Advertisement

A Two-Stage Architecture for Differentially Private Filtering

  • Jerome Le NyEmail author
Chapter
  • 19 Downloads
Part of the SpringerBriefs in Electrical and Computer Engineering book series (BRIEFSELECTRIC)

Abstract

This chapter presents an architecture generalizing the input and output mechanisms to process dynamic data streams while enforcing differential privacy. A privacy-sensitive signal that we want to process in order to publish real-time statistics is first shaped by certain pre-filter, then perturbed to obtain a differentially private signal, and finally post-filtered to mitigate the effect of the noise and the pre-filter. A general methodology is provided for the design of such two-stage architectures, and an example demonstrates the significant performance improvements achievable over the input and output mechanisms.

References

  1. Cortés J et al (2016) Differential privacy in control and network systems. In: Proceedings of the 55th conference on decision and control, Las Vegas, NVGoogle Scholar
  2. Horn RA, Johnson CR (2012) Matrix analysis, 2nd edn. Cambridge University Press, CambridgeCrossRefGoogle Scholar
  3. Ivanov YA et al (2007) Visualizing the history of living spaces. IEEE Trans Vis Comput Graphics 13(6):1153–1160Google Scholar
  4. Kailath T, Sayed AH, Hassibi B (2000) Linear estimation. Prentice Hall, Upper Saddle RiverGoogle Scholar
  5. Le Ny J, Mohammady M (2018) Differentially private MIMO filtering for event streams. IEEE Trans Autom Control 63(1):145–157Google Scholar
  6. Li C, Miklau G (2012) An adaptive mechanism for accurate query answering under differential privacy. In: Proceedings of the conference on very large databases (VLDB), Istanbul, TurkeyGoogle Scholar
  7. Ljung L (1998) System identification: theory for the user. Information and system sciences. Prentice Hall, Uppder Saddle RiverzbMATHGoogle Scholar
  8. Salz J (1985) Digital transmission over cross-coupled linear channels. AT&T Tech J 64(6):1147–1159CrossRefGoogle Scholar
  9. Sankar L, Rajagopalan SR, Poor HV (2010) A theory of privacy and utility in databases. In: Proceedings of the IEEE international symposium on information theoryGoogle Scholar
  10. Stoica P, Moses RL (2005) Spectral analysis of signals. Prentice Hall, Upper Saddle RiverGoogle Scholar
  11. Tanaka T et al (2017) Semidefinite programming approach to gaussian sequential rate-distortion trade-offs. IEEE Trans Autom Control 62(4)Google Scholar
  12. Wren C et al (2007) The MERL motion detector dataset: 2007 workshop on massive datasets. Technical report TR2007-069. Mitsubishi Electric Research LaboratoriesGoogle Scholar
  13. Yang J, Roy S (1994) On joint transmitter and receiver optimization for multiple-input-multiple-output (MIMO) transmission systems. IEEE J Commun 42(12):3221–3231CrossRefGoogle Scholar

Copyright information

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Electrical EngineeringPolytechnique MontréalMontrealCanada

Personalised recommendations