ADMM Based Privacy-Preserving Decentralized Optimization

被引:142
作者
Zhang, Chunlei [1 ]
Ahmad, Muaz [1 ]
Wang, Yongqiang [1 ]
机构
[1] Clemson Univ, Dept Elect & Comp Engn, Clemson, SC 29634 USA
基金
美国国家科学基金会;
关键词
ADMM; privacy preservation; decentralized optimization; ALTERNATING DIRECTIONS METHOD; CONVERGENCE; PROJECTION; SECURE;
D O I
10.1109/TIFS.2018.2855169
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Privacy preservation is addressed for decentralized optimization, where N agents cooperatively minimize the sum of N convex functions private to these individual agents. In most existing decentralized optimization approaches, participating agents exchange and disclose states explicitly, which may not be desirable when the states contain sensitive information of individual agents. The problem is more acute when adversaries exist which try to steal information from other participating agents. To address this issue, we propose a privacy-preserving decentralized optimization approach based on alternating direction method of multipliers (ADMM) and partially homomorphic cryptography. To the best of our knowledge, this is the first time that cryptographic techniques are incorporated in a fully decentralized setting to enable privacy preservation in decentralized optimization in the absence of any third party or aggregator. To facilitate the incorporation of encryption in a fully decentralized manner, we introduce a new ADMM, which allows time-varying penalty matrices and rigorously prove that it has a convergence rate of O(1/t). Numerical and experimental results confirm the effectiveness and low-computational complexity of the proposed approach.
引用
收藏
页码:565 / 580
页数:16
相关论文
共 60 条
[1]   PrOLoc: Resilient Localization with Private Observers Using Partial Homomorphic Encryption [J].
Alanwar, Amr ;
Shoukry, Yasser ;
Chakraborty, Supriyo ;
Martin, Paul ;
Tabuada, Paulo ;
Srivastava, Mani .
2017 16TH ACM/IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS (IPSN), 2017, :41-52
[2]  
[Anonymous], 2017, PRIVATE LEARNING N 2
[3]  
[Anonymous], ADAPTIVE COMMUNICATI
[4]  
[Anonymous], FOUND TRENDS MACH LE
[5]  
[Anonymous], 2015, GLOBAL CONVERGENCE A
[6]  
[Anonymous], 2015, P 1 ACM WORKSHOP CYB
[7]  
[Anonymous], IEEE T CONTROL NETW
[8]  
[Anonymous], 1976, GRAPH THEORY APPL
[9]  
[Anonymous], 2009, FDN CRYPTOGRAPHY
[10]   2-POINT STEP SIZE GRADIENT METHODS [J].
BARZILAI, J ;
BORWEIN, JM .
IMA JOURNAL OF NUMERICAL ANALYSIS, 1988, 8 (01) :141-148