2019 IEEE 58th Conference on Decision and Control (CDC) 2019
DOI: 10.1109/cdc40024.2019.9028969
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preservation in Distributed Optimization via Dual Decomposition and ADMM

Abstract: In this work, we explore distributed optimization problems, as they are often stated in energy and resource optimization. More precisely, we consider systems consisting of a number of subsystems that are solely connected through linear constraints on the optimized solutions. The focus is put on two approaches; namely dual decomposition and alternating direction method of multipliers (ADMM), and we are interested in the case where it is desired to keep information about subsystems secret. To this end, we propos… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…The eavesdropping adversary is assumed to attack the system by listening to the messages transmitted along the communication channels, i.e., edges. This model receives little attention as it can be addressed by assuming all communication channels are securely encrypted such that the transmitted messages cannot be eavesdropped, e.g., secret sharing based approaches [10], [11], [24]. However, this assumption is particularly expensive to realize in distributed optimization applications, as a large number of iterations is often required.…”
Section: B Adversary Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The eavesdropping adversary is assumed to attack the system by listening to the messages transmitted along the communication channels, i.e., edges. This model receives little attention as it can be addressed by assuming all communication channels are securely encrypted such that the transmitted messages cannot be eavesdropped, e.g., secret sharing based approaches [10], [11], [24]. However, this assumption is particularly expensive to realize in distributed optimization applications, as a large number of iterations is often required.…”
Section: B Adversary Modelmentioning
confidence: 99%
“…Additionally, it is hard to achieve differential privacy in practice. The second class is that of secret-sharing based distributed optimization approaches [10], [11] which deploy secret sharing to prevent privacy leakage, a technique used in secure multiparty computation [12], [13]. Secret sharing works by splitting the private data into a number of so-called shares and distributes them over the nodes such that without a sufficient number of nodes cooperating the private data cannot be reconstructed.…”
Section: Introductionmentioning
confidence: 99%
“…Many information-theoretic approaches have been proposed for addressing privacy issues in various distributed processing problems like distributed average consensus [4]- [16], distributed least squares [17], [18], distributed optimization [19]- [27] and distributed graph filtering [28]. These approaches can be broadly classified into three classes.…”
Section: A Related Workmentioning
confidence: 99%
“…So far, efficient data processing and privacy preservation are two terms that seems difficult to combine since the cryptographic methods tend to bring a substantial overhead in either communication, computation or both. Moreover, security of cryptographic methods such as secret sharing and homomorphic encryption relies on modular arithmetic, which entails that all data to be protected must be integers and computations on this data must be translated into equivalent computations using finite field arithmetic, [4,5,6]. The drawbacks of this are, for instance, loss of precision in the solution (because of rounding decimal numbers to integers) and that many operations such as division becomes very intractable.…”
Section: Introductionmentioning
confidence: 99%