Skip to main content

Differentially Private Anomaly Detection for Interconnected Systems

  • Chapter
  • First Online:
Safety, Security and Privacy for Cyber-Physical Systems

Part of the book series: Lecture Notes in Control and Information Sciences ((LNCIS,volume 486))

  • 1111 Accesses

Abstract

Detecting anomalies in large-scale distributed systems, such as cyber-attacks launched against intelligent transportation systems and other critical infrastructures, or epidemics spreading in human populations, requires the collection and processing of privacy-sensitive data from individuals, such as location traces or medical records. Differential privacy is a powerful theoretical tool that by applying so-called randomized mechanisms to individual data, allows to do meaningful computations at the population level whose results are insensitive, in a probabilistic sense, to the data of any given individual. So far, differential privacy has been applied to several control problems, such as distributed optimization and estimation, filtering and anomaly detection. Still, several issues are open, regarding the balance between the accuracy of the computation results and the guaranteed privacy level for the individuals, as well as the dependence of this balance on the type of randomized mechanism used and on where, in the data acquisition and processing pipeline, the noise is applied. In this chapter, we explore the possibility of using differentially private mechanisms to develop fault-detection algorithms with privacy guarantees and discuss the resulting trade-offs between detection performance and privacy level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We stress that while \(\alpha \) is the desired value of the probability of Type I errors, which is used in the design of the threshold, \(P_I\) denotes the actual value. The two are the same as long as the agent \(\mathcal {L}\)’s knowledge of the model of \(\mathcal {S}\) and of the mean and covariance of the uncertainty terms appearing there are correct as stated in Assumptions 10.1 and 10.2.

  2. 2.

    In the literature, the quantity \(1-\beta \) is also termed the probability of Type II errors and denoted as \(P_{II}\), or equivalently the expected Missed Detection Rate (MDR, see [12]).

References

  1. Alexandru, A.B., Darup, M.S., Pappas, G.J.: Encrypted cooperative control revisited. In: 2019 IEEE 58th Conference on Decision and Control (CDC), pp. 7196–7202. IEEE (2019)

    Google Scholar 

  2. Boem, F., Ferrari, R.M., Keliris, C., Parisini, T., Polycarpou, M.M.: A distributed networked approach for fault detection of large-scale systems. IEEE Trans. Autom. Control 62(1), 18–33 (2017)

    Article  MathSciNet  Google Scholar 

  3. Bottegal, G., Farokhi, F., Shames, I.: Preserving privacy of finite impulse response systems. IEEE Control Syst. Lett. 1(1), 128–133 (2017)

    Article  MathSciNet  Google Scholar 

  4. Brickell, J., Porter, D.E., Shmatikov, V., Witchel, E.: Privacy-preserving remote diagnostics. In: Proceedings of the 14th ACM conference on Computer and communications security, pp. 498–507 (2007)

    Google Scholar 

  5. Cárdenas, A.A., Amin, S., Schwartz, G., Dong, R., Sastry, S.: A game theory model for electricity theft detection and privacy-aware control in ami systems. In: 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 1830–1837. IEEE (2012)

    Google Scholar 

  6. Chawla, S., Dwork, C., McSherry, F., Smith, A., Wee, H.: Toward privacy in public databases. In: Theory of Cryptography Conference, pp. 363–385. Springer (2005)

    Google Scholar 

  7. Cortés, J., Dullerud, G.E., Han, S., Le Ny, J., Mitra, S., Pappas, G.J.: Differential privacy in control and network systems. In: 2016 IEEE 55th Conference on Decision and Control (CDC), pp. 4252–4272. IEEE (2016)

    Google Scholar 

  8. Cummings, R., Krehbiel, S., Mei, Y., Tuo, R., Zhang, W.: Differentially private change-point detection. In: Proceedings of the 32nd International Conference on Neural Information Processing Systems (2018)

    Google Scholar 

  9. Degue, K.H., Le Ny, J.: On differentially private Kalman filtering. In: Proceedings of the 5th IEEE Global Conference on Signal and Information Processing (GlobalSIP), Montreal, Canada (2017)

