Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure

With increasing resource constraints, optimization is necessary to make the best use of scarce resources. Given the ubiquitous connectivity and availability of information, collaborative optimization problems can be formulated by different parties to jointly optimize their operations. However, this cannot usually be done without restraint since privacy/security concerns often inhibit the complete sharing of proprietary information. The field of privacy-preserving optimization studies how collaborative optimization can be performed with limited disclosure. In this paper, we develop privacy-preserving solutions for collaboratively solving the traveling salesman problem TSP, a fundamental combinatorial optimization problem with applications in diverse fields such as planning, logistics and production. We propose a secure and efficient protocol for multiple participants to formulate and solve such a problem without sharing any private information. We formally prove the protocol security under the rigorous definition of secure multiparty computation SMC, and demonstrate its effectiveness with experimental results using real data.

[1]  Dan Bogdanov,et al.  Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.

[2]  Yihua Zhang,et al.  PICCO: a general-purpose compiler for private distributed computation , 2013, CCS.

[3]  Wei Li,et al.  Privacy-preserving horizontally partitioned linear programs with inequality constraints , 2013, Optim. Lett..

[4]  Jaideep Vaidya,et al.  Secure and efficient distributed linear programming , 2012, J. Comput. Secur..

[5]  Ananth Grama,et al.  An efficient protocol for Yao's millionaires' problem , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[6]  Shigenobu Kobayashi,et al.  A genetic algorithm for privacy preserving combinatorial optimization , 2007, GECCO '07.

[7]  Zvi Galil,et al.  Proceedings of the 30th IEEE symposium on Foundations of computer science , 1994, FOCS 1994.

[8]  Kenneth Steiglitz,et al.  Combinatorial Optimization: Algorithms and Complexity , 1981 .

[9]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[10]  N. Metropolis,et al.  Equation of State Calculations by Fast Computing Machines , 1953, Resonance.

[11]  Jaideep Vaidya,et al.  An inference–proof approach to privacy-preserving horizontally partitioned linear programs , 2014, Optim. Lett..

[12]  Wenliang Du,et al.  A study of several specific secure two-party computation problems , 2001 .

[13]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[14]  Jaideep Vaidya A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming , 2009, 2009 International Conference on Advanced Information Networking and Applications.

[15]  G. Croes A Method for Solving Traveling-Salesman Problems , 1958 .

[16]  Jacques Stern,et al.  Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.

[17]  Martín Abadi,et al.  Code-Carrying Authorization , 2008, ESORICS.

[18]  Mikhail J. Atallah,et al.  Secure and Private Collaborative Linear Programming , 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[19]  Jaideep Vaidya,et al.  A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications , 2014, J. Inf. Syst..

[20]  Olvi L. Mangasarian Privacy-preserving horizontally partitioned linear programs , 2012, Optim. Lett..

[21]  Chris Clifton,et al.  An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems , 2008, Manuf. Serv. Oper. Manag..

[22]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[23]  Jaideep Vaidya,et al.  Efficient Distributed Linear Programming with Limited Disclosure , 2011, DBSec.

[24]  Octavian Catrina,et al.  Secure Multiparty Linear Programming Using Fixed-Point Arithmetic , 2010, ESORICS.

[25]  Bart Preneel,et al.  Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings , 2010, ESORICS.

[26]  Chris Clifton,et al.  An Approach to Identifying Beneficial Collaboration Securely in Decentralized Logistics Systems , 2003 .

[27]  Yingjiu Li,et al.  Data and Applications Security and Privacy XXV , 2011 .

[28]  C. D. Gelatt,et al.  Optimization by Simulated Annealing , 1983, Science.

[29]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[30]  Matthew Roughan,et al.  Hiccups on the road to privacy-preserving linear programming , 2009, WPES '09.

[31]  Basit Shafiq,et al.  Privacy-Preserving Tabu Search for Distributed Graph Coloring , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[32]  Jaideep Vaidya,et al.  Privacy-preserving linear programming , 2009, SAC '09.

[33]  Alice Bednarz,et al.  Methods for two-party privacy-preserving linear programming. , 2012 .

[34]  Yvo Desmedt,et al.  Encryption Schemes , 1999, Algorithms and Theory of Computation Handbook.

[35]  Benny Pinkas,et al.  FairplayMP: a system for secure multi-party computation , 2008, CCS.