53 research outputs found

    Compressive Privacy for a Linear Dynamical System

    Full text link
    We consider a linear dynamical system in which the state vector consists of both public and private states. One or more sensors make measurements of the state vector and sends information to a fusion center, which performs the final state estimation. To achieve an optimal tradeoff between the utility of estimating the public states and protection of the private states, the measurements at each time step are linearly compressed into a lower dimensional space. Under the centralized setting where all measurements are collected by a single sensor, we propose an optimization problem and an algorithm to find the best compression matrix. Under the decentralized setting where measurements are made separately at multiple sensors, each sensor optimizes its own local compression matrix. We propose methods to separate the overall optimization problem into multiple sub-problems that can be solved locally at each sensor. We consider the cases where there is no message exchange between the sensors; and where each sensor takes turns to transmit messages to the other sensors. Simulations and empirical experiments demonstrate the efficiency of our proposed approach in allowing the fusion center to estimate the public states with good accuracy while preventing it from estimating the private states accurately

    Arbitrarily Strong Utility-Privacy Tradeoff in Multi-Agent Systems

    Full text link
    Each agent in a network makes a local observation that is linearly related to a set of public and private parameters. The agents send their observations to a fusion center to allow it to estimate the public parameters. To prevent leakage of the private parameters, each agent first sanitizes its local observation using a local privacy mechanism before transmitting it to the fusion center. We investigate the utility-privacy tradeoff in terms of the Cram\'er-Rao lower bounds for estimating the public and private parameters. We study the class of privacy mechanisms given by linear compression and noise perturbation, and derive necessary and sufficient conditions for achieving arbitrarily strong utility-privacy tradeoff in a multi-agent system for both the cases where prior information is available and unavailable, respectively. We also provide a method to find the maximum estimation privacy achievable without compromising the utility and propose an alternating algorithm to optimize the utility-privacy tradeoff in the case where arbitrarily strong utility-privacy tradeoff is not achievable

    Towards optimal strategies for the management of online information and activity: privacy and utility tradeoffs

    Get PDF
    Doctor of PhilosophyDepartment of Computer ScienceGeorge AmariucaiThe unprecedented growth of big-data applications suggests that there is a growing competition in the technological world to collect and harness tremendous amounts of user information. Tech companies and other online service providers are always seeking to enhance the quality of their products and services by collecting massive amounts of information from their user base. The collected data is typically used by the service providers to enhance the utility of the services. For instance, e-commerce services use the information about a user's purchases to recommend new products that may be of interest to the user. Similarly, streaming services use a user's ratings of various movies to recommend new and potentially interesting movies to the user. Unfortunately, the pursuit of utility often entails the loss of user privacy as the collected information often reveals sensitive information about the users, often through correlations not immediately apparent at the surface. This is aggravated by the fact that service providers often share, and even sell, their customers' information with third parties, which makes protecting the users' private information ever so critical. This dissertation seeks to address two important privacy problems. First, ensuring user privacy is not a trivial problem. At one end, service providers need customers' information to offer customized contents and personalized recommendations. The utility provided to a user is therefore positively correlated with the amount and the accuracy of the information that the user discloses to the service provider. On the other end, the collected information can be subject to inference attacks that reveal various private attributes of the user such as their income, race, political affiliation, and sexual orientation. The privacy of the user is therefore negatively correlated with the amount of disclosed information. The problem, as such, naturally manifests as a privacy-utility tradeoff problem. In this dissertation, we develop models to capture the precise notions of privacy and utility and design privacy mechanisms that maximize the utility of the disclosed information while limiting the privacy leakage. The second problem that this dissertation seeks to address is of extreme relevance: given users' tendency to continuously disclose their personal information, as in the case of social media, modeling the privacy leakage over time is paramount to devising privacy mechanisms that limit the accumulated leakage. Further, there is a natural concern regarding the effect of our current online activities on our future privacy. Modeling the problem is extremely intricate as capturing future privacy is not trivial given the inherent uncertainties surrounding the future. In this dissertation, we capture the dynamics of privacy leakage over time using a probabilistic framework. Via experimental evaluations, we demonstrate that there exist multiple promising strategies that a user can utilize to limit their future privacy leakage while maximizing their perceived utility over time

