Immersion and Invariance-based Coding for Privacy in Remote Anomaly Detection

11/21/2022
by   Haleh Hayati, et al.
0

We present a framework for the design of coding mechanisms that allow remotely operating anomaly detectors in a privacy-preserving manner. We consider the following problem setup. A remote station seeks to identify anomalies based on system input-output signals transmitted over communication networks. However, it is not desired to disclose true data of the system operation as it can be used to infer private information. To prevent adversaries from eavesdropping on the network or at the remote station itself to access private data, we propose a privacy-preserving coding scheme to distort signals before transmission. As a next step, we design a new anomaly detector that runs on distorted signals and produces distorted diagnostics signals, and a decoding scheme that allows extracting true diagnostics data from distorted signals without error. The proposed scheme is built on the synergy of matrix encryption and system Immersion and Invariance (I I) tools from control theory. The idea is to immerse the anomaly detector into a higher-dimensional system (the so-called target system). The dynamics of the target system is designed such that: the trajectories of the original anomaly detector are immersed/embedded in its trajectories, it works on randomly encoded input-output signals, and produces an encoded version of the original anomaly detector alarm signals, which are decoded to extract the original alarm at the user side. We show that the proposed privacy-preserving scheme provides the same anomaly detection performance as standard Kalman filter-based chi-squared anomaly detectors while revealing no information about system data.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/03/2021

Finite Horizon Privacy of Stochastic Dynamical Systems: A Synthesis Framework for Dependent Gaussian Mechanisms

We address the problem of synthesizing distorting mechanisms that maximi...
research
02/14/2022

DeCorus: Hierarchical Multivariate Anomaly Detection at Cloud-Scale

Multivariate anomaly detection can be used to identify outages within la...
research
03/30/2023

Infinite Horizon Privacy in Networked Control Systems: Utility/Privacy Tradeoffs and Design Tools

We address the problem of synthesizing distorting mechanisms that maximi...
research
04/18/2020

Anomaly Detection in Connected and Automated Vehicles using an Augmented State Formulation

In this paper we propose a novel observer-based method for anomaly detec...
research
04/05/2022

Privacy-Preserving Federated Learning via System Immersion and Random Matrix Encryption

Federated learning (FL) has emerged as a privacy solution for collaborat...
research
02/27/2018

Graph-based Image Anomaly Detection

RX Detector is recognized as the benchmark algorithm for image anomaly d...
research
06/27/2022

DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning

Outsourcing anomaly detection to third-parties can allow data owners to ...

Please sign up or login with your details

Forgot password? Click here to reset