Skip to main content

Privacy in Networks of Interacting Agents

  • Chapter
  • First Online:
Emerging Applications of Control and Systems Theory

Abstract

Many applications involve networks of interacting agents, each of whom is interested in making an individual inference or decision, the performance of which can be enhanced by the exchange of information with other agents. Though such agents can clearly benefit from exchanging information, they may also wish to maintain a degree of privacy in that information exchange. Such situations give rise to a notion of competitive privacy, which can be explored through a combination of information theory and game theory. In particular, information theory can be used to characterize the trade-off between privacy of data and the usefulness of that data for an individual agent, while game theory can be used to model the interactions between multiple agents each of whom is mindful of that trade-off. These ideas are explored in this chapter, first in a general setting, and then particularly in the context of data exchange for distributed state estimation, in which specific solutions can be obtained. Interesting open issues and other potential applications will also be discussed. Much of this abstract was originally used as the abstract of the author’s academic keynote address to the Workshop on Advances in Network Localization and Navigation in London in 2015 (http://anln.spsc.tugraz.at/Program2015).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    For other ways of characterizing privacy in data sources, see, e.g., [3, 6, 7, 9, 15].

  2. 2.

    In this multiparty game, the equilibrium of interest is a subgame perfect equilibrium, which essentially is an equilibrium for every subset of time periods [4].

References

  1. Belmega, E.V., Sankar, L., Poor, H.V.: Enabling data exchange in interactive state estimation under privacy constraints. IEEE J. Sel. Top. Signal Process. 9, 1285–1297 (2015)

    Article  Google Scholar 

  2. Berger, T.: Multiterminal source coding. In: Longo, G. (ed.) Information Theory Approach to Communications. Springer, New York (1978)

    Google Scholar 

  3. Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Comput. Sci. 9, 211–407 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  4. Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge, MA (1991)

    MATH  Google Scholar 

  5. Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica 47, 263–291 (1979)

    Article  MATH  Google Scholar 

  6. Kargupta, H., Datta, S., Wang, Q., Sivakumar, K.: Random data perturbation techniques and privacy preserving datamining. J. Knowl. Inf. Syst. 7, 387–414 (2005)

    Article  Google Scholar 

  7. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: privacy beyond \(k\)-anonymity. ACM Trans. Knowl. Discov. Data 1, 24 (2007)

    Article  Google Scholar 

  8. Monderer, D., Shapley, L.S.: Potential games. Games Econ. Behav. 14, 124–143 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  9. Raghunathan, T.E., Reiter, J.P., Rubin, D.B.: Multiple imputation for statistical disclosure limitation. IEEE Trans. Inf. Theory 43, 1877–1894 (1997)

    Article  Google Scholar 

  10. Ray, D.: A Game-Theoretic Perspective on Coalition Formation. Oxford University Press, Oxford, UK (2007)

    Book  MATH  Google Scholar 

  11. Saad, W., Glass, A., Mandayam, N., Poor, H.V.: Towards a consumer-centric grid: a behavioral perspective. Proc. IEEE 104, 865–882 (2016)

    Article  Google Scholar 

  12. Sankar, L., Kar, S.K., Tandon, R., Poor, H.V.: Competitive privacy in the smart grid: an information-theoretic approach. In: Proceedings IEEE International Conference Smart Grid Communication. IEEE, Piscataway, NJ (2011)

    Google Scholar 

  13. Sankar, L., Rajagopalan, S.R., Mohajer, S., Poor, H.V.: Smart meter privacy: a theoretical framework. IEEE Trans. Smart Grid 4, 837–846 (2013)

    Article  Google Scholar 

  14. Sankar, L., Rajagopalan, S.R., Poor, H.V.: Utility-privacy tradeoffs in databases: an information-theoretic approach. IEEE Trans. Inf. Forensics Secur. 8, 838–852 (2013)

    Article  Google Scholar 

  15. Sweeney, L.: \(k\)-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Syst. 10, 557–570 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  16. Tan, O., Gündüz, D., Poor, H.V.: Increasing smart meter privacy through energy harvesting and storage devices. IEEE J. Sel. Areas Commun. 31, 1331–1341 (2013)

    Article  Google Scholar 

  17. Tandon, R., Sankar, L., Poor, H.V.: Discriminatory lossy source coding: side information privacy. IEEE Trans. Inf. Theory 59, 5665–5677 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  18. Wyner, A.D., Ziv, J.: The rate-distortion function for source coding with side information at the decoder. IEEE Trans. Inf. Theory IT 22, 1–10 (1976)

    Google Scholar 

  19. Yamamoto, H.: A source coding problem for sources with additional outputs to keep secret from the receiver or wiretappers. IEEE Trans. Inf. Theory 29, 918–923 (1983)

    Article  MathSciNet  MATH  Google Scholar 

  20. Yang, L., Chen, X., Zhang, J., Poor, H.V.: Cost-effective and privacy-preserving energy management for smart meters. IEEE Trans. Smart Grid 6, 486–495 (2015)

    Article  Google Scholar 

Download references

Acknowledgements

This work was prepared while the author was visiting Stanford University under the support of the Precourt Institute for Energy. The support of the U. S. National Science Foundation under Grants ECCS-1549881 and ECCS-1647198 is also gratefully acknowledged.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to H. Vincent Poor .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Poor, H.V. (2018). Privacy in Networks of Interacting Agents. In: Tempo, R., Yurkovich, S., Misra, P. (eds) Emerging Applications of Control and Systems Theory. Lecture Notes in Control and Information Sciences - Proceedings. Springer, Cham. https://doi.org/10.1007/978-3-319-67068-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67068-3_19

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67067-6

  • Online ISBN: 978-3-319-67068-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics