TY - GEN
T1 - Convex optimization-based Privacy-Preserving Distributed Least Squares via Subspace Perturbation
AU - Li, Qiongxiu
AU - Heusdens, Richard
AU - Christensen, Mads Græsbøll
PY - 2021
Y1 - 2021
N2 - Over the past decades, privacy-preservation has received considerable attention, not only as a consequence of regulations such as the General Data Protection Regulation in the EU, but also from the fact that people are more concerned about data abuse as the world is becoming increasingly digitized. In this paper we propose a convex optimization-based subspace perturbation approach to solve privacy-preserving distributed least squares problems. Based on the primal-dual method of multipliers, the introduced dual variables will only converge in a subspace determined by the graph topology and do not converge in its orthogonal complement. We, therefore, propose to exploit this property for privacy-preservation by using the nonconverging part of the dual variables to perturb the private data, thereby protecting it from being revealed. Moreover, we prove that the proposed approach is secure under both eavesdropping and passive adversaries. Computer simulations are conducted to demonstrate the benefits of the proposed approach through its convergence properties and accuracy.
AB - Over the past decades, privacy-preservation has received considerable attention, not only as a consequence of regulations such as the General Data Protection Regulation in the EU, but also from the fact that people are more concerned about data abuse as the world is becoming increasingly digitized. In this paper we propose a convex optimization-based subspace perturbation approach to solve privacy-preserving distributed least squares problems. Based on the primal-dual method of multipliers, the introduced dual variables will only converge in a subspace determined by the graph topology and do not converge in its orthogonal complement. We, therefore, propose to exploit this property for privacy-preservation by using the nonconverging part of the dual variables to perturb the private data, thereby protecting it from being revealed. Moreover, we prove that the proposed approach is secure under both eavesdropping and passive adversaries. Computer simulations are conducted to demonstrate the benefits of the proposed approach through its convergence properties and accuracy.
U2 - 10.23919/Eusipco47968.2020.9287473
DO - 10.23919/Eusipco47968.2020.9287473
M3 - Article in proceeding
SN - 978-1-7281-5001-7
SN - 978-9-08279-704-6
T3 - Proceedings of the European Signal Processing Conference
SP - 2110
EP - 2114
BT - 28th European Signal Processing Conference (EUSIPCO)
PB - IEEE
T2 - 2020 28th European Signal Processing Conference (EUSIPCO)
Y2 - 18 January 2021 through 21 January 2021
ER -