Privacy-Preserving Distributed Optimization via Subspace Perturbation: A General Framework

As the modern world becomes increasingly digitized and interconnected, distributed signal processing has proven to be effective in processing its large volume of data. However, a main challenge limiting the broad use of distributed signal processing techniques is the issue of privacy in handling sensitive data. To address this privacy issue, we propose a novel yet general subspace perturbation method for privacy-preserving distributed optimization, which allows each node to obtain the desired solution while protecting its private data. In particular, we show that the dual variable introduced in each distributed optimizer will not converge in a certain subspace determined by the graph topology. Additionally, the optimization variable is ensured to converge to the desired solution, because it is orthogonal to this non-convergent subspace. We therefore propose to insert noise in the non-convergent subspace through the dual variable such that the private data are protected, and the accuracy of the desired solution is completely unaffected. Moreover, the proposed method is shown to be secure under two widely-used adversary models: passive and eavesdropping. Furthermore, we consider several distributed optimizers such as ADMM and PDMM to demonstrate the general applicability of the proposed method. Finally, we test the performance through a set of applications. Numerical tests indicate that the proposed method is superior to existing methods in terms of several parameters like estimated accuracy, privacy level, communication cost and convergence rate.

[1]  Max A. Little,et al.  Quality Control of Voice Recordings in Remote Parkinson’s Disease Monitoring Using the Infinite Hidden Markov Model , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[2]  Qiongxiu Li,et al.  Convex Optimisation-Based Privacy-Preserving Distributed Average Consensus in Wireless Sensor Networks , 2020, ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[3]  G. V. Steeg Non-parametric Entropy Estimation Toolbox (NPEET) , 2014 .

[4]  Richard Heusdens,et al.  A Low-Cost Robust Distributed Linearly Constrained Beamformer for Wireless Acoustic Sensor Networks With Arbitrary Topology , 2017, IEEE/ACM Transactions on Audio, Speech, and Language Processing.

[5]  Yongyang Xiong,et al.  Privacy-Preserving Distributed Online Optimization Over Unbalanced Digraphs via Subgradient Rescaling , 2020, IEEE Transactions on Control of Network Systems.

[6]  Max A. Little,et al.  Automatic Quality Control and Enhancement for Voice-Based Remote Parkinson's Disease Detection , 2019, Speech Commun..

[7]  Qing Ling,et al.  On the Linear Convergence of the ADMM in Decentralized Consensus Optimization , 2013, IEEE Transactions on Signal Processing.

[8]  Sonia Martínez,et al.  On Distributed Convex Optimization Under Inequality and Equality Constraints , 2010, IEEE Transactions on Automatic Control.

[9]  Richard Heusdens,et al.  Quantisation Effects in Distributed Optimisation , 2018, 2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[10]  Sunil K. Narang,et al.  Signal processing techniques for interpolation in graph structured data , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[11]  J. Dall,et al.  Random geometric graphs. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[12]  Jorge Cortés,et al.  Differentially private average consensus: Obstructions, trade-offs, and optimal algorithm design , 2015, Autom..

[13]  Mingyan Liu,et al.  Recycled ADMM: Improve Privacy and Accuracy with Less Computation in Distributed Algorithms , 2018, 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[14]  Magnus Egerstedt,et al.  Cloud-Enabled Differentially Private Multiagent Optimization With Constraints , 2015, IEEE Transactions on Control of Network Systems.

[15]  Michael Elad,et al.  L1-L2 Optimization in Signal and Image Processing , 2010, IEEE Signal Processing Magazine.

[16]  Geir E. Dullerud,et al.  Differentially private iterative synchronous consensus , 2012, WPES '12.

[17]  Cong Wang,et al.  Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.

[18]  Richard M. Murray,et al.  Privacy preserving average consensus , 2014, 53rd IEEE Conference on Decision and Control.

[19]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[20]  Stephen P. Boyd,et al.  Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..

[21]  Ivan Damgård,et al.  Secure Multiparty Computation and Secret Sharing , 2015 .

[22]  Magnus Egerstedt,et al.  Differentially private cloud-based multi-agent optimization with constraints , 2015, 2015 American Control Conference (ACC).

[23]  R. Tibshirani Regression Shrinkage and Selection via the Lasso , 1996 .

[24]  Richard Heusdens,et al.  Derivation and Analysis of the Primal-Dual Method of Multipliers Based on Monotone Operator Theory , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[25]  Rafael Wisniewski,et al.  Privacy Preservation in Distributed Optimization via Dual Decomposition and ADMM , 2019, 2019 IEEE 58th Conference on Decision and Control (CDC).

