Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
139 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Information-Theoretic Opacity-Enforcement in Markov Decision Processes (2405.00157v2)

Published 30 Apr 2024 in eess.SY and cs.SY

Abstract: The paper studies information-theoretic opacity, an information-flow privacy property, in a setting involving two agents: A planning agent who controls a stochastic system and an observer who partially observes the system states. The goal of the observer is to infer some secret, represented by a random variable, from its partial observations, while the goal of the planning agent is to make the secret maximally opaque to the observer while achieving a satisfactory total return. Modeling the stochastic system using a Markov decision process, two classes of opacity properties are considered -- Last-state opacity is to ensure that the observer is uncertain if the last state is in a specific set and initial-state opacity is to ensure that the observer is unsure of the realization of the initial state. As the measure of opacity, we employ the Shannon conditional entropy capturing the information about the secret revealed by the observable. Then, we develop primal-dual policy gradient methods for opacity-enforcement planning subject to constraints on total returns. We propose novel algorithms to compute the policy gradient of entropy for each observation, leveraging message passing within the hidden Markov models. This gradient computation enables us to have stable and fast convergence. We demonstrate our solution of opacity-enforcement control through a grid world example.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (28)
  1. A maximization technique occurring in the statistical analysis of probabilistic functions of markov chains. The annals of mathematical statistics, 41(1):164–171, 1970.
  2. Probabilistic opacity for Markov decision processes. Information Processing Letters, 115(1):52–59, January 2015.
  3. Quantifying opacity†. Mathematical Structures in Computer Science, 25(2):361–403, February 2015. Publisher: Cambridge University Press.
  4. Fast global convergence of natural policy gradient methods with entropy regularization. Operations Research, 70(4):2563–2578, 2022.
  5. Opacity enforcing control synthesis. In 2008 9th International Workshop on Discrete Event Systems, pages 28–35, 2008.
  6. Overview of Opacity in Discrete Event Systems. IEEE Access, 8:48731–48741, 2020. Conference Name: IEEE Access.
  7. Strong current-state and initial-state opacity of discrete-event systems. Automatica (Oxford), 148:110756, 2023.
  8. Probabilistic system opacity in discrete event systems. In 2016 13th International Workshop on Discrete Event Systems (WODES), pages 379–384, May 2016.
  9. Leakage-minimal design: Universality, limitations, and applications. In 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pages 305–317, 2017.
  10. Feng Lin. Opacity of discrete event systems and its applications. Automatica, 47(3):496–503, 2011.
  11. Covert planning against imperfect observers, 2023.
  12. Covert path planning for autonomous robot navigation. 01 2004.
  13. M. Marzouqi and R.A. Jarvis. Covert path planning in unknown environments with known or suspected sentry location. In 2005 IEEE/RSJ International Conference on Intelligent Robots and Systems, pages 1772–1778, 2005.
  14. Laurent Mazaré. Using unification for opacity properties. 2004.
  15. Smoother entropy for active state trajectory estimation and obfuscation in pomdps. IEEE Transactions on Automatic Control, PP:1–16, 06 2023.
  16. Bridging the gap between value and policy based reinforcement learning. 2017.
  17. Notions of security and opacity in discrete event systems. In 2007 46th IEEE Conference on Decision and Control, pages 5056–5061. IEEE, 2007.
  18. Verification of k-step opacity and analysis of its complexity. In Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference, pages 205–210, 2009.
  19. Current-state opacity formulations in probabilistic finite automata. IEEE Transactions on automatic control, 59(1):120–133, 2013.
  20. Verification of initial-state opacity in security applications of discrete event systems. Information Sciences, 246:115–132, 2013.
  21. Entropy maximization for markov decision processes under temporal logic constraints. IEEE Transactions on Automatic Control, 65(4):1552–1567, 2020.
  22. C. E. Shannon. Communication theory of secrecy systems. The Bell System Technical Journal, 28(4):656–715, 1949.
  23. Synthesis of opacity-enforcing winning strategies against colluded opponent, 2023.
  24. Policy gradient methods for reinforcement learning with function approximation. In S. Solla, T. Leen, and K. Müller, editors, Advances in Neural Information Processing Systems, volume 12. MIT Press, 1999.
  25. Paul Watson. A Multi-Level Security Model for PartitioningWorkflows over Federated Clouds. In 2011 IEEE Third International Conference on Cloud Computing Technology and Science, pages 180–188, November 2011.
  26. H. Yasuoka and T. Terauchi. Quantitative information flow - verification hardness and possibilities. In 2010 IEEE 23rd Computer Security Foundations Symposium (CSF 2010), pages 15–27, Los Alamitos, CA, USA, jul 2010. IEEE Computer Society.
  27. Infinite-step opacity and K-step opacity of stochastic discrete-event systems. Automatica, 99:266–274, January 2019.
  28. Quantitative Analysis of Opacity in Cloud Computing Systems. IEEE Transactions on Cloud Computing, 9(3):1210–1219, July 2021.
Citations (1)

Summary

We haven't generated a summary for this paper yet.

Youtube Logo Streamline Icon: https://streamlinehq.com