Multi-Party Dynamic State Estimation That Preserves Data and Model Privacy

In this paper we focus on the dynamic state estimation which harnesses a vast amount of sensing data harvested by multiple parties and recognize that in many applications, to improve collaborations between parties, the estimation procedure must be designed with the awareness of protecting participants’ data and model privacy, where the latter refers to the privacy of key parameters of observation models. We develop a state estimation paradigm for the scenario where multiple parties with data and model privacy concerns are involved. Multiple parties monitor a physical dynamic process by deploying their own sensor networks and update the state estimate according to the average state estimate of all the parties calculated by a cloud server and security module. The paradigm taps additively homomorphic encryption which enables the cloud server and security module to jointly fuse parties’ data while preserving the data privacy. Meanwhile, all the parties collaboratively develop a stable (or optimal) fusion rule without divulging sensitive model information. For the proposed filtering paradigm, we analyze the stabilization and the optimality. First, to stabilize the multi-party state estimator while preserving observation model privacy, two stabilization design methods are proposed. For special scenarios, the parties directly design their estimator gains by the matrix norm relaxation. For general scenarios, after transforming the original design problem into a convex semi-definite programming problem, the parties collaboratively derive suitable estimator gains based on the alternating direction method of multipliers (ADMM). Second, an optimal collaborative gain design method with model privacy guarantees is provided, which results in the asymptotic minimum mean square error (MMSE) state estimation. Finally, numerical examples are presented to illustrate our design and theoretical findings.

[1]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[2]  Josh Benaloh,et al.  Dense Probabilistic Encryption , 1999 .

[3]  Bingsheng He,et al.  The direct extension of ADMM for multi-block convex minimization problems is not necessarily convergent , 2014, Mathematical Programming.

[4]  Stergios I. Roumeliotis,et al.  SOI-KF: Distributed Kalman Filtering With Low-Cost Communications Using The Sign Of Innovations , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[5]  Ali H. Sayed,et al.  Diffusion Strategies for Distributed Kalman Filtering and Smoothing , 2010, IEEE Transactions on Automatic Control.

[6]  Chao Yang,et al.  Multi-Sensor Kalman Filtering With Intermittent Measurements , 2018, IEEE Transactions on Automatic Control.

[7]  Geir E. Dullerud,et al.  Differential Privacy in Linear Distributed Control Systems: Entropy Minimizing Mechanisms and Performance Tradeoffs , 2017, IEEE Transactions on Control of Network Systems.

[8]  Costas J. Spanos,et al.  Privacy-Enhanced Architecture for Occupancy-Based HVAC Control , 2016, 2017 ACM/IEEE 8th International Conference on Cyber-Physical Systems (ICCPS).

[9]  Shiho Moriai,et al.  Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[10]  William E. Winkler,et al.  Multiplicative Noise for Masking Continuous Data , 2001 .

[11]  Ruggero Carli,et al.  Distributed Kalman filtering based on consensus strategies , 2008, IEEE Journal on Selected Areas in Communications.

[12]  Ali Abur,et al.  Power System Dynamic State Estimation: Motivations, Definitions, Methodologies, and Future Work , 2019, IEEE Transactions on Power Systems.

[13]  Ali Akbar Safavi,et al.  Private State Estimation for Cyber-physical Systems Using Semi-homomorphic Encryption , 2018 .

[14]  Vinod Vaikuntanathan,et al.  Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages , 2011, CRYPTO.

[15]  Quanyan Zhu,et al.  Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.

[16]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[17]  Junfeng Wu,et al.  Gossip Algorithms that Preserve Privacy for Distributed Computation Part II: Performance Against Eavesdroppers , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[18]  Frederik Vercauteren,et al.  Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes , 2010, Public Key Cryptography.

[19]  Richard M. Murray,et al.  Privacy preserving average consensus , 2014, 53rd IEEE Conference on Decision and Control.

[20]  Francisco Javier González-Serrano,et al.  State estimation using an extended Kalman filter with privacy-protected observed inputs , 2014, 2014 IEEE International Workshop on Information Forensics and Security (WIFS).

[21]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[22]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[23]  N. I. Miridakis,et al.  Linear Estimation , 2018, Digital and Statistical Signal Processing.

[24]  Yih-Fang Huang,et al.  Privacy preserving decentralized power system state estimation with phasor measurement units , 2016, 2016 IEEE Sensor Array and Multichannel Signal Processing Workshop (SAM).

[25]  Chi-Tsong Chen,et al.  Linear System Theory and Design , 1995 .

[26]  Shiho Moriai,et al.  Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2019, 2019 IEEE 26th Symposium on Computer Arithmetic (ARITH).

[27]  Xin Wang,et al.  Privacy-Preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation , 2019, IEEE Transactions on Signal Processing.

[28]  Fan Zhang,et al.  Stealing Machine Learning Models via Prediction APIs , 2016, USENIX Security Symposium.

[29]  Wenyuan Xu,et al.  Neighborhood watch: security and privacy analysis of automatic meter reading systems , 2012, CCS.

[30]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[31]  Giorgio Battistelli,et al.  Consensus-Based Linear and Nonlinear Filtering , 2015, IEEE Transactions on Automatic Control.

[32]  Ismail Güvenç,et al.  Secure Data Obfuscation Scheme to Enable Privacy-Preserving State Estimation in Smart Grid AMI Networks , 2016, IEEE Internet of Things Journal.

[33]  Junfeng Wu,et al.  Gossip Algorithms that Preserve Privacy for Distributed Computation Part I: The Algorithms and Convergence Conditions , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[34]  Alexandre V. Evfimievski,et al.  Privacy preserving mining of association rules , 2002, Inf. Syst..

[35]  Ling Shi,et al.  Multi-Sensor-Based Aperiodic Least-Squares Estimation for Networked Systems With Transmission Constraints , 2015, IEEE Transactions on Signal Processing.

[36]  Reza Olfati-Saber,et al.  Distributed Kalman filtering for sensor networks , 2007, 2007 46th IEEE Conference on Decision and Control.

[37]  Yang Song,et al.  Compressive Privacy for a Linear Dynamical System , 2018, IEEE Transactions on Information Forensics and Security.

[38]  Bruno Sinopoli,et al.  Kalman filtering with intermittent observations , 2004, IEEE Transactions on Automatic Control.

[39]  Ling Shi,et al.  An event-triggered approach to state estimation with multiple point- and set-valued measurements , 2014, Autom..

[40]  Khosrow Moslehi,et al.  Power System Control Centers: Past, Present, and Future , 2005, Proceedings of the IEEE.

[41]  Iman Shames,et al.  Secure and private control using semi-homomorphic encryption , 2017 .

[42]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[43]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.