Abstract
Due to the variety of the data source and the veracity of their trustworthiness, it is challenging to solve the distributed optimization problems in the big data applications owing to the privacy concerns. We propose a framework for distributed multi-agent greedy algorithms whereby any greedy algorithm that fits our requirement can be converted to a privacy-preserving one. After the conversion, the private information associated with each agent will not be disclosed to anyone else but the owner, and the same output as the plain greedy algorithm is computed by the converted one. Our theoretic analysis shows the security of the framework, and the implementation also shows good performance.
X.-Y. Li—The research is partially supported by NSF ECCS-1247944 and NSF CMMI 1436786.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bo, C., Shen, G., Liu, J., Li, X.-Y., Zhang, Y., Zhao, F.: Privacy. tag: privacy concern expressed and respected. In: SenSys, pp. 163–176. ACM (2014)
Chen, X., Wu, X., Li, X.-Y., He, Y., Liu, Y.: Privacy-preserving high-quality map generation with participatory sensing. In: INFOCOM, pp. 2310–2318. IEEE (2014)
Zhao, J., Jung, T., Wang, Y., Li, X.: Achieving differential privacy of data disclosure in the smart grid. In: INFOCOM, pp. 504–512. IEEE (2014)
Modi, P.J., Shen, W.-M., Tambe, M., Yokoo, M.: Adopt: Asynchronous distributed constraint optimization with quality guarantees. A.I. (2005)
Boyd, S., Parikh, N., Chu, E., Peleato, B., Eckstein, J.: Distributed optimization and statistical learning via the alternating direction method of multipliers. Foundations and Trends in Machine Learning (2011)
Shi, Y., Hou, Y.T.: A distributed optimization algorithm for multi-hop cognitive radio networks. In: INFOCOM. IEEE (2008)
Yokoo, M., Suzuki, K., Hirayama, K.: Secure distributed constraint satisfaction: Reaching agreement without revealing private information. A.I. (2005)
Silaghi, M.C., Mitra, D.: Distributed constraint satisfaction and optimization with privacy enforcement. In: IAT. IEEE (2004)
Silaghi, M.C., Yokoo, M.: Nogood based asynchronous distributed optimization (adopt ng). In: AAMAS. ACM (2006)
Yokoo, M., Durfee, E.H., Ishida, T., Kuwabara, K.: The distributed constraint satisfaction problem: Formalization and algorithms. IEEE Transactions on Knowledge and Data Engineering (1998)
Zivan, R.: Anytime local search for distributed constraint optimization. In: AAMAS (2008)
Jung, T., Mao, X., Li, X.-Y., Tang, S.-J., Gong, W., Zhang, L.: Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation. In: INFOCOM, pp. 2634–2642. IEEE (2013)
Yao, A.C.: Protocols for secure computations. In: FOCS (1982)
Yao, A.C.-C.: How to generate and exchange secrets. In: FOCS. IEEE (1986)
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Communications of the ACM (1985)
Jung, T., Li, X.-Y.: Enabling privacy-preserving auctions in big data. In: BigSecurity, INFOCOM Workshops. IEEE (2015)
Zhang, L., Jung, T., Feng, P., Liu, K., Li, X.-Y., Liu, Y.: Pic: enable large-scale privacy-preserving content-based image search on cloud. In: ICPP. IEEE (2015)
Zhang, L., Jung, T., Liu, C., Ding, X., Li, X.-Y., Liu, Y.: Pop: privacy-preserving outsourced photo sharing and searching for mobile devices. In: ICDCS. IEEE (2015)
Zhang, L., Li, X.-Y., Liu, Y.: Message in a sealed bottle: privacy preserving friending in social networks. In ICDCS, pp. 327–336. IEEE (2013)
Yokoo, M., Ishida, T., Durfee, E.H., Kuwabara, K.: Distributed constraint satisfaction for formalizing distributed problem solving. In: ICDCS. IEEE (1992)
Jung, T., Li, X.-Y., Wan, Z., Wan, M.: Privacy preserving cloud data access with multi-authorities. In: INFOCOM, pp. 2625–2633. IEEE (2013)
Zhang, L., Li, X.-Y., Liu, Y., Jung, T.: Verifiable private multi-party computation: ranging and ranking. In: INFOCOM, pp. 605–609. IEEE (2013)
Jung, T., Li, X., Wan, Z., Wan, M.: Control cloud data access privilege and anonymity with fully anonymous attribute based encryption. TIFS 10(1), 190–199 (2014)
Li, X.-Y., Jung, T.: Search me if you can: privacy-preserving location query service. In: INFOCOM, pp. 2760–2768. IEEE (2013)
Zhang, L., Li, X., Liu, K., Jung, T., Liu, Y.: Message in a sealed bottle: Privacy preserving friending in mobile social networks. TMC (2014)
Jung, T., Li, X.-Y.: Collusion-tolerable privacy-preserving sum and product calculation without secure channel. TDSC 12(1), 45–57 (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Jung, T., Li, XY., Han, J. (2015). A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm. In: Wang, Y., Xiong, H., Argamon, S., Li, X., Li, J. (eds) Big Data Computing and Communications. BigCom 2015. Lecture Notes in Computer Science(), vol 9196. Springer, Cham. https://doi.org/10.1007/978-3-319-22047-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-22047-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-22046-8
Online ISBN: 978-3-319-22047-5
eBook Packages: Computer ScienceComputer Science (R0)