On Privacy of Dynamical Systems: An Optimal Probabilistic Mapping Approach

We address the problem of maximizing privacy of stochastic dynamical systems whose state information is released through quantized sensor data. In particular, we consider the setting where information about the system state is obtained using noisy sensor measurements. This data is quantized and transmitted to a (possibly untrustworthy) remote station through a public/unsecured communication network. We aim at keeping (part of) the state of the system private; however, because the network (and/or the remote station) might be unsecure, adversaries might have access to sensor data, which can be used to estimate the system state. To prevent such adversaries from obtaining an accurate state estimate, before transmission, we randomize quantized sensor data using additive random vectors, and send the corrupted data to the remote station instead. We design the joint probability distribution of these additive vectors (over a time window) to minimize the mutual information (our privacy metric) between some linear function of the system state (a desired private output) and the randomized sensor data for a desired level of distortion–how different quantized sensor measurements and distorted data are allowed to be. We pose the problem of synthesising the joint probability distribution of the additive vectors as a convex program subject to linear constraints. Simulation experiments are presented to illustrate our privacy scheme.

[1]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[2]  Charles R. Johnson,et al.  Matrix Analysis, 2nd Ed , 2012 .

[3]  H. Vincent Poor,et al.  Enabling Data Exchange in Two-Agent Interactive Systems Under Privacy Constraints , 2014, IEEE Journal of Selected Topics in Signal Processing.

[4]  E. Yaz Linear Matrix Inequalities In System And Control Theory , 1998, Proceedings of the IEEE.

[5]  Carlos Murguia,et al.  Information-Theoretic Privacy through Chaos Synchronization and Optimal Additive Noise , 2019, ArXiv.

[6]  K. Schittkowski,et al.  NONLINEAR PROGRAMMING , 2022 .

[7]  Paulo Tabuada,et al.  Plausible deniability as a notion of privacy , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).

[8]  Stephen P. Boyd,et al.  Linear Matrix Inequalities in Systems and Control Theory , 1994 .

[9]  William M. Campbell,et al.  Mutual Information in Learning Feature Transformations , 2000, ICML.

[10]  Karl Henrik Johansson,et al.  A secure control framework for resource-limited adversaries , 2012, Autom..

[11]  H. Vincent Poor,et al.  Smart meter privacy: A utility-privacy framework , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[12]  Tamer Basar,et al.  Privacy constrained information processing , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[13]  Carlos Murguia,et al.  Characterization of a CUSUM model-based sensor attack detector , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[14]  Jerome Le Ny,et al.  Differentially Private MIMO Filtering for Event Streams , 2018, IEEE Transactions on Automatic Control.

[15]  Charles R. Johnson,et al.  Topics in Matrix Analysis , 1991 .

[16]  Fuzhen Zhang The Schur complement and its applications , 2005 .

[17]  Aaron Roth,et al.  The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..

[18]  Robin Wilson,et al.  Modern Graph Theory , 2013 .

[19]  Josep Domingo-Ferrer,et al.  Optimal data-independent noise for differential privacy , 2013, Inf. Sci..

[20]  Martín Ochoa,et al.  Design-time Quantification of Integrity in Cyber-physical Systems , 2017, PLAS@CCS.

[21]  Carlos Murguia,et al.  On Reachable Sets of Hidden CPS Sensor Attacks , 2017, 2018 Annual American Control Conference (ACC).

[22]  Karl Henrik Johansson,et al.  Directed Information as Privacy Measure in Cloud-based Control , 2017, ArXiv.

[23]  H. Vincent Poor Privacy in Networks of Interacting Agents , 2018 .

[24]  Farhad Farokhi,et al.  Secure and Private Implementation of Dynamic Controllers Using Semihomomorphic Encryption , 2018, IEEE Transactions on Automatic Control.

[25]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[26]  Hui Xiong,et al.  Enhancing Security and Privacy in Traffic-Monitoring Systems , 2006, IEEE Pervasive Computing.

[27]  Nina Taft,et al.  Managing Your Private and Public Data: Bringing Down Inference Attacks Against Your Privacy , 2014, IEEE Journal of Selected Topics in Signal Processing.

[28]  Takashi Tanaka,et al.  Bidirectional Information Flow and the Roles of Privacy Masks in Cloud-Based Control , 2019, 2019 IEEE Information Theory Workshop (ITW).

[29]  Brian C. Ross Mutual Information between Discrete and Continuous Data Sets , 2014, PloS one.

[30]  Jairo Giraldo,et al.  Constraining Attacker Capabilities Through Actuator Saturation , 2017, 2018 Annual American Control Conference (ACC).

