Privatizing Constraint Optimization, Thesis Abstract

نویسنده

  • Rachel Greenstadt
چکیده

My thesis proposes novel schemes for achieving privacy in constraint optimization and new ways of analyzing the privacy properties of constraint optimization algorithms. Thus, it aims to contribute to the fields of constraint processing and multiagent systems. Motivation: Many problem domains within constraint processing require algorithms that better accomodate the need for privacy. Two salient examples are described in the following paragraphs. Coordinating the schedules of muliple agents is a problem domain that naturally motivates the need for privacy preserving constraint optimization algorithms. In this domain, a number of agents wish to schedule events subject to individual constraints, which they wish to keep private. Their calendars may contain the intersection of multiple professional endeavors as well as events relevant to their personal lives. The agents involved want a solution that will optimize global social welfare, but are not willing for everyone to know their preferences. For example, scheduling constraints may expose attendance at support group meetings. Resource allocation problems provide another motivating example. Imagine several government, corporate and nonprofit groups that come together to help with some disaster relief effort. They all wish to contribute resources that will lead to the optimal end, but they are mutually distrustful in most of their other endeavors and do not want the other entities to know the details of their individual holdings and constraints. Background: Initially, all constraint processing algorithms were centralized; all constraints were communicated to and optimized by a central server. The central server thus knew everything about everyone. Concerns about privacy and efficiency led to the development of distributed constraint satisfaction and optimization algorithms (Yokoo et al. 1998; Modi et al. 2005). In these algorithms, each agent owns its own constraints and passes messages as necessary to other agents to collaboratively compute the solution. Since information is distributed among many agents, these algorithms were thought to provide more privacy. However, recent work has shown that in some cases, distributed algorithms lead to greater privacy loss than the traditional centralized solutions; everybody learning everything about

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privatizing Constraint Optimization

My thesis will contribute to the fields of constraint processing and multiagent systems by proposing novel schemes for achieving privacy in constraint optimization as well as new ways of analyzing and understanding the privacy properties of constraint optimization algorithms. Motivation: It is my belief that there are many domains within constraint processing that motivate the need for more pri...

متن کامل

A Performance-driven Framework for Customizing CSP Middleware Support

A Distributed Constraint Satisfaction Problem (DCSP) aims to find consistent assignments of values to a set of variables distributed on multiple nodes. Despite its simple definition, DCSPs can model a broad variety of traditional artificial intelligence problems. Furthermore, many problems found in emerging sensor-actuator networks can be formalized to DCSPs. However, due to the platform limita...

متن کامل

Pseudonormality and a Lagrange Multiplier Theory

Lagrange multipliers are central to analytical and computational studies in linear and nonlinear optimization and have applications in a wide variety of fields, including communication, networking, economics, and manufacturing. In the past, the main research in Lagrange multiplier theory has focused on developing general and easily verifiable conditions on the constraint set, called constraint ...

متن کامل

The relation between pseudonormality and quasiregularity in constrained optimization

We consider optimization problems with equality, inequality, and abstract set constraints. We investigate the relations between various characteristics of the constraint set related to the existence of Lagrange multipliers. For problems with no abstract set constraint, the classical condition of quasiregularity provides the connecting link between the most common constraint qualifications and e...

متن کامل

Analyses, Optimizations and Extensions of Constraint Handling Rules: Ph.D. Summary

This is a summary of the Ph.D. thesis of Tom Schrijvers [4]. Constraint Handling Rules (CHR) [3] is a rule-based language commonly embedded in a host language. It combines elements of Constraint Logic Programming and term rewriting. Several implementations of CHR exist: in Prolog, Haskell, Java and HAL. Typical applications of CHR are in the area of constraint solving, but currently CHR is also...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006