A Privacy Preserving Collusion Secure DCOP Algorithm

05/22/2019
by   Tamir Tassa, et al.
0

In recent years, several studies proposed privacy-preserving algorithms for solving Distributed Constraint Optimization Problems (DCOPs). All of those studies assumed that agents do not collude. In this study we propose the first privacy-preserving DCOP algorithm that is immune to coalitions, under the assumption of honest majority. Our algorithm -- PC-SyncBB -- is based on the classical Branch and Bound DCOP algorithm. It offers constraint, topology and decision privacy. We evaluate its performance on different benchmarks, problem sizes, and constraint densities. We show that achieving security against coalitions is feasible. As all existing privacy-preserving DCOP algorithms base their security on assuming solitary conduct of the agents, we view this study as an essential first step towards lifting this potentially harmful assumption in all those algorithms.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/25/2018

A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection

In this paper we propose a novel protocol that allows suppliers and grid...
research
10/12/2020

Privacy-Preserving Distributed Projection LMS for Linear Multitask Networks

We develop a privacy-preserving distributed projection least mean square...
research
05/23/2019

Privacy-Preserving Obfuscation of Critical Infrastructure Networks

The paper studies how to release data about a critical infrastructure ne...
research
10/14/2022

Privacy-Preserving and Lossless Distributed Estimation of High-Dimensional Generalized Additive Mixed Models

Various privacy-preserving frameworks that respect the individual's priv...
research
07/22/2023

Towards Vertical Privacy-Preserving Symbolic Regression via Secure Multiparty Computation

Symbolic Regression is a powerful data-driven technique that searches fo...
research
11/20/2020

Survey and Open Problems in Privacy Preserving Knowledge Graph: Merging, Query, Representation, Completion and Applications

Knowledge Graph (KG) has attracted more and more companies' attention fo...
research
05/01/2018

Privacy preserving distributed optimization using homomorphic encryption

This paper studies how a system operator and a set of agents securely ex...

Please sign up or login with your details

Forgot password? Click here to reset