Protecting Privacy through Distributed Computation in Multi-agent Decision Making

As large-scale theft of data from corporate servers is becoming increasingly common, it becomes interesting to examine alternatives to the paradigm of centralizing sensitive data into large databases. Instead, one could use cryptography and distributed computation so that sensitive data can be supplied and processed in encrypted form, and only the final result is made known. In this paper, we examine how such a paradigm can be used to implement constraint satisfaction, a technique that can solve a broad class of AI problems such as resource allocation, planning, scheduling, and diagnosis. Most previous work on privacy in constraint satisfaction only attempted to protect specific types of information, in particular the feasibility of particular combinations of decisions. We formalize and extend these restricted notions of privacy by introducing four types of private information, including the feasibility of decisions and the final decisions made, but also the identities of the participants and the topology of the problem. We present distributed algorithms that allow computing solutions to constraint satisfaction problems while maintaining these four types of privacy. We formally prove the privacy properties of these algorithms, and show experiments that compare their respective performance on benchmark problems.

[1]  Oded Goldreich Foundations of Cryptography: Index , 2001 .

[2]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 2, Basic Applications , 2004 .

[3]  Amnon Meisels,et al.  Asymmetric Distributed Constraint Optimization , 2009 .

[4]  Makoto Yokoo,et al.  Distributed Private Constraint Optimization , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[5]  Christoph Böhm,et al.  The Basic Applications , 2013 .

[6]  Milind Tambe,et al.  Privacy Loss in Distributed Constraint Reasoning: A Quantitative Framework for Analysis and its Applications , 2006, Autonomous Agents and Multi-Agent Systems.

[7]  Makoto Yokoo,et al.  Distributed constraint satisfaction for formalizing distributed problem solving , 1992, [1992] Proceedings of the 12th International Conference on Distributed Computing Systems.

[8]  Marius-Calin Silaghi Hiding Absence of Solution for a Distributed Constraint Satisfaction Problem , 2005, FLAIRS Conference.

[9]  Francisco Azevedo,et al.  Recent advances in constraints : 11th Annual ERCIM International Workshop on Constraint Solving and Contraint [i.e. Constraint] Logic Programming, CSCLP 2006 Caparica, Portugal, June 26-28, 2006 : revised selected and invited papers , 2007 .

[10]  Boi Faltings,et al.  Privacy-Preserving Multi-agent Constraint Satisfaction , 2009, 2009 International Conference on Computational Science and Engineering.

[11]  Milind Tambe,et al.  Analysis of Privacy Loss in Distributed Constraint Optimization , 2006, AAAI.

[12]  Makoto Yokoo,et al.  Secure distributed constraint satisfaction: reaching agreement without revealing private information , 2002, Artif. Intell..

[13]  Francesca Rossi,et al.  Multi‐Agent Constraint Systems with Preferences: Efficiency, Solution Quality, and Privacy Loss , 2004, Comput. Intell..

[14]  To-Yat Cheung,et al.  Graph Traversal Techniques and the Maximum Flow Problem in Distributed Computation , 1983, IEEE Transactions on Software Engineering.

[15]  Amnon Meisels,et al.  Asynchronous Forward-checking for DisCSPs , 2007, Constraints.

[16]  Marius-Calin Silaghi,et al.  Asynchronous Search with Aggregations , 2000, AAAI/IAAI.

[17]  Daphne Koller,et al.  Multi-agent algorithms for solving graphical games , 2002, AAAI/IAAI.

[18]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[19]  M. Silaghi,et al.  Using Secure DisCSP Solvers for Generalized Vickrey Auctions ∗ Complete and Stochastic Secure Techniques , 2005 .

[20]  Katia P. Sycara,et al.  No-commitment branch and bound search for distributed constraint optimization , 2006, AAMAS '06.

[21]  Amnon Meisels,et al.  Completeness and Performance Of The APO Algorithm , 2008, J. Artif. Intell. Res..

[22]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[23]  Boi Faltings,et al.  Privacy Guarantees through Distributed Constraint Satisfaction , 2008, 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[24]  Eugene C. Freuder,et al.  Constraint-based reasoning and privacy/efficiency tradeoffs in multi-agent problem solving , 2005, Artif. Intell..