    Google Scholar 

  10. Degue, K.H., Le Ny, J.: On differentially private gaussian hypothesis testing. In: 2018 56th Annual Allerton Conference on Communication, Control, and Computing (Allerton), pp. 842–847. IEEE (2018)

    Google Scholar 

  11. Degue, K.H., Le Ny, J.: (2020) A two-stage architecture for differentially private Kalman filtering and LQG control. https://arxiv.org/abs/1707.08919

  12. Ding, S.X.: (2008) Model-based fault diagnosis techniques: design schemes, algorithms, and tools. Springer Science & Business Media

    Google Scholar 

  13. Duncan, G., Lambert, D.: Disclosure-limited data dissemination. J. Am. Stat. Assoc. 81(393), 10–28 (1986)

    Article  Google Scholar 

  14. Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: Privacy via distributed noise generation. In: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), St. Petersburg, Russia, pp. 486–503 (2006)

    Google Scholar 

  15. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Theory of Cryptography Conference, pp. 265–284. Springer (2006)

    Google Scholar 

  16. Dwork, C., Roth, A., et al.: The algorithmic foundations of differential privacy. Found. Trends® Theor. Comput. Sci. 9(3–4), 211–407 (2014)

    Google Scholar 

  17. Fan, L., Xiong, L.: Differentially private anomaly detection with a case study on epidemic outbreak detection. In: 2013 IEEE 13th International Conference on Data Mining Workshops, pp. 833–840. IEEE (2013)

    Google Scholar 

  18. Farokhi, F., Sandberg, H.: Fisher information as a measure of privacy: preserving privacy of households with smart meters using batteries. IEEE Trans. Smart Grid 9(5), 4726–4734 (2017)

    Article  Google Scholar 

  19. Farokhi, F., Shames, I., Batterham, N.: Secure and private control using semi-homomorphic encryption. Control Eng. Pract. 67, 13–20 (2017)

    Article  Google Scholar 

  20. Ferrari, R.M., Parisini, T., Polycarpou, M.M.: Distributed fault detection and isolation of large-scale discrete-time nonlinear systems: an adaptive approximation approach. IEEE Trans. Autom. Control 57(2), 275–290 (2012)

    Article  MathSciNet  Google Scholar 

  21. Gaboardi, M., Lim, H.W., Rogers, R., Vadhan, S.P.: Differentially private chi-squared hypothesis testing: goodness of fit and independence testing. In: Proceedings of the 33rd International Conference on International Conference on Machine Learning - Volume 48, JMLR.org, ICML’16, pp. 2111–2120 (2016)

    Google Scholar 

  22. Garcia, F.D., Jacobs, B.: Privacy-friendly energy-metering via homomorphic encryption. In: International Workshop on Security and Trust Management, pp. 226–238. Springer (2010)

    Google Scholar 

  23. Ge, X., Han, Q.: Distributed fault detection over sensor networks with Markovian switching topologies. Int. J. Gen. Syst. 43(3–4), 305–318 (2014)

    Article  MathSciNet  Google Scholar 

  24. Graybill, F.A.: Theory and Application of the Linear Model, vol. 183. Duxbury Press, North Scituate (1976)

    MATH  Google Scholar 

  25. Hale, M., Egerstedt, M.: Differentially private cloud-based multi-agent optimization with constraints. In: 2015 American Control Conference (ACC), pp. 1235–1240. IEEE (2015)

    Google Scholar 

  26. Hale, M., Jones, A., Leahy, K.: Privacy in feedback: the differentially private LQG. In: 2018 Annual American Control Conference (ACC), pp. 3386–3391. IEEE (2018)

    Google Scholar 

  27. Han, S., Topcu, U., Pappas, G.J.: Differentially private distributed protocol for electric vehicle charging. In: Conference on Communication, Control, and Computing, pp. 242–249. IEEE (2014)

