Per-se Privacy Preserving Distributed Optimization
نویسندگان
چکیده
Distributed optimization is a fundamental mathematical theory for parallel and distributed systems. Several applications are normally designed based on such a theory, where parties cooperatively exchange messages with little or no central coordination to achieve some goals. In many situations, the transactions among the parties must be private, such as among members of social networks, hospitals, companies in a free market, banks, and state governments, to mention a few. Existing privacy preserving solution methods for optimization problems are mostly based on cryptographic procedures and thus have the drawback substantial computational complexity, which is infeasible for large scale networks. The availability of distributed optimization solution methods that are private per se are therefore highly desirable and sometimes the only ones viable. Surprisingly, little attention has been devoted thus far to the development of a general theory for such privacy preserving distributed optimization. In this survey paper, a new general framework of existing transformation based mechanisms for privacy preserving distributed optimization is presented. The privacy preserving properties that are inherent in the classical decomposition techniques, such as primal decomposition, dual decomposition and stateof-the-art methods, such as alternating direction method of multipliers are investigated. A number of examples is provided to illustrate the need of a new theory of per-se privacy preserving optimization. It is concluded that the theory is still in its infancy and that huge benefits can be achieved by a substantial development.
منابع مشابه
A privacy-preserving algorithm for distributed constraint optimization
Distributed constraint optimization problems enable the representation of many combinatorial problems that are distributed by nature. An important motivation for such problems is to preserve the privacy of the participating agents during the solving process. The present paper introduces a novel privacy-preserving algorithm for this purpose. The proposed algorithm requires a secure solution of s...
متن کاملMulti-objective optimization based privacy preserving distributed data mining in Peer-to-Peer networks
This paper proposes a scalable, local privacy-preserving algorithm for distributed peer-to-peer (P2P) data aggregation useful for many advanced data mining/analysis tasks such as average/sum computation, decision tree induction, feature selection, and more. Unlike most multi-party privacy-preserving data mining algorithms, this approach works in an asynchronous manner through local interactions...
متن کاملP-SyncBB: A Privacy Preserving Branch and Bound DCOP Algorithm
Distributed constraint optimization problems enable the representation of many combinatorial problems that are distributed by nature. An important motivation for such problems is to preserve the privacy of the participating agents during the solving process. The present paper introduces a novel privacy-preserving branch and bound algorithm for this purpose. The proposed algorithm, P-SyncBB, pre...
متن کاملPrivLogit: Efficient Privacy-preserving Logistic Regression by Tailoring Numerical Optimizers
Safeguarding privacy in machine learning is highly desirable, especially in collaborative studies across many organizations. Privacy-preserving distributed machine learning (based on cryptography) is popular to solve the problem. However, existing cryptographic protocols still incur excess computational overhead. Here, we make a novel observation that this is partially due to naive adoption of ...
متن کاملPrivacy Preservation in Distributed Subgradient Optimization Algorithms
In this paper, some privacy-preserving features for distributed subgradient optimization algorithms are considered. Most of the existing distributed algorithms focus mainly on the algorithm design and convergence analysis, but not the protection of agents' privacy. Privacy is becoming an increasingly important issue in applications involving sensitive information. In this paper, we first show t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1210.3283 شماره
صفحات -
تاریخ انتشار 2012