993, 40 (01) :17-47
[7]  
Dwork C, 2009, ACM S THEORY COMPUT, P371
[8]  
Gascon A., P PRIV ENH TECHN, P345
[9]  
Giacomelli Irene, 2018, Applied Cryptography and Network Security. 16th International Conference, ACNS 2018. Proceedings: LNCS 10892, P243, DOI 10.1007/978-3-319-93387-0_13
[10]   Privacy-Aware Smart Metering Progress and challenges [J].
Giaconi, Giulio ;
Gunduz, Deniz ;
Poor, H. Vincent .
IEEE SIGNAL PROCESSING MAGAZINE, 2018, 35 (06) :59-78