Secure Transformation for Multiparty Linear Programming

نویسندگان

  • Yuan Hong
  • Jaideep Vaidya
چکیده

With the rapid increase in computing, storage and networking resources, data is not only collected and stored, but also collaboratively analyzed. This creates a serious privacy problem which often inhibits the use of the distributed data. In this paper, we focus on the problem of linear programming, which is the most important sub-class of optimization problems. Specifically, distributed linear programming problems allow different companies (even competitors) to collaboratively seek the maximum profit or minimum cost by better utilizing the combination of their limited resources (constraints). However, the constraints and the objective are typically distributed across different companies. Since the constraints generally refer to internal limitations or capacities, and the objective specifies internal costs or value, serious privacy and security problems arise if these are completely disclosed to other companies. The main contribution of this paper is to introduce privacy-preserving distributed linear programming techniques to resolve the above issue for several real-world distributed linear programming problems. We present a transformation based approach that works for arbitrarily partitioned data distributed between multiple parties, and experimentally evaluate our solution.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation

Cryptographic solutions to privacy-preserving multiparty linear programming are slow. This makes them unsuitable for many economically important applications, such as supply chain optimization, whose size exceeds their practically feasible input range. In this paper we present a privacy-preserving transformation that allows secure outsourcing of the linear program computation in an efficient ma...

متن کامل

Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming

For many applications of secure multiparty computation it is natural to demand that the output of the protocol is verifiable. Verifiability should ensure that incorrect outputs are always rejected, even if all parties executing the secure computation collude. Since the inputs to a secure computation are private, and potentially the outputs are private as well, adding verifiability is in general...

متن کامل

Secure Multiparty Linear Programming Using Fixed-Point Arithmetic

Collaborative optimization problems can often be modeled as a linear program whose objective function and constraints combine data from several parties. However, important applications of this model (e.g., supply chain planning) involve private data that the parties cannot reveal to each other. Traditional linear programming methods cannot be used in this case. The problem can be solved using c...

متن کامل

Languages for Secure Multiparty Computation and Towards Strongly Typed Macros

We show that it is feasible and useful to create programming languages with strong security guarantees for secure multiparty computation. We have designed and implemented the Secure Multiparty Computation Language (SMCL), which is a domain-specific programming language for secure multiparty computation. SMCL allows programmers to write programs using secure multiparty computation without expert...

متن کامل

A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection

We propose a method for applying genetic algorithms to confidential data. Genetic algorithms are a well-known tool for finding approximate solutions to various optimization and searching problems. More specifically, we present a secure solution for solving the subset cover problem which is formulated by a binary integer linear programming (BIP) problem (i.e. a linear programming problem, where ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012