    Semantic and effective communications

    Get PDF
    Shannon and Weaver categorized communications into three levels of problems: the technical problem, which tries to answer the question "how accurately can the symbols of communication be transmitted?"; the semantic problem, which asks the question "how precisely do the transmitted symbols convey the desired meaning?"; the effectiveness problem, which strives to answer the question "how effectively does the received meaning affect conduct in the desired way?". Traditionally, communication technologies mainly addressed the technical problem, ignoring the semantics or the effectiveness problems. Recently, there has been increasing interest to address the higher level semantic and effectiveness problems, with proposals ranging from semantic to goal oriented communications. In this thesis, we propose to formulate the semantic problem as a joint source-channel coding (JSCC) problem and the effectiveness problem as a multi-agent partially observable Markov decision process (MA-POMDP). As such, for the semantic problem, we propose DeepWiVe, the first-ever end-to-end JSCC video transmission scheme that leverages the power of deep neural networks (DNNs) to directly map video signals to channel symbols, combining video compression, channel coding, and modulation steps into a single neural transform. We also further show that it is possible to use predefined constellation designs as well as secure the physical layer communication against eavesdroppers for deep learning (DL) driven JSCC schemes, making such schemes much more viable for deployment in the real world. For the effectiveness problem, we propose a novel formulation by considering multiple agents communicating over a noisy channel in order to achieve better coordination and cooperation in a multi-agent reinforcement learning (MARL) framework. Specifically, we consider a MA-POMDP, in which the agents, in addition to interacting with the environment, can also communicate with each other over a noisy communication channel. The noisy communication channel is considered explicitly as part of the dynamics of the environment, and the message each agent sends is part of the action that the agent can take. As a result, the agents learn not only to collaborate with each other but also to communicate "effectively'' over a noisy channel. Moreover, we show that this framework generalizes both the semantic and technical problems. In both instances, we show that the resultant communication scheme is superior to one where the communication is considered separately from the underlying semantic or goal of the problem.Open Acces

    Appropriate Wisdom, Technology, and Management toward Environmental Sustainability for Development

    Get PDF
    The protection and maintenance of environmental resources for future generations require responsible interaction between humans and the environment in order to avoid wasting natural resources. According to an ancient Native American proverb, “We do not inherit the Earth from our ancestors; we borrow it from our children.” This indigenous wisdom has the potential to play a significant role in defining environmental sustainability. Recent technological advances could sustain humankind and allow for comfortable living. However, not all of these advancements have the potential to protect the environment for future generations. Developing societies and maintaining the sustainability of the ecosystem require appropriate wisdom, technology, and management collaboration. This book is a collection of 19 important articles (15 research articles, 3 review papers, and 1 editorial) that were published in the Special Issue of the journal Sustainability entitled “Appropriate Wisdom, Technology, and Management toward Environmental Sustainability for Development” during 2021-2022.addresses the policymakers and decision-makers who are willing to develop societies that practice environmental sustainability, by collecting the most recent contributions on the appropriate wisdom, technology, and management regarding the different aspects of a community that can retain environmental sustainability

    11th International Conference on Business, Technology and Innovation 2022

    Get PDF
    Welcome to IC – UBT 2022 UBT Annual International Conference is the 11th international interdisciplinary peer reviewed conference which publishes works of the scientists as well as practitioners in the area where UBT is active in Education, Research and Development. The UBT aims to implement an integrated strategy to establish itself as an internationally competitive, research-intensive university, committed to the transfer of knowledge and the provision of a world-class education to the most talented students from all background. The main perspective of the conference is to connect the scientists and practitioners from different disciplines in the same place and make them be aware of the recent advancements in different research fields, and provide them with a unique forum to share their experiences. It is also the place to support the new academic staff for doing research and publish their work in international standard level. This conference consists of sub conferences in different fields like: Security Studies Sport, Health and Society Psychology Political Science Pharmaceutical and Natural Sciences Mechatronics, System Engineering and Robotics Medicine and Nursing Modern Music, Digital Production and Management Management, Business and Economics Language and Culture Law Journalism, Media and Communication Information Systems and Security Integrated Design Energy Efficiency Engineering Education and Development Dental Sciences Computer Science and Communication Engineering Civil Engineering, Infrastructure and Environment Architecture and Spatial Planning Agriculture, Food Science and Technology Art and Digital Media This conference is the major scientific event of the UBT. It is organizing annually and always in cooperation with the partner universities from the region and Europe. We have to thank all Authors, partners, sponsors and also the conference organizing team making this event a real international scientific event. Edmond Hajrizi, President of UBT UBT – Higher Education Institutio

    LIPIcs, Volume 251, ITCS 2023, Complete Volume

    Get PDF
    LIPIcs, Volume 251, ITCS 2023, Complete Volum
    • …
    corecore