Privacy preserving distributed optimization using homomorphic encryption

被引:138
作者
Lu, Yang [1 ]
Zhu, Minghui [1 ]
机构
[1] Penn State Univ, Sch Elect Engn & Comp Sci, 201 Old Main, University Pk, PA 16802 USA
关键词
Distributed optimization; Privacy; Homomorphic encryption; FLOW; INFERENCE; SECURE;
D O I
10.1016/j.automatica.2018.07.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies how a system operator and a set of agents securely execute a distributed projected gradient-based algorithm. In particular, each participant holds a set of problem coefficients and/or states whose values are private to the data owner. The concerned problem raises two questions: how to securely compute given functions; and which functions should be computed in the first place. For the first question, by using the techniques of homomorphic encryption, we propose novel algorithms which can achieve secure multiparty computation with perfect correctness. For the second question, we identify a class of functions which can be securely computed. The correctness and computational efficiency of the proposed algorithms are verified by two case studies of power systems, one on a demand response problem and the other on an optimal power flow problem. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:314 / 325
页数:12
相关论文
共 60 条
[1]  
[Anonymous], 1997, Appl. Math.
[2]  
[Anonymous], 2007, Finite-dimensional variational inequalities and complementarity problems
[3]  
[Anonymous], 2015, Parallel and Distributed Computation: Numerical Methods
[4]  
Bertsekas DP., 2009, CONVEX OPTIMIZATION
[5]  
Bhaskar R, 2011, LECT NOTES COMPUT SC, V7073, P215, DOI 10.1007/978-3-642-25385-0_12
[6]  
Borden A. R., 2013, 51 ANN ALL C, V102, P1
[7]  
Borden AR, 2012, ANN ALLERTON CONF, P1300, DOI 10.1109/Allerton.2012.6483368
[8]   Secure databases: Constraints, inference channels, and monitoring disclosures [J].
Brodsky, A ;
Farkas, C ;
Jajodia, S .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2000, 12 (06) :900-919
[9]  
Bull F., 2009, DISTRIBUTED CONTROL
[10]   Layering as optimization decomposition: A mathematical theory of network architectures [J].
Chiang, Mung ;
Low, Steven H. ;
Calderbank, A. Robert ;
Doyle, John C. .
PROCEEDINGS OF THE IEEE, 2007, 95 (01) :255-312