Privacy-Preserving Decentralized Multi-Agent Cooperative Optimization -- Paradigm Design and Privacy Analysis

Large-scale multi-agent cooperative control problems have materially enjoyed the scalability, adaptivity, and flexibility of decentralized optimization. However, due to the mandatory iterative communications between the agents and the system operator, the decentralized architecture is vulnerable to malicious attacks and privacy breach. Current research on addressing privacy preservation of both agents and the system operator in cooperative decentralized optimization with strongly coupled objective functions and constraints is still primitive. To fill in the gaps, this paper proposes a novel privacy-preserving decentralized optimization paradigm based on Paillier cryptosystem. The proposed paradigm achieves ideal correctness and security, as well as resists attacks from a range of adversaries. The efficacy and efficiency of the proposed approach are verified via numerical simulations and a realworld physical platform.

[1]  Mingxi Liu,et al.  A Novel Cryptography-Based Privacy-Preserving Decentralized Optimization Paradigm , 2021, 2021 4th IEEE International Conference on Industrial Cyber-Physical Systems (ICPS).

[2]  Thomas Morstyn,et al.  Designing Decentralized Markets for Distribution System Flexibility , 2019, IEEE Transactions on Power Systems.

[3]  Ufuk Topcu,et al.  Differentially Private Distributed Constrained Optimization , 2014, IEEE Transactions on Automatic Control.

[4]  Yang Lu,et al.  Privacy preserving distributed optimization using homomorphic encryption , 2018, Autom..

[5]  Yongqiang Wang,et al.  Privacy-Preserving Average Consensus via State Decomposition , 2019, IEEE Transactions on Automatic Control.

[6]  Angelia Nedic,et al.  Multiuser Optimization: Distributed Algorithms and Error Analysis , 2011, SIAM J. Optim..

[7]  Duncan S. Callaway,et al.  Decentralized Charging Control of Electric Vehicles in Residential Distribution Networks , 2017, IEEE Transactions on Control Systems Technology.

[8]  Pascal Bouvry,et al.  Improving Classical and Decentralized Differential Evolution With New Mutation Operator and Population Topologies , 2011, IEEE Transactions on Evolutionary Computation.

[9]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[10]  Kannan Balasubramanian,et al.  Secure Multiparty Computation , 2011, Encyclopedia of Cryptography and Security.

[11]  David B. Smith,et al.  A Survey of Algorithms for Distributed Charging Control of Electric Vehicles in Smart Grid , 2019, IEEE Transactions on Intelligent Transportation Systems.

[12]  Christoforos N. Hadjicostis,et al.  Privacy-Preserving Distributed Averaging via Homomorphically Encrypted Ratio Consensus , 2020, IEEE Transactions on Automatic Control.

[13]  Yongqiang Wang,et al.  Enabling Privacy-Preservation in Decentralized Optimization , 2019, IEEE Transactions on Control of Network Systems.

[14]  Leighton Johnson Security Controls Evaluation, Testing, and Assessment Handbook , 2015 .

[15]  Minyue Fu,et al.  A Distributed Algorithm for Resource Allocation Over Dynamic Digraphs , 2017, IEEE Transactions on Signal Processing.

[16]  Quanyan Zhu,et al.  Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.