    Google Scholar 

  28. Han, S., Topcu, U., Pappas, G.J.: Differentially private distributed constrained optimization. IEEE Trans. Autom. Control 62(1), 50–64 (2017)

    Article  MathSciNet  Google Scholar 

  29. Hoh, B., Gruteser, M., Herring, R., Ban, J., Work, D., Herrera, J.C., Bayen, A.M., Annavaram, M., Jacobson, Q.: Virtual trip lines for distributed privacy-preserving traffic monitoring. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, pp. 15–28 (2008)

    Google Scholar 

  30. Huang, Z., Mitra, S., Dullerud, G.: Differentially private iterative synchronous consensus. In: Proceedings of the CCS Workshop on Privacy in the Electronic Society (WPES), Raleigh, North Carolina (2012)

    Google Scholar 

  31. Kay, S.M.: Fundamentals of Statistical Processing, Volume 2: Detection Theory. Prentice Hall Signal Processing Series. Prentice-Hall PTR, Upper Saddle River (2009)

    Google Scholar 

  32. Kogiso, K., Fujita, T.: Cyber-security enhancement of networked control systems using homomorphic encryption. In: 2015 54th IEEE Conference on Decision and Control (CDC), pp. 6836–6843. IEEE (2015)

    Google Scholar 

  33. Le Ny, J.: Differentially private nonlinear observer design using contraction analysis. Int. J. Robust Nonlinear Control (2018)

    Google Scholar 

  34. Le Ny, J.: Differential Privacy for Dynamic Data. Springer Briefs in Electrical Engineering. Springer, Berlin (2020)

    Google Scholar 

  35. Le Ny, J., Mohammady, M.: Differentially private MIMO filtering for event streams. IEEE Trans. Autom. Control 63(1) (2018)

    Google Scholar 

  36. Le Ny, J., Pappas, G.J.: Differentially private Kalman filtering. In: Proceedings of the 50th Annual Allerton Conference on Communication, Control, and Computing (2012)

    Google Scholar 

  37. Le Ny, J., Pappas, G.J.: Privacy-preserving release of aggregate dynamic models. In: Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems (HiCoNS), Philadelphia, PA (2013)

    Google Scholar 

  38. Le Ny, J., Pappas, G.J.: Differentially private filtering. IEEE Trans. Autom. Control 59(2), 341–354 (2014)

    Article  MathSciNet  Google Scholar 

  39. Li, S., Khisti, A., Mahajan, A.: Information-theoretic privacy for smart metering systems with a rechargeable battery. IEEE Trans. Inf. Theory 64(5), 3679–3695 (2018)

    Article  MathSciNet  Google Scholar 

  40. Lindell, Y.: Secure multiparty computation for privacy preserving data mining. In: Encyclopedia of Data Warehousing and Mining, IGI Global, pp. 1005–1009 (2005)

    Google Scholar 

  41. Lu, Y., Zhu, M.: Privacy preserving distributed optimization using homomorphic encryption. Automatica 96, 314–325 (2018)

    Article  MathSciNet  Google Scholar 

  42. Mathai, A.M., Provost, S.B.: Quadratic Forms in Random Variables: Theory and Applications. Dekker (1992)

    Google Scholar 

  43. Mo, Y., Murray, R.M.: Privacy preserving average consensus. IEEE Trans. Autom. Control 62(2), 753–765 (2016)

    Article  MathSciNet  Google Scholar 

  44. Nandakumar, L., Ferrari, R., Keviczky, T.: Privacy-preserving of system model with perturbed state trajectories using differential privacy: with application to a supply chain network. IFAC-PapersOnLine 52(20), 309–314 (2019)

    Article  Google Scholar 

  45. Noursadeghi, E., Raptis, I.: Reduced-order distributed fault diagnosis for large-scale nonlinear stochastic systems. J. Dyn. Syst., Meas., Control (2017)

    Google Scholar 

  46. Nozari, E., Tallapragada, P., Cortés, J.: Differentially private average consensus: obstructions, trade-offs, and optimal algorithm design. Automatica 81, 221–231 (2017)

