Privacy-Preserving Distributed Processing: Metrics, Bounds and Algorithms
نویسندگان
چکیده
Privacy-preserving distributed processing has recently attracted considerable attention. It aims to design solutions for conducting signal tasks over networks in a decentralized fashion without violating privacy. Many existing algorithms can be adopted solve this problem such as differential privacy, secure multiparty computation, and the proposed optimization based subspace perturbation algorithms. However, since each of them is derived from different context metrics assumptions, it hard choose or an appropriate algorithm processing. In order address problem, we first propose general mutual information information-theoretical that are able compare relate these terms two key aspects: output utility individual We consider widely-used adversary models, passive eavesdropping adversary. Moreover, derive lower bound on privacy which helps understand nature provides insights preferred given conditions. To validate above claims, investigate concrete example number state-of-the-art approaches concerned aspects using not only theoretical analysis but also numerical validation. Finally, discuss provide principles designing applications.
منابع مشابه
Privacy-preserving Statistical Query and Processing on Distributed OpenEHR Data
UNLABELLED Reuse of data from EHRs is essential for many purposes. The objective of the study was to explore how distributed electronic health record (EHR) data can be reused for privacy-preserving statistical query and processing. METHOD We have designed and created a proof of concept prototype solution based on the OpenEHR specification to ensure interoperability and to query the EHRs. XMPP...
متن کاملPrivacy - Preserving Distributed Computation
P4P: A Practical Framework for Privacy-Preserving Distributed Computation
متن کاملPrivacy-preserving distributed clustering
Clustering is a very important tool in data mining and is widely used in on-line services for medical, financial and social environments. The main goal in clustering is to create sets of similar objects in a data set. The data set to be used for clustering can be owned by a single entity, or in some cases, information from different databases is pooled to enrich the data so that the merged data...
متن کاملPrivacy-Preserving Regression Algorithms
Regression is arguably the most applied data analysis method. Today there are many scenarios where data for attributes that correspond to predictor variables and the response variable itself are distributed among several parties that do not trust each other. Privacy-preserving data mining has grown rapidly studying the scenarios where data is vertically partitioned. While algorithms have been d...
متن کاملPrivacy Preserving Speech Processing
Speech is one of the most private forms of communication. People do not like to be eavesdropped on. They will frequently even object to being recorded; in fact in many places it is illegal to record people speaking in public, even when it is acceptable to capture their images on video [1]. Yet, when a person uses a speech-based service such as a voice authentication system or a speech recogniti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2021
ISSN: ['1556-6013', '1556-6021']
DOI: https://doi.org/10.1109/tifs.2021.3050064