[25]  Makoto Yokoo,et al.  Distributed Partial Constraint Satisfaction Problem , 1997, CP.

[26]  Pedro Meseguer,et al.  Distributed Forward Checking May Lie for Privacy , 2006, CSCLP.

[27]  Boi Faltings,et al.  Secure Combinatorial Optimization Simulating DFS Tree-Based Variable Elimination , 2006, AI&M.

[28]  Radoslaw Szymanek,et al.  FRODO 2.0: An Open-Source Framework for Distributed Constraint Optimization , 2009, IJCAI 2009.

[29]  Makoto Yokoo,et al.  Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions , 2002, AAMAS '02.

[30]  Yoav Shoham,et al.  Towards a universal test suite for combinatorial auction algorithms , 2000, EC '00.

[31]  Amnon Meisels,et al.  Asynchronous Forward-Bounding for Distributed Constraints Optimization , 2006, ECAI.

[32]  Bart De Decker,et al.  On Securely Scheduling a Meeting , 2001, SEC.

[33]  Amnon Meisels,et al.  Concurrent Dynamic Backtracking for Distributed CSPs , 2004, CP.

[34]  Pedro Meseguer,et al.  Cluster Tree Elimination for Distributed Constraint Optimization with Quality Guarantees , 2010, Fundam. Informaticae.

[35]  Avi Wigderson,et al.  Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.

[36]  Milind Tambe,et al.  Taking DCOP to the real world: efficient complete solutions for distributed multi-event scheduling , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[37]  Boi Faltings,et al.  A Scalable Method for Multiagent Constraint Optimization , 2005, IJCAI.

[38]  Boi Faltings,et al.  Coordinating Logistics Operations with Privacy Guarantees , 2011, IJCAI.

[39]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[40]  Robert N. Lass,et al.  DCOPolis : A Framework for Simulating and Deploying Distributed Constraint Optimization Algorithms , 2007 .

[41]  Sven Koenig,et al.  BnB-ADOPT: an asynchronous branch-and-bound DCOP algorithm , 2008, AAMAS.

[42]  S. Rassenti,et al.  A Combinatorial Auction Mechanism for Airport Time Slot Allocation , 1982 .

[43]  Yiannis Tsiounis,et al.  On the Security of ElGamal Based Encryption , 1998, Public Key Cryptography.

[44]  B. Grosz,et al.  SSDPOP : Using Secret Sharing to Improve the Privacy of DCOP , 2007 .

[45]  Victor Lesser,et al.  A Mediation Based Protocol for Distributed Constraint Satisfaction , 2003 .

[46]  Roman Barták,et al.  Constraint Processing , 2009, Encyclopedia of Artificial Intelligence.

[47]  Meritxell Vinyals,et al.  Constructing a unifying theory of dynamic programming DCOP algorithms via the generalized distributive law , 2010, Autonomous Agents and Multi-Agent Systems.

[48]  Makoto Yokoo,et al.  Asynchronous Weak-commitment Search for Solving Distributed Constraint Satisfaction Problems , 1995, CP.

[49]  Pedro Meseguer,et al.  Distributed Forward Checking , 2003, CP.

[50]  Amnon Meisels,et al.  Concurrent Forward Bounding for DCOPs , 2010 .

[51]  Makoto Yokoo,et al.  Adopt: asynchronous distributed constraint optimization with quality guarantees , 2005, Artif. Intell..

[52]  Pedro Meseguer,et al.  BnB-ADOPT+ with Several Soft Arc Consistency Levels , 2010, ECAI.

[53]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[54]  Marius-Calin Silaghi,et al.  Distributed constraint satisfaction and optimization with privacy enforcement , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..

[55]  Boi Faltings,et al.  M-DPOP: Faithful Distributed Implementations of Efficient Social Choice Problems , 2008 .

[56]  Valtteri Niemi,et al.  Privacy-preserving activity scheduling on mobile devices , 2011, CODASPY '11.

[57]  Michael L. Littman,et al.  Graphical Models for Game Theory , 2001, UAI.

[58]  Michael P. Wellman,et al.  Computing approximate bayes-nash equilibria in tree-games of incomplete information , 2004, EC '04.

[59]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.