Privacy Preserving Collaborative Computing: Heterogeneous Privacy Guarantee and Efficient Incentive Mechanism

Collaborative computing uses multiple data servers to jointly complete data analysis, e.g., statistical analysis and inference. One major obstruction for it lies in privacy concern, which is directly associated with nodes’ participation and the fidelity of received data. Existing privacy-preserving paradigms for cloud computing and distributed data aggregation only provide nodes with homogeneous privacy protection without consideration of nodes’ diverse trust degrees to different data servers. We propose a two-phase framework that computes the average value while preserving heterogeneous privacy for nodes’ private data. The new challenge is that in the premise of meeting privacy requirements, we should guarantee the proposed framework has the same computation accuracy with existing privacy-aware solutions. In this paper, nodes obtain heterogeneous privacy protection in the face of different data servers through one-shot noise perturbation. Based on the definition of KL privacy, we derive the analytical expressions of the privacy preserving degrees (PPDs) and quantify the relation between different PPDs. Then, we obtain the closed-form expression of computation accuracy. Furthermore, an efficient incentive mechanism is proposed to achieve optimized computation accuracy when data servers have fixed budgets. Finally, extensive simulations are conducted to verify the obtained theoretical results.

[1]  Joel J. P. C. Rodrigues,et al.  Cloud Centric Authentication for Wearable Healthcare Monitoring System , 2019, IEEE Transactions on Dependable and Secure Computing.

[2]  Carlo Curino,et al.  WANalytics: Geo-Distributed Analytics for a Data Intensive World , 2015, SIGMOD Conference.

[3]  Chuang Liu,et al.  The Unified Logging Infrastructure for Data Analytics at Twitter , 2012, Proc. VLDB Endow..

[4]  Zheng Shao,et al.  Data warehousing and analytics infrastructure at facebook , 2010, SIGMOD Conference.

[5]  Yin Yang,et al.  Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy , 2016, CCS.

[6]  Richard M. Murray,et al.  Privacy preserving average consensus , 2014, 53rd IEEE Conference on Decision and Control.

[7]  Meng Sun,et al.  Toward Information Privacy for the Internet of Things: A Nonparametric Learning Approach , 2018, IEEE Transactions on Signal Processing.

[8]  Jean C. Walrand,et al.  Incentive mechanisms for smartphone collaboration in data acquisition and distributed computing , 2012, 2012 Proceedings IEEE INFOCOM.

[9]  Aaron Roth,et al.  Selling privacy at auction , 2015, Games Econ. Behav..

[10]  Travis D. Breaux,et al.  Modeling, analyzing, and consistency checking privacy requirements using eddy , 2016, HotSoS.

[11]  Wang Xiong A cloud computing security solution based on fully homomorphic encryption , 2013 .

[12]  Ling Shi,et al.  Distributed Privacy-Preserving Data Aggregation Against Dishonest Nodes in Network Systems , 2019, IEEE Internet of Things Journal.

[13]  Yunhao Liu,et al.  Incentives for Mobile Crowd Sensing: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[14]  Antony I. T. Rowstron,et al.  Camdoop: Exploiting In-network Aggregation for Big Data Applications , 2012, NSDI.

[15]  Parv Venkitasubramaniam,et al.  Privacy Aware Stochastic Games for Distributed End-User Energy Storage Sharing , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[16]  Zhihua Xia,et al.  A Privacy-Preserving and Copy-Deterrence Content-Based Image Retrieval Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[17]  Christoforos N. Hadjicostis,et al.  Privacy-preserving asymptotic average consensus , 2013, 2013 European Control Conference (ECC).

[18]  Paul W. Cuff,et al.  Differential Privacy as a Mutual Information Constraint , 2016, CCS.

[19]  John N. Tsitsiklis,et al.  Convergence Speed in Distributed Consensus and Averaging , 2009, SIAM J. Control. Optim..

[20]  Klara Nahrstedt,et al.  Quality of Information Aware Incentive Mechanisms for Mobile Crowd Sensing Systems , 2015, MobiHoc.

[21]  Jun Zhou,et al.  PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System , 2015, IEEE Transactions on Parallel and Distributed Systems.

[22]  Alvaro A. Cárdenas,et al.  Big Data Analytics for Security , 2013, IEEE Security & Privacy.

[23]  Weisong Shi,et al.  Edge Computing: Vision and Challenges , 2016, IEEE Internet of Things Journal.

[24]  Klara Nahrstedt,et al.  INCEPTION: incentivizing privacy-preserving data aggregation for mobile crowd sensing systems , 2016, MobiHoc.

[25]  Rinku Dewri,et al.  Local Differential Perturbations: Location Privacy under Approximate Knowledge Attackers , 2013, IEEE Transactions on Mobile Computing.

[26]  Ufuk Topcu,et al.  Differentially Private Distributed Constrained Optimization , 2014, IEEE Transactions on Automatic Control.

[27]  Jiming Chen,et al.  Consensus-Based Energy Management in Smart Grid With Transmission Losses and Directed Communication , 2017, IEEE Transactions on Smart Grid.

[28]  Anand D. Sarwate,et al.  Differentially Private Empirical Risk Minimization , 2009, J. Mach. Learn. Res..

[29]  Xinping Guan,et al.  Preserving Data-Privacy With Added Noises: Optimal Estimation and Privacy Analysis , 2017, IEEE Transactions on Information Theory.

[30]  Jorge Cortés,et al.  Differentially private average consensus: Obstructions, trade-offs, and optimal algorithm design , 2015, Autom..

[31]  Jian Liu,et al.  Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.

[32]  Úlfar Erlingsson,et al.  RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.

[33]  Geir E. Dullerud,et al.  Differentially private iterative synchronous consensus , 2012, WPES '12.

[34]  Alejandro Ribeiro,et al.  Consensus in Ad Hoc WSNs With Noisy Links—Part I: Distributed Estimation of Deterministic Signals , 2008, IEEE Transactions on Signal Processing.

[35]  Ashwini Rao,et al.  Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements , 2014, Requirements Engineering.

[36]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .

[37]  Petros Boufounos,et al.  Privacy-preserving nearest neighbor methods: comparing signals without revealing them , 2013, IEEE Signal Processing Magazine.

[38]  Chen-Khong Tham,et al.  An information-driven incentive scheme with consumer demand awareness for participatory sensing , 2015, 2015 12th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).

[39]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[40]  Philippe Ciblat,et al.  Analysis of Max-Consensus Algorithms in Wireless Channels , 2012, IEEE Transactions on Signal Processing.

[41]  Ninghui Li,et al.  Locally Differentially Private Protocols for Frequency Estimation , 2017, USENIX Security Symposium.

[42]  Lei Ying,et al.  A game-theoretic approach to quality control for collecting privacy-preserving data , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[43]  Jan Willemson,et al.  Privacy Protection for Wireless Medical Sensor Data , 2016, IEEE Transactions on Dependable and Secure Computing.

[44]  Jiming Chen,et al.  Multiperiod Scheduling for Wireless Sensor Networks: A Distributed Consensus Approach , 2015, IEEE Transactions on Signal Processing.

[45]  Xin Wang,et al.  Privacy Preserving Average Consensus with Different Privacy Guarantee , 2018, 2018 Annual American Control Conference (ACC).