Enabling Data Exchange in Interactive State Estimation under Privacy Constraints
نویسندگان
چکیده
Data collecting agents in large networks, such as the electric power system, need to share information (measurements) for estimating the system state in a distributed manner. However, privacy concerns may limit or prevent this exchange leading to a tradeoff between state estimation fidelity and privacy (referred to as competitive privacy). This paper builds upon a recent information-theoretic result (using mutual information to measure privacy and mean-squared error to measure fidelity) that quantifies the region of achievable distortion-leakage tuples in a two-agent network. The objective of this paper is to study centralized and decentralized mechanisms that can enable and sustain non-trivial data exchanges among the agents. A centralized mechanism determines the data sharing policies that optimize a network-wide objective function combining the fidelities and leakages at both agents. Using common-goal games and best-response analysis, the optimal policies allow for distributed implementation. In contrast, in the decentralized setting, repeated discounted games are shown to naturally enable data exchange without any central control nor economic incentives. The effect of repetition is modeled by a time-averaged payoff function at each agent which combines its fidelity and leakage at each interaction stage. For both approaches, it is shown that non-trivial data exchange can be sustained for specific fidelity ranges even when privacy is a limiting factor.
منابع مشابه
Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملPreserving Data-Privacy with Added Noises: Optimal Estimation and Privacy Analysis
Networked systems often relies on distributed algorithms to achieve a global computation goal with iterative local information exchanges between neighbor nodes. To preserve data privacy, a node may add a random noise to its original data for information exchange at each iteration. Nevertheless, a neighbor node can estimate other’s original data based on the information it received. The estimati...
متن کاملCollect at Once, Use Effectively: Making Non-interactive Locally Private Learning Possible
Non-interactive Local Differential Privacy (LDP) requires data analysts to collect data from users through noisy channel at once. In this paper, we extend the frontiers of Non-interactive LDP learning and estimation from several aspects. For learning with smooth generalized linear losses, we propose an approximate stochastic gradient oracle estimated from non-interactive LDP channel using Cheby...
متن کاملCommunication Efficient, Sample Optimal, Linear Time Locally Private Discrete Distribution Estimation
We consider discrete distribution estimation over k elements under ε-local differential privacy from n samples. The samples are distributed across users who send privatized versions of their sample to the server. All previously known sample optimal algorithms require linear (in k) communication complexity in the high privacy regime (ε < 1), and have a running time that grows as n · k, which can...
متن کاملLocal Privacy, Data Processing Inequalities, and Statistical Minimax Rates
Working under a model of privacy in which data remains private even from the statistician, we study the tradeoff between privacy guarantees and the utility of the resulting statistical estimators. We prove bounds on information-theoretic quantities, including mutual information and Kullback-Leibler divergence, that depend on the privacy guarantees. When combined with standard minimax techniques...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1411.2498 شماره
صفحات -
تاریخ انتشار 2014