Competitive privacy: Distributed computation with privacy guarantees

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

In a variety of distributed systems including critical infrastructure networks* such as the Smart Grid, information sharing and data exchanges are essential for reliable and sustained operation. However, despite its importance, data sharing in such systems is stymied, due to the lack of a framework that addresses the competitive interests and information leakage concerns of the various data generating agents. This leads to a new competitive privacy problem amongst the agents that captures the tension between sharing data to ensure network reliability (utility/benefit to all agents) and withholding data for profitability and privacy reasons. For a specific problem of distributed linear state estimation, recent results on tradeoff between estimate fidelity and leakage of private state data as a result of sharing data are presented for a two agent network model which demonstrates the optimality of one-shot information exchange. The applicability of such one-shot interactions for a larger network of agents is briefly discussed.

Original languageEnglish (US)
Title of host publication2013 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013 - Proceedings
Pages325-328
Number of pages4
DOIs
StatePublished - Dec 1 2013
Event2013 1st IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013 - Austin, TX, United States
Duration: Dec 3 2013Dec 5 2013

Publication series

Name2013 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013 - Proceedings

Other

Other2013 1st IEEE Global Conference on Signal and Information Processing, GlobalSIP 2013
Country/TerritoryUnited States
CityAustin, TX
Period12/3/1312/5/13

ASJC Scopus subject areas

  • Information Systems
  • Signal Processing

Fingerprint

Dive into the research topics of 'Competitive privacy: Distributed computation with privacy guarantees'. Together they form a unique fingerprint.

Cite this