[31]  Flávio du Pin Calmon,et al.  Privacy against statistical inference , 2012, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[32]  Henrik Sandberg,et al.  Optimal privacy-preserving policy using constrained additive noise to minimize the fisher information , 2017, 2017 IEEE 56th Annual Conference on Decision and Control (CDC).

[33]  H. Vincent Poor,et al.  A theory of utility and privacy of data sources , 2010, 2010 IEEE International Symposium on Information Theory.

[34]  Quanyan Zhu,et al.  Coding sensor outputs for injection attacks detection , 2014, 53rd IEEE Conference on Decision and Control.

[35]  Nathan van de Wouw,et al.  Reachable Sets of Hidden CPS Sensor Attacks: Analysis and Synthesis Tools , 2017 .

[36]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[37]  Geir E. Dullerud,et al.  Entropy-minimizing mechanism for differential privacy of discrete-time linear feedback systems , 2014, 53rd IEEE Conference on Decision and Control.

[38]  K. Watanabe,et al.  Fault diagnosis in nonlinear chemical processes. Part II. Application to a chemical reactor , 1983 .

[39]  Carlos Murguia,et al.  CUSUM and chi-squared attack detection of compromised sensors , 2016, 2016 IEEE Conference on Control Applications (CCA).

[40]  Pramod Viswanath,et al.  The optimal mechanism in differential privacy , 2012, 2014 IEEE International Symposium on Information Theory.

[41]  Ufuk Topcu,et al.  Differentially private convex optimization with piecewise affine objectives , 2014, 53rd IEEE Conference on Decision and Control.

[42]  Nina Taft,et al.  How to hide the elephant- or the donkey- in the room: Practical privacy against statistical inference for large data , 2013, 2013 IEEE Global Conference on Signal and Information Processing.

[43]  Ming Cao,et al.  Design of Privacy-Preserving Dynamic Controllers , 2019, IEEE Transactions on Automatic Control.

[44]  Geir E. Dullerud,et al.  On the cost of differential privacy in distributed control systems , 2014, HiCoNS.

[45]  Farhad Farokhi,et al.  Privacy-Constrained Communication , 2016 .

[46]  Henrik Sandberg,et al.  Quadratic Gaussian privacy games , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[47]  Paulo Tabuada,et al.  Privacy-aware quadratic optimization using partially homomorphic encryption , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[48]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[49]  George J. Pappas,et al.  Differentially Private Filtering , 2012, IEEE Transactions on Automatic Control.

[50]  Sreeram Kannan,et al.  Estimating Mutual Information for Discrete-Continuous Mixtures , 2017, NIPS.

[51]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[52]  Hyungbo Shim,et al.  Encrypting Controller using Fully Homomorphic Encryption for Security of Cyber-Physical Systems* , 2016 .

[53]  Navid Hashemi,et al.  A Comparison of Stealthy Sensor Attacks on Control Systems , 2017, 2018 Annual American Control Conference (ACC).

[54]  Allen Gersho,et al.  Vector quantization and signal compression , 1991, The Kluwer international series in engineering and computer science.

[55]  Carlos Murguia,et al.  Model-based Attack Detection Scheme for Smart Water Distribution Networks , 2017, AsiaCCS.

[56]  Sheldon M. Ross,et al.  Introduction to Probability Models, Eighth Edition , 1972 .

[57]  Iman Shames,et al.  Secure and private control using semi-homomorphic encryption , 2017 .

[58]  Lawrence H. Ozarow,et al.  Wire-tap channel II , 1984, AT&T Bell Lab. Tech. J..

[59]  Witold Pedrycz,et al.  Measuring relevance between discrete and continuous features based on neighborhood mutual information , 2011, Expert Syst. Appl..

[60]  Carlos Murguia,et al.  On Privacy of Quantized Sensor Measurements through Additive Noise , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[61]  Jie Chen,et al.  Robust Model-Based Fault Diagnosis for Dynamic Systems , 1998, The International Series on Asian Studies in Computer and Information Science.

[62]  Sheldon M. Ross,et al.  Introduction to Probability Models (4th ed.). , 1990 .

[63]  Fuhui Long,et al.  Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[64]  Carlos Murguia,et al.  On model‐based detectors for linear time‐invariant stochastic systems under sensor attacks , 2019, IET Control Theory & Applications.

[65]  H. Vincent Poor,et al.  Increasing Smart Meter Privacy Through Energy Harvesting and Storage Devices , 2013, IEEE Journal on Selected Areas in Communications.

[66]  Bruno Sinopoli,et al.  On the Performance Degradation of Cyber-Physical Systems Under Stealthy Integrity Attacks , 2016, IEEE Transactions on Automatic Control.