On Privacy of Dynamical Systems: An Optimal Probabilistic Mapping Approach
نویسندگان
چکیده
We address the problem of maximizing privacy stochastic dynamical systems whose state information is released through quantized sensor data. In particular, we consider setting where about system obtained using noisy measurements. This data and transmitted to a (possibly untrustworthy) remote station public/unsecured communication network. aim at keeping (part of) private; however, because network (and/or station) might be unsecure, adversaries have access data, which can used estimate state. To prevent such from obtaining an accurate estimate, before transmission, randomize additive random vectors, send corrupted instead. design joint probability distribution these vectors (over time window) minimize mutual (our metric) between some linear function (a desired private output) randomized for level distortion-how different measurements distorted are allowed be. pose synthesising as convex program subject constraints. Simulation experiments presented illustrate our scheme.
منابع مشابه
observational dynamical systems
چکیده در این پایاننامه ابتدا فضاهای متریک فازی را به صورت مشاهدهگرایانه بررسی میکنیم. فضاهای متریک فازی و توپولوژی تولید شده توسط این متریک معرفی شدهاند. سپس بر اساس فضاهایی که در فصل اول معرفی شدهاند آشوب توپولوژیکی، مینیمالیتی و مجموعههای متقاطع در شیوههای مختلف بررسی شده- اند. در فصل سوم مفهوم مجموعههای جاذب فازی به عنوان یک مفهوم پایهای در سیستمهای نیم-دینامیکی نسبی، تعریف شده است. ...
15 صفحه اولjordan c-dynamical systems
in the first chapter we study the necessary background of structure of commutators of operators and show what the commutator of two operators on a separable hilbert space looks like. in the second chapter we study basic property of jb and jb-algebras, jc and jc-algebras. the purpose of this chapter is to describe derivations of reversible jc-algebras in term of derivations of b (h) which are we...
15 صفحه اولAn optimal probabilistic solution for information confinement, privacy, and security in RFID systems
In this paper, we provide the following contributions to enhance the security of RFID based systems. First, we assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, we devise a technique to make RFID identification server dependent, providing a different unique secret key shared by a tag and a server. The so...
متن کاملFuzzy cell mapping on dynamical systems
Fuzzy cell mapping is a novel computational technique that combines fuzzy logic and a simple cell mapping method. In a simple cell mapping method, the information about mapping locations of image cells is never incorporated into the method. This limits the usage of a simple cell mapping method. In our fuzzy cell mapping method, we account for the mapping locations of image cells and incorporate...
متن کاملDifferential Privacy for Probabilistic Systems
Differential privacy is a promising approach to privacy-preserving data analysis. There is now a well-developed theory of differentially private functions. Despite recent work on implementing database systems that aim to provide differential privacy and distributed systems that use differential privacy as a basis for higher level security properties, there is no formal theory of differential pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2021
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2021.3055022