{"title":"分布式约束推理的通用隐私损失聚合框架","authors":"Jimmy Ho-man Lee, Terrence W.K. Mak, Yuxiang Shi","doi":"10.1109/ICTAI.2013.148","DOIUrl":null,"url":null,"abstract":"Distributed constraint solving are useful in tackling constrained problems when agents are not allowed to share his/her private information to others and/or gathering all necessary information to solve the problem in a centralized manner is infeasible. With these two limitations, distributed algorithms solve the problem by coordinating agents to negotiate with each other. However, once information is exchanged during negotiation, the private information may be leaked from one agent to another. We propose and design a framework based on Valuation of Possible States (VPS) to evaluate how well a distributed algorithm preserves the totality of all private information onthe entire system when solving distributed constraint optimization problems, by allowing the uses of different aggregators aggregating agents' individual privacy loss. Two classes of aggregators: idempotent aggregators and risk based aggregators are proposed. We further proposed generalized inference rules to infer privacy loss of individual agents. We implement our work on four distributed constraint solving algorithms: Synchronous Branch and Bound (SynchBB), Asynchronous Distributed Constraint Optimization (ADOPT), Branch and Bound ADOPT (BnB-ADOPT), and Distributed Pseudo-tree Optimization Procedure (DPOP). Preliminary experimental evaluations on two benchmarks, Distributed Multi-Event Scheduling Problem (DiMES) and Random Distributed COP, comparing the four algorithms are performed.","PeriodicalId":140309,"journal":{"name":"2013 IEEE 25th International Conference on Tools with Artificial Intelligence","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A General Privacy Loss Aggregation Framework for Distributed Constraint Reasoning\",\"authors\":\"Jimmy Ho-man Lee, Terrence W.K. Mak, Yuxiang Shi\",\"doi\":\"10.1109/ICTAI.2013.148\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Distributed constraint solving are useful in tackling constrained problems when agents are not allowed to share his/her private information to others and/or gathering all necessary information to solve the problem in a centralized manner is infeasible. With these two limitations, distributed algorithms solve the problem by coordinating agents to negotiate with each other. However, once information is exchanged during negotiation, the private information may be leaked from one agent to another. We propose and design a framework based on Valuation of Possible States (VPS) to evaluate how well a distributed algorithm preserves the totality of all private information onthe entire system when solving distributed constraint optimization problems, by allowing the uses of different aggregators aggregating agents' individual privacy loss. Two classes of aggregators: idempotent aggregators and risk based aggregators are proposed. We further proposed generalized inference rules to infer privacy loss of individual agents. We implement our work on four distributed constraint solving algorithms: Synchronous Branch and Bound (SynchBB), Asynchronous Distributed Constraint Optimization (ADOPT), Branch and Bound ADOPT (BnB-ADOPT), and Distributed Pseudo-tree Optimization Procedure (DPOP). Preliminary experimental evaluations on two benchmarks, Distributed Multi-Event Scheduling Problem (DiMES) and Random Distributed COP, comparing the four algorithms are performed.\",\"PeriodicalId\":140309,\"journal\":{\"name\":\"2013 IEEE 25th International Conference on Tools with Artificial Intelligence\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 IEEE 25th International Conference on Tools with Artificial Intelligence\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTAI.2013.148\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE 25th International Conference on Tools with Artificial Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTAI.2013.148","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A General Privacy Loss Aggregation Framework for Distributed Constraint Reasoning
Distributed constraint solving are useful in tackling constrained problems when agents are not allowed to share his/her private information to others and/or gathering all necessary information to solve the problem in a centralized manner is infeasible. With these two limitations, distributed algorithms solve the problem by coordinating agents to negotiate with each other. However, once information is exchanged during negotiation, the private information may be leaked from one agent to another. We propose and design a framework based on Valuation of Possible States (VPS) to evaluate how well a distributed algorithm preserves the totality of all private information onthe entire system when solving distributed constraint optimization problems, by allowing the uses of different aggregators aggregating agents' individual privacy loss. Two classes of aggregators: idempotent aggregators and risk based aggregators are proposed. We further proposed generalized inference rules to infer privacy loss of individual agents. We implement our work on four distributed constraint solving algorithms: Synchronous Branch and Bound (SynchBB), Asynchronous Distributed Constraint Optimization (ADOPT), Branch and Bound ADOPT (BnB-ADOPT), and Distributed Pseudo-tree Optimization Procedure (DPOP). Preliminary experimental evaluations on two benchmarks, Distributed Multi-Event Scheduling Problem (DiMES) and Random Distributed COP, comparing the four algorithms are performed.