[26]  Ufuk Topcu,et al.  Differentially Private Distributed Constrained Optimization , 2014, IEEE Transactions on Automatic Control.

[27]  Richard Heusdens,et al.  Distributed Optimization Using the Primal-Dual Method of Multipliers , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[28]  Qiongxiu Li,et al.  Convex optimization-based Privacy-Preserving Distributed Least Squares via Subspace Perturbation , 2020, 2020 28th European Signal Processing Conference (EUSIPCO).

[29]  Ignacio Cascudo,et al.  Privacy Preserving Recursive Least Squares Solutions , 2019, 2019 18th European Control Conference (ECC).

[30]  Richard Heusdens,et al.  Quantisation effects in PDMM: A first study for synchronous distributed averaging , 2017, 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[31]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[32]  Xinping Guan,et al.  Privacy-Preserving Average Consensus: Privacy Analysis and Algorithm Design , 2016, IEEE Transactions on Signal and Information Processing over Networks.

[33]  H. Vincent Poor,et al.  Privacy-Aware Smart Metering: Progress and Challenges , 2018, IEEE Signal Processing Magazine.

[34]  Stephen P. Boyd,et al.  Randomized gossip algorithms , 2006, IEEE Transactions on Information Theory.

[35]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[36]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[37]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[38]  Qiongxiu Li,et al.  A Privacy-Preserving Asynchronous Averaging Algorithm based on Shamir’s Secret Sharing , 2019, 2019 27th European Signal Processing Conference (EUSIPCO).

[39]  Mingyan Liu,et al.  Improving the Privacy and Accuracy of ADMM-Based Distributed Algorithms , 2018, ICML.

[40]  Paulo Tabuada,et al.  Privacy-aware quadratic optimization using partially homomorphic encryption , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[41]  Quanyan Zhu,et al.  Secure and Resilient Control Design for Cloud Enabled Networked Control Systems , 2015, CPS-SPC '15.

[42]  Oscar C. Au,et al.  Optimal graph laplacian regularization for natural image denoising , 2015, 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[43]  Jonathan Katz,et al.  Statistical Privacy in Distributed Average Consensus on Bounded Real Inputs , 2019, 2019 American Control Conference (ACC).

[44]  Ivan Damgård,et al.  Multiparty Computation from Somewhat Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..

[45]  Privacy-Preserving Distributed Average Consensus based on Additive Secret Sharing , 2019, 2019 27th European Signal Processing Conference (EUSIPCO).

[46]  Cynthia Dwork,et al.  Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.

[47]  Richard Heusdens,et al.  A distributed algorithm for robust LCMV beamforming , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[48]  David Eckhoff,et al.  Metrics : a Systematic Survey , 2018 .

[49]  Christoforos N. Hadjicostis,et al.  Privacy-preserving asymptotic average consensus , 2013, 2013 European Control Conference (ECC).

[50]  Quanyan Zhu,et al.  Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.

[51]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[52]  Jorge Cortés,et al.  Differentially Private Distributed Convex Optimization via Functional Perturbation , 2015, IEEE Transactions on Control of Network Systems.

[53]  Moti Yung,et al.  Perfectly secure message transmission , 1993, JACM.

[54]  Zhenqi Huang,et al.  Differentially Private Distributed Optimization , 2014, ICDCN.

[55]  Paul W. Cuff,et al.  Differential Privacy as a Mutual Information Constraint , 2016, CCS.

[56]  Rui Hu,et al.  DP-ADMM: ADMM-Based Distributed Learning With Differential Privacy , 2018, IEEE Transactions on Information Forensics and Security.

[57]  Emmanuel J. Candès,et al.  Near-Optimal Signal Recovery From Random Projections: Universal Encoding Strategies? , 2004, IEEE Transactions on Information Theory.

[58]  Allen Y. Yang,et al.  Robust Face Recognition via Sparse Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[59]  B.H. Khalaj,et al.  Secure consensus averaging in sensor networks using random offsets , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[60]  Panagiotis Patrinos,et al.  Distributed computing over encrypted data , 2016, 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[61]  Yongqiang Wang,et al.  ADMM Based Privacy-Preserving Decentralized Optimization , 2017, IEEE Transactions on Information Forensics and Security.

[62]  Jonathan Katz,et al.  Privacy in Distributed Average Consensus , 2017 .

[63]  S. Frick,et al.  Compressed Sensing , 2014, Computer Vision, A Reference Guide.

[64]  Ninghui Li,et al.  Information-theoretic metrics for Local Differential Privacy protocols , 2019, ArXiv.