    Article  MathSciNet  Google Scholar 

  47. Riverso, S., Boem, F., Ferrari-Trecate, G., Parisini, T.: Plug-and-play fault detection and control-reconfiguration for a class of nonlinear large-scale constrained systems. IEEE Trans. Autom. Control 61(12), 3963–3978 (2016)

    Article  MathSciNet  Google Scholar 

  48. Rogers, R., Kifer, D.: A new class of private chi-square hypothesis tests. In: Artificial Intelligence and Statistics, pp. 991–1000 (2017)

    Google Scholar 

  49. Rostampour, V., Ferrari, R.M.G., Teixeira, A.H., Keviczky, T.: Differentially-Private distributed fault diagnosis for large-scale nonlinear uncertain systems. In: Proceedings of 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes (SAFEPROCESS 2018), Warsaw (Poland) 29–31 Aug 2018, IFAC (2018)

    Google Scholar 

  50. Sankar, L., Kar, S., Tandon, R., Poor, H.V.: Competitive privacy in the smart grid: An information-theoretic approach. In: Conference on Smart Grid Communications (SmartGridComm), pp. 220–225. IEEE (2011)

    Google Scholar 

  51. Sankar, L., Rajagopalan, S.R., Poor, H.V.: Utility-privacy tradeoffs in databases: an information-theoretic approach. IEEE Trans Inf. Forensics Secur. 8(6), 838–852 (2013)

    Article  Google Scholar 

  52. Scheffé, H.: The Analysis of Variance [1959]. Wiley, Hoboken (1999)

    Google Scholar 

  53. Simon, M.K.: Probability Distributions Involving Gaussian Random Variables: A Handbook for Engineers and Scientists. Springer Science & Business Media (2007)

    Google Scholar 

  54. Sun, Y., Baricz, Á., Zhou, S.: On the monotonicity, log-concavity, and tight bounds of the generalized marcum and nuttall \( q \)-functions. IEEE Trans. Inf. Theory 56(3), 1166–1186 (2010)

    Article  MathSciNet  Google Scholar 

  55. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain., Fuzziness Knowl.-Based Syst. 10(05), 557–570 (2002)

    Article  MathSciNet  Google Scholar 

  56. Tjell, K., Wisniewski, R.: Privacy preservation in distributed optimization via dual decomposition and admm. In: 2019 IEEE 58th Conference on Decision and Control (CDC), pp. 7203–7208. IEEE (2019)

    Google Scholar 

  57. Wang, Y., Huang, Z., Mitra, S., Dullerud, G.E.: Differential privacy in linear distributed control systems: entropy minimizing mechanisms and performance tradeoffs. IEEE Trans. Control Netw. Syst. 4(1), 118–130 (2017)

    Article  MathSciNet  Google Scholar 

  58. Zhang, D., Wang, Q., Yu, L., Song, H.: Fuzzy-model-based fault detection for a class of nonlinear systems with networked measurements. IEEE Trans. Instrum. Meas. 62(12), 3148–3159 (2013)

    Article  Google Scholar 

  59. Zhang, Q., Zhang, X.: Distributed sensor fault diagnosis in a class of interconnected nonlinear uncertain systems. Annu. Rev. Control 37(1), 170–179 (2013)

    Article  Google Scholar 

  60. Zhang, X., Polycarpou, M.M., Parisini, T.: A robust detection and isolation scheme for abrupt and incipient faults in nonlinear systems. IEEE Trans. Autom. Control 47(4), 576–593 (2002)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Riccardo M. G. Ferrari .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ferrari, R.M.G., Degue, K.H., Le Ny, J. (2021). Differentially Private Anomaly Detection for Interconnected Systems. In: Ferrari, R.M., Teixeira, A.M.H. (eds) Safety, Security and Privacy for Cyber-Physical Systems. Lecture Notes in Control and Information Sciences, vol 486. Springer, Cham. https://doi.org/10.1007/978-3-030-65048-3_10

Download citation

Publish with us

Policies and ethics