Abstract
Many applications involve networks of interacting agents, each of whom is interested in making an individual inference or decision, the performance of which can be enhanced by the exchange of information with other agents. Though such agents can clearly benefit from exchanging information, they may also wish to maintain a degree of privacy in that information exchange. Such situations give rise to a notion of competitive privacy, which can be explored through a combination of information theory and game theory. In particular, information theory can be used to characterize the trade-off between privacy of data and the usefulness of that data for an individual agent, while game theory can be used to model the interactions between multiple agents each of whom is mindful of that trade-off. These ideas are explored in this chapter, first in a general setting, and then particularly in the context of data exchange for distributed state estimation, in which specific solutions can be obtained. Interesting open issues and other potential applications will also be discussed. Much of this abstract was originally used as the abstract of the author’s academic keynote address to the Workshop on Advances in Network Localization and Navigation in London in 2015 (http://anln.spsc.tugraz.at/Program2015).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Belmega, E.V., Sankar, L., Poor, H.V.: Enabling data exchange in interactive state estimation under privacy constraints. IEEE J. Sel. Top. Signal Process. 9, 1285–1297 (2015)
Berger, T.: Multiterminal source coding. In: Longo, G. (ed.) Information Theory Approach to Communications. Springer, New York (1978)
Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Comput. Sci. 9, 211–407 (2014)
Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge, MA (1991)
Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica 47, 263–291 (1979)
Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: Random data perturbation techniques and privacy preserving datamining. J. Knowl. Inf. Syst. 7, 387–414 (2005)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond \(k\)-anonymity. ACM Trans. Knowl. Discov. Data 1, 24 (2007)
Monderer, D., Shapley, L.S.: Potential games. Games Econ. Behav. 14, 124–143 (1996)
Raghunathan, T.E., Reiter, J.P., Rubin, D.B.: Multiple imputation for statistical disclosure limitation. IEEE Trans. Inf. Theory 43, 1877–1894 (1997)
Ray, D.: A Game-Theoretic Perspective on Coalition Formation. Oxford University Press, Oxford, UK (2007)
Saad, W., Glass, A., Mandayam, N., Poor, H.V.: Towards a consumer-centric grid: a behavioral perspective. Proc. IEEE 104, 865–882 (2016)
Sankar, L., Kar, S.K., Tandon, R., Poor, H.V.: Competitive privacy in the smart grid: an information-theoretic approach. In: Proceedings IEEE International Conference Smart Grid Communication. IEEE, Piscataway, NJ (2011)
Sankar, L., Rajagopalan, S.R., Mohajer, S., Poor, H.V.: Smart meter privacy: a theoretical framework. IEEE Trans. Smart Grid 4, 837–846 (2013)
Sankar, L., Rajagopalan, S.R., Poor, H.V.: Utility-privacy tradeoffs in databases: an information-theoretic approach. IEEE Trans. Inf. Forensics Secur. 8, 838–852 (2013)
Sweeney, L.: \(k\)-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Syst. 10, 557–570 (2002)
Tan, O., Gündüz, D., Poor, H.V.: Increasing smart meter privacy through energy harvesting and storage devices. IEEE J. Sel. Areas Commun. 31, 1331–1341 (2013)
Tandon, R., Sankar, L., Poor, H.V.: Discriminatory lossy source coding: side information privacy. IEEE Trans. Inf. Theory 59, 5665–5677 (2013)
Wyner, A.D., Ziv, J.: The rate-distortion function for source coding with side information at the decoder. IEEE Trans. Inf. Theory IT 22, 1–10 (1976)
Yamamoto, H.: A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers. IEEE Trans. Inf. Theory 29, 918–923 (1983)
Yang, L., Chen, X., Zhang, J., Poor, H.V.: Cost-effective and privacy-preserving energy management for smart meters. IEEE Trans. Smart Grid 6, 486–495 (2015)
Acknowledgements
This work was prepared while the author was visiting Stanford University under the support of the Precourt Institute for Energy. The support of the U. S. National Science Foundation under Grants ECCS-1549881 and ECCS-1647198 is also gratefully acknowledged.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Poor, H.V. (2018). Privacy in Networks of Interacting Agents. In: Tempo, R., Yurkovich, S., Misra, P. (eds) Emerging Applications of Control and Systems Theory. Lecture Notes in Control and Information Sciences - Proceedings. Springer, Cham. https://doi.org/10.1007/978-3-319-67068-3_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-67068-3_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67067-6
Online ISBN: 978-3-319-67068-3
eBook Packages: EngineeringEngineering (R0)