Differential Privacy in Multi-Party Resource Sharing

10/20/2021
by   Utku Karaca, et al.
0

This study examines a resource-sharing problem involving multiple parties that agree to use a set of capacities together. We start with modeling the whole problem as a mathematical program, where all parties are required to exchange information to obtain the optimal objective function value. This information bears private data from each party in terms of coefficients used in the mathematical program. Moreover, the parties also consider the individual optimal solutions as private. In this setting, the concern for the parties is the privacy of their data and their optimal allocations. We propose a two-step approach to meet the privacy requirements of the parties. In the first step, we obtain a reformulated model that is amenable to a decomposition scheme. Although this scheme eliminates almost all data exchange, it does not provide a formal privacy guarantee. In the second step, we provide this guarantee with a differentially private algorithm at the expense of deviating slightly from the optimality. We provide bounds on this deviation and discuss the consequences of these theoretical results. The study ends with a simulation study on a planning problem that demonstrates an application of the proposed approach. Our work provides a new optimization model and a solution approach for optimal allocation of a set of shared resources among multiple parties who expect privacy of their data. The proposed approach is based on the decomposition of the shared resources and the randomization of the optimization iterations. With our analysis, we show that the resulting randomized algorithm does give a guarantee for the privacy of each party's data. As we work with a general optimization model, our analysis and discussion can be used in different application areas including production planning, logistics, and network revenue management.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/17/2020

Multi-Party Private Set Intersection: An Information-Theoretic Approach

We investigate the problem of multi-party private set intersection (MP-P...
research
10/19/2020

Privacy-preserving Data Sharing on Vertically Partitioned Data

In this work, we present a method for differentially private data sharin...
research
03/15/2021

Multi-party Private Set Operations with an External Decider

A Private Set Operation (PSO) protocol involves at least two parties wit...
research
10/08/2021

Function-private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions

Conditional disclosure of secrets (CDS) allows multiple parties to revea...
research
07/27/2019

ActShare: Sensitive Data Sharing with Reliable Leaker Identification

Data sharing among multiple parties becomes increasingly common today, s...
research
06/16/2020

Differentially-private Federated Neural Architecture Search

Neural architecture search, which aims to automatically search for archi...
research
06/27/2022

DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning

Outsourcing anomaly detection to third-parties can allow data owners to ...

Please sign up or login with your details

Forgot password? Click here to reset