Per-se Privacy Preserving Solution Methods Based on Optimization

Ensuring privacy is an essential requirement in various contexts, such as social networks, healthcare data, e- commerce, banks, and government services. Here, different en- tities coordinate to address specific problems where the sensitive problem data are distributed among the involved entities and no entity wants to publish its data during the solution procedure. Existing privacy preserving solution methods are mostly based on cryptographic procedures and thus have the drawback of substantial computational complexity. Surprisingly, little atten- tion has been devoted thus far to exploit mathematical opti- mization techniques and their inherent properties for preserving privacy. Yet, optimization based approaches to privacy require much less computational effort compared to cryptographic variants, which is certainly desirable in practice. In this paper, a unified framework for transformation based optimization methods that ensure privacy is developed. A general definition for the privacy in the context of transformation methods is proposed. A number of examples are provided to illustrate the ideas. It is concluded that the theory is still in its infancy and that huge benefits can be achieved by a substantial development.

[1]  Joachim Biskup,et al.  On Pseudonymization of Audit Data for Intrusion Detection , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[2]  Ran Canetti,et al.  Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.

[3]  Octavian Catrina,et al.  Secure Multiparty Linear Programming Using Fixed-Point Arithmetic , 2010, ESORICS.

[4]  George J. Pappas,et al.  Differentially Private Filtering , 2012, IEEE Transactions on Automatic Control.

[5]  Silvio Micali,et al.  Secure Computation (Abstract) , 1991, CRYPTO.

[6]  Yvo Desmedt,et al.  Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.

[7]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[8]  Sandip Roy,et al.  Characterization of security levels for the dynamics of autonomous vehicle networks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[9]  Paul Feldman,et al.  A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[10]  Glenn Fung,et al.  Privacy-preserving classification of vertically partitioned data via random kernels , 2008, TKDD.

[11]  Glenn Fung,et al.  Privacy-preserving linear and nonlinear approximation via linear programming , 2013, Optim. Methods Softw..

[12]  F. Schneider Blueprint for a Science of Cybersecurity , 2011 .

[13]  Olvi L. Mangasarian Privacy-preserving horizontally partitioned linear programs , 2012, Optim. Lett..

[14]  Donald Beaver,et al.  Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority , 2004, Journal of Cryptology.

[15]  Ran Canetti,et al.  Studies in secure multiparty computation and applications , 1995 .

[16]  Paulo Tabuada,et al.  Security for control systems under sensor and actuator attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[17]  Olvi L. Mangasarian,et al.  Privacy-Preserving Classification of Horizontally Partitioned Data via Random Kernels , 2008, DMIN.

[18]  Matthew Roughan,et al.  Hiccups on the road to privacy-preserving linear programming , 2009, WPES '09.

[19]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[20]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[21]  Jaideep Vaidya,et al.  Privacy-preserving linear programming , 2009, SAC '09.

[22]  Wenliang Du,et al.  A practical approach to solve Secure Multi-party Computation problems , 2002, NSPW '02.

[23]  Alice Bednarz,et al.  Methods for two-party privacy-preserving linear programming. , 2012 .

[24]  Florian Dörfler,et al.  Cyber-physical security via geometric control: Distributed monitoring and malicious attacks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[25]  Carlo Fischione,et al.  Per-se Privacy Preserving Distributed Optimization , 2012, ArXiv.

[26]  John S. Baras,et al.  Social networks over wireless networks , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[27]  Florian Kerschbaum,et al.  Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[28]  Tomas Toft Solving Linear Programs Using Multiparty Computation , 2009, Financial Cryptography.

[29]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[30]  W. Rudin Principles of mathematical analysis , 1964 .

[31]  Anna Scaglione,et al.  Grid integration of distributed renewables through coordinated demand response , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[32]  Wenliang Du,et al.  A study of several specific secure two-party computation problems , 2001 .

[33]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[34]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[35]  Olvi L. Mangasarian Privacy-preserving linear programming , 2011, Optim. Lett..

[36]  Leonid A. Levin,et al.  Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.

[37]  Moni Naor,et al.  Oblivious transfer and polynomial evaluation , 1999, STOC '99.

[38]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[39]  Cong Wang,et al.  Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.

[40]  Mikhail J. Atallah,et al.  Secure and Private Collaborative Linear Programming , 2006, 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing.