Differentially Private Anomaly Detection for Interconnected Systems

Riccardo M.G. Ferrari*, Kwassi H. Degue, Jerome Le Ny

*Corresponding author for this work

Research output: Chapter in Book/Conference proceedings/Edited volumeChapterScientific

Abstract

Detecting anomalies in large-scale distributed systems, such as cyber-attacks launched against intelligent transportation systems and other critical infrastructures, or epidemics spreading in human populations, requires the collection and processing of privacy-sensitive data from individuals, such as location traces or medical records. Differential privacy is a powerful theoretical tool that by applying so-called randomized mechanisms to individual data, allows to do meaningful computations at the population level whose results are insensitive, in a probabilistic sense, to the data of any given individual. So far, differential privacy has been applied to several control problems, such as distributed optimization and estimation, filtering and anomaly detection. Still, several issues are open, regarding the balance between the accuracy of the computation results and the guaranteed privacy level for the individuals, as well as the dependence of this balance on the type of randomized mechanism used and on where, in the data acquisition and processing pipeline, the noise is applied. In this chapter, we explore the possibility of using differentially private mechanisms to develop fault-detection algorithms with privacy guarantees and discuss the resulting trade-offs between detection performance and privacy level.

Original languageEnglish
Title of host publicationSafety, Security and Privacy for Cyber-Physical Systems
EditorsRiccardo M.G. Ferrari, André M.H. Teixeira
PublisherSpringer
Pages203-230
ISBN (Electronic)978-3-030-65048-3
ISBN (Print)978-3-030-65047-6
DOIs
Publication statusPublished - 2021

Publication series

NameLecture Notes in Control and Information Sciences
Volume486
ISSN (Print)0170-8643
ISSN (Electronic)1610-7411

Fingerprint

Dive into the research topics of 'Differentially Private Anomaly Detection for Interconnected Systems'. Together they form a unique fingerprint.

Cite this