Privacy Preserving Recursive Least Squares Solutions

Individual privacy is becoming a more prioritized issue in the modern world, because the world is becoming increasingly more digitized and citizens are starting to feel monitored. Private information could furthermore be misused in the wrong hands. Many control systems rely on data that often contain privacy sensitive information. These are systems such as the power grid, water network, and smart house where data contain individual consumption profiles and daily schedules. The systems use the data to compute optimized solutions; hence, the data is valuable but it contains private information. To this end, it is desirable to achieve algorithms able to calculate optimized solutions while keeping the data secret. As a step towards this goal, we propose a privacy preserving recursive least squares protocol that computes a least squares estimate of the parameters of a linear system based on observations of input and outputs. This estimate is calculated while ensuring no leakage of information about observations.

[1]  Michael Zohner,et al.  ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation , 2015, NDSS.

[2]  Somesh Jha,et al.  Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption , 2018, IACR Cryptol. ePrint Arch..

[3]  Cynthia Dwork,et al.  Differential privacy and robust statistics , 2009, STOC '09.

[4]  Tomas Toft,et al.  On Secure Two-Party Integer Division , 2012, Financial Cryptography.

[5]  Dan Bogdanov,et al.  Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.

[6]  Eike Kiltz,et al.  Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation , 2006, IACR Cryptol. ePrint Arch..

[7]  Mariana Raykova,et al.  Privacy-Preserving Distributed Linear Regression on High-Dimensional Data , 2017, Proc. Priv. Enhancing Technol..

[8]  Kazuo Ohta,et al.  Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol , 2007, Public Key Cryptography.

[9]  Peter Rindal,et al.  ABY3: A Mixed Protocol Framework for Machine Learning , 2018, IACR Cryptol. ePrint Arch..

[10]  Dan Bogdanov,et al.  Rmind: A Tool for Cryptographically Secure Statistical Analysis , 2016, IEEE Transactions on Dependable and Secure Computing.

[11]  Ivan Damgård,et al.  Secure Multiparty Computation and Secret Sharing , 2015 .

[12]  G. Dullerud,et al.  Differential Privacy and Minimum-Variance Unbiased Estimation in Multi-agent Control Systems , 2017 .

[13]  Jerome Le Ny,et al.  On differentially private Kalman filtering , 2017, 2017 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[14]  Qiuliang Xu,et al.  Multiparty Computation for Modulo Reduction without Bit-Decomposition and A Generalization to Bit-Decomposition , 2010, IACR Cryptol. ePrint Arch..

[15]  Paolo Palmieri,et al.  Passengers information in public transport and privacy: Can anonymous tickets prevent tracking? , 2014, Int. J. Inf. Manag..

[16]  Payman Mohassel,et al.  SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[17]  George J. Pappas,et al.  Privacy in Control and Dynamical Systems , 2018 .

[18]  Claudio Orlandi,et al.  Is multiparty computation any good in practice? , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[19]  Stephen B. Wicker,et al.  Inferring Personal Information from Demand-Response Systems , 2010, IEEE Security & Privacy.

[20]  Stratis Ioannidis,et al.  Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.

[21]  Geir E. Dullerud,et al.  Differential Privacy in Linear Distributed Control Systems: Entropy Minimizing Mechanisms and Performance Tradeoffs , 2017, IEEE Transactions on Control of Network Systems.

[22]  Xinping Guan,et al.  Preserving Data-Privacy With Added Noises: Optimal Estimation and Privacy Analysis , 2017, IEEE Transactions on Information Theory.