Differentially Private Maximum Consensus: Design, Analysis and Impossibility Result

In network systems, calculating maximum element plays a fundamental role for distributed data analysis. Maximum consensus algorithm can accomplish the calculation in a fully distributed way. However, the data for communication are privacy-sensitive in many scenarios, making nodes unwilling to participate in the distributed calculation process. How to ensure privacy and accuracy for distributed calculation of maximum element is essential while challenging. In this paper, we first prove that exact maximum consensus and differential privacy cannot be guaranteed simultaneously. Then, to provide sufficient privacy preservation for nodes, we propose a novel differentially private maximum consensus (DPMC) algorithm where nodes perturb their initial states with Laplacian noises. We prove that DPMC algorithm preserves differential privacy and give the analytical expression of privacy preserving degree. Furthermore, the proposed algorithm also guarantees finite-time convergence and achieves high convergence accuracy. The performance tradeoff is finally analyzed and evaluated by extensive numerical simulations.

[1]  John N. Tsitsiklis,et al.  Parallel and distributed computation , 1989 .

[2]  Ling Shi,et al.  Time synchronization in WSNs: A maximum value based consensus approach , 2011, IEEE Conference on Decision and Control and European Control Conference.

[3]  Jiming Chen,et al.  Differentially Private Maximum Consensus , 2017 .

[4]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[5]  Giacomo Como,et al.  Robustness of Large-Scale Stochastic Matrices to Localized Perturbations , 2013, IEEE Transactions on Network Science and Engineering.

[6]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[7]  Ting Li,et al.  Scalable Privacy-Preserving Participant Selection for Mobile Crowdsensing Systems: Participant Grouping and Secure Group Bidding , 2020, IEEE Transactions on Network Science and Engineering.

[8]  Geir E. Dullerud,et al.  Differentially private iterative synchronous consensus , 2012, WPES '12.

[9]  Mauro Conti,et al.  ODIN: Obfuscation-Based Privacy-Preserving Consensus Algorithm for Decentralized Information Fusion in Smart Device Networks , 2016, ACM Trans. Internet Techn..

[10]  Reza Olfati-Saber,et al.  Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.

[11]  Hao He,et al.  A Coalitional Game for Distributed Inference in Sensor Networks With Dependent Observations , 2016, IEEE Transactions on Signal Processing.

[12]  Christoforos N. Hadjicostis,et al.  Privacy-preserving asymptotic average consensus , 2013, 2013 European Control Conference (ECC).

[13]  Yilin Mo,et al.  Privacy Preserving Maximum Consensus , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[14]  Jiming Chen,et al.  Consensus-Based Energy Management in Smart Grid With Transmission Losses and Directed Communication , 2017, IEEE Transactions on Smart Grid.

[15]  Jorge Cortés,et al.  Differentially private average consensus: Obstructions, trade-offs, and optimal algorithm design , 2015, Autom..

[16]  Marc'Aurelio Ranzato,et al.  Large Scale Distributed Deep Networks , 2012, NIPS.

[17]  Paolo Braca,et al.  Secure multi-party consensus gossip algorithms , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[18]  George J. Pappas,et al.  Differential privacy in control and network systems , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[19]  Xi Fang,et al.  3. Full Four-channel 6.3-gb/s 60-ghz Cmos Transceiver with Low-power Analog and Digital Baseband Circuitry 7. Smart Grid — the New and Improved Power Grid: a Survey , 2022 .

[20]  Jiming Chen,et al.  Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach , 2014, IEEE Transactions on Parallel and Distributed Systems.

[21]  Philippe Ciblat,et al.  Analysis of Max-Consensus Algorithms in Wireless Channels , 2012, IEEE Transactions on Signal Processing.

[22]  Mohammed Gharib,et al.  Secure Overlay Routing for Large Scale Networks , 2019, IEEE Transactions on Network Science and Engineering.

[23]  Taghi M. Khoshgoftaar,et al.  Survey of Clinical Data Mining Applications on Big Data in Health Informatics , 2013, 2013 12th International Conference on Machine Learning and Applications.

[24]  Richard M. Murray,et al.  Privacy preserving average consensus , 2014, 53rd IEEE Conference on Decision and Control.

[25]  Eli Biham,et al.  Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.

[26]  Geir E. Dullerud,et al.  Entropy-minimizing mechanism for differential privacy of discrete-time linear feedback systems , 2014, 53rd IEEE Conference on Decision and Control.

[27]  Jiming Chen,et al.  Narrowband Internet of Things: Implementations and Applications , 2017, IEEE Internet of Things Journal.

[28]  Jianping He,et al.  Differential private noise adding mechanism: Basic conditions and its application , 2017, 2017 American Control Conference (ACC).

[29]  Nikhil Chopra,et al.  Confidentiality in distributed average information consensus , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[30]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[31]  Paolo Braca,et al.  Learning With Privacy in Consensus $+$ Obfuscation , 2016, IEEE Signal Processing Letters.

[32]  Keke Chen,et al.  Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation , 2012, IEEE Transactions on Knowledge and Data Engineering.