Privacy-Preserving Distributed Processing: Metrics, Bounds and Algorithms

Qiongxiu Li, Jaron Skovsted Gundersen, Richard Heusdens, Mads Græsbøll Christensen

Research output: Contribution to journalArticleScientificpeer-review

2 Downloads (Pure)

Abstract

Privacy-preserving distributed processing has recently attracted considerable attention. It aims to design solutions for conducting signal processing tasks over networks in a decentralized fashion without violating privacy. Many existing algorithms can be adopted to solve this problem such as differential privacy, secure multiparty computation, and the recently proposed distributed optimization based subspace perturbation algorithms. However, since each of them is derived from a different context and has different metrics and assumptions, it is hard to choose or design an appropriate algorithm in the context of distributed processing. In order to address this problem, we first propose general mutual information based information-theoretical metrics that are able to compare and relate these existing algorithms in terms of two key aspects: output utility and individual privacy. We consider two widely-used adversary models, the passive and eavesdropping adversary. Moreover, we derive a lower bound on individual privacy which helps to understand the nature of the problem and provides insights on which algorithm is preferred given different conditions. To validate the above claims, we investigate a concrete example and compare a number of state-of-the-art approaches in terms of the concerned aspects using not only theoretical analysis but also numerical validation. Finally, we discuss and provide principles for designing appropriate algorithms for different applications.

Original languageEnglish
Article number9316966
Pages (from-to)2090-2103
Number of pages14
JournalIEEE Transactions on Information Forensics and Security
Volume16
DOIs
Publication statusPublished - 2021

Keywords

  • consensus
  • differential privacy
  • Distributed databases
  • Distributed processing
  • Eavesdropping
  • information-theoretic
  • Measurement
  • Mutual information
  • privacy-utility metric
  • secure multiparty computation
  • Signal processing
  • Signal processing algorithms
  • subspace perturbation

Fingerprint Dive into the research topics of 'Privacy-Preserving Distributed Processing: Metrics, Bounds and Algorithms'. Together they form a unique fingerprint.

Cite this