Privacy Preservation by Intermittent Transmission in Cooperative LQG Control Systems
Abstract: In this paper, we study a cooperative linear quadratic Gaussian (LQG) control system with a single user and a server. In this system, the user runs a process and employs the server to meet the needs of computation. However, the user regards its state trajectories as privacy. Therefore, we propose a privacy scheme, in which the user sends data to the server intermittently. By this scheme, the server's received information of the user is reduced, and consequently the user's privacy is preserved. In this paper, we consider a periodic transmission scheme. We analyze the performance of privacy preservation and LQG control of different transmission periods. Under the given threshold of the control performance loss, a trade-off optimization problem is proposed. Finally, we give the solution to the optimization problem.
- J. P. Hespanha, P. Naghshtabrizi, and Y. Xu, “A survey of recent results in networked control systems,” Proceedings of the IEEE, vol. 95, no. 1, pp. 138–162, 2007.
- T. K. Mendhe, P. Kamble, and A. K. Thakre, “Survey on security, storage, and networking of cloud computing,” International Journal on Computer Science and Engineering, vol. 4, no. 11, p. 1780, 2012.
- J. Le Ny and G. J. Pappas, “Differentially private filtering,” IEEE Transactions on Automatic Control, vol. 59, no. 2, pp. 341–354, 2013.
- E. Nekouei, T. Tanaka, M. Skoglund, and K. H. Johansson, “Information-theoretic approaches to privacy in estimation and control,” Annual Reviews in Control, vol. 47, pp. 412–422, 2019.
- C. Dwork, “Differential privacy,” in International colloquium on automata, languages, and programming, 2006, pp. 1–12.
- C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in Theory of Cryptography: Third Theory of Cryptography Conference. Proceedings 3, 2006, pp. 265–284.
- Y. Kawano, K. Kashima, and M. Cao, “A fundamental performance limit of cloud-based control in terms of differential privacy level,” IFAC-PapersOnLine, vol. 53, no. 2, pp. 11 018–11 023, 2020.
- J. Le Ny and M. Mohammady, “Differentially private MIMO filtering for event streams,” IEEE Transactions on Automatic Control, vol. 63, no. 1, pp. 145–157, 2017.
- K. Yazdani, A. Jones, K. Leahy, and M. Hale, “Differentially private LQ control,” IEEE Transactions on Automatic Control, vol. 68, no. 2, pp. 1061–1068, 2023.
- K. H. Degue and J. Le Ny, “Cooperative differentially private LQG control with measurement aggregation,” IEEE Control Systems Letters, vol. 7, pp. 1093–1098, 2023.
- M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, “Deep learning with differential privacy,” in Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, 2016, pp. 308–318.
- A. Friedman and A. Schuster, “Data mining with differential privacy,” in Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining, 2010, pp. 493–502.
- T. Ding, S. Zhu, C. Chen, J. Xu, and X. Guan, “Differentially private distributed resource allocation via deviation tracking,” IEEE Transactions on Signal and Information Processing over Networks, vol. 7, pp. 222–235, 2021.
- F. Gauthier, V. C. Gogineni, S. Werner, Y.-F. Huang, and A. Kuh, “Personalized graph federated learning with differential privacy,” IEEE Transactions on Signal and Information Processing over Networks, vol. 9, pp. 736–749, 2023.
- P. Hao and X. Wang, “Integrating PHY security into NDN-IoT networks by exploiting MEC: Authentication efficiency, robustness, and accuracy enhancement,” IEEE Transactions on Signal and Information Processing over Networks, vol. 5, no. 4, pp. 792–806, 2019.
- E. Nekouei, H. Sandberg, M. Skoglund, and K. H. Johansson, “Privacy-aware minimum error probability estimation: An entropy constrained approach,” arXiv preprint arXiv:1808.02271, 2018.
- R. Jia, R. Dong, S. S. Sastry, and C. J. Spanos, “Privacy-enhanced architecture for occupancy-based hvac control,” in Proceedings of the 8th international conference on cyber-physical systems, 2017, pp. 177–186.
- E. Nekouei, M. Skoglund, and K. H. Johansson, “Privacy of information sharing schemes in a cloud-based multi-sensor estimation problem,” in 2018 annual american control conference (ACC), 2018, pp. 998–1002.
- G. Kramer, “Capacity results for the discrete memoryless network,” IEEE Transactions on Information Theory, vol. 49, no. 1, pp. 4–21, 2003.
- T. Tanaka, M. Skoglund, H. Sandberg, and K. H. Johansson, “Directed information and privacy loss in cloud-based control,” in 2017 American Control Conference (ACC), 2017, pp. 1666–1672.
- K. Kogiso and T. Fujita, “Cyber-security enhancement of networked control systems using homomorphic encryption,” in 2015 54th IEEE Conference on Decision and Control (CDC), 2015, pp. 6836–6843.
- A. B. Alexandru and G. J. Pappas, “Encrypted LQG using labeled homomorphic encryption,” in Proceedings of the 10th ACM/IEEE international conference on cyber-physical systems, 2019, pp. 129–140.
- F. Farokhi, I. Shames, and N. Batterham, “Secure and private cloud-based control using semi-homomorphic encryption,” IFAC-PapersOnLine, vol. 49, no. 22, pp. 163–168, 2016.
- M. Faiz, N. Fatima, R. Sandhu, M. Kaur, and V. Narayan, “Improved homomorphic encryption for security in cloud using particle swarm optimization,” Journal of Pharmaceutical Negative Results, pp. 4761–4771, 2022.
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.