Privacy-Preserving Distributed Processing: Metrics, Bounds and Algorithms

نویسندگان

چکیده

Privacy-preserving distributed processing has recently attracted considerable attention. It aims to design solutions for conducting signal tasks over networks in a decentralized fashion without violating privacy. Many existing algorithms can be adopted solve this problem such as differential privacy, secure multiparty computation, and the proposed optimization based subspace perturbation algorithms. However, since each of them is derived from different context metrics assumptions, it hard choose or an appropriate algorithm processing. In order address problem, we first propose general mutual information information-theoretical that are able compare relate these terms two key aspects: output utility individual We consider widely-used adversary models, passive eavesdropping adversary. Moreover, derive lower bound on privacy which helps understand nature provides insights preferred given conditions. To validate above claims, investigate concrete example number state-of-the-art approaches concerned aspects using not only theoretical analysis but also numerical validation. Finally, discuss provide principles designing applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy-preserving Statistical Query and Processing on Distributed OpenEHR Data

UNLABELLED Reuse of data from EHRs is essential for many purposes. The objective of the study was to explore how distributed electronic health record (EHR) data can be reused for privacy-preserving statistical query and processing. METHOD We have designed and created a proof of concept prototype solution based on the OpenEHR specification to ensure interoperability and to query the EHRs. XMPP...

متن کامل

Privacy - Preserving Distributed Computation

P4P: A Practical Framework for Privacy-Preserving Distributed Computation

متن کامل

Privacy-preserving distributed clustering

Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a data set. The data set to be used for clustering can be owned by a single entity, or in some cases, information from different databases is pooled to enrich the data so that the merged data...

متن کامل

Privacy-Preserving Regression Algorithms

Regression is arguably the most applied data analysis method. Today there are many scenarios where data for attributes that correspond to predictor variables and the response variable itself are distributed among several parties that do not trust each other. Privacy-preserving data mining has grown rapidly studying the scenarios where data is vertically partitioned. While algorithms have been d...

متن کامل

Privacy Preserving Speech Processing

Speech is one of the most private forms of communication. People do not like to be eavesdropped on. They will frequently even object to being recorded; in fact in many places it is illegal to record people speaking in public, even when it is acceptable to capture their images on video [1]. Yet, when a person uses a speech-based service such as a voice authentication system or a speech recogniti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Information Forensics and Security

سال: 2021

ISSN: ['1556-6013', '1556-6021']

DOI: https://doi.org/10.1109/tifs.2021.3050064