Skip to main content

A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm

  • Conference paper
  • First Online:
Big Data Computing and Communications (BigCom 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9196))

Included in the following conference series:

Abstract

Due to the variety of the data source and the veracity of their trustworthiness, it is challenging to solve the distributed optimization problems in the big data applications owing to the privacy concerns. We propose a framework for distributed multi-agent greedy algorithms whereby any greedy algorithm that fits our requirement can be converted to a privacy-preserving one. After the conversion, the private information associated with each agent will not be disclosed to anyone else but the owner, and the same output as the plain greedy algorithm is computed by the converted one. Our theoretic analysis shows the security of the framework, and the implementation also shows good performance.

X.-Y. Li—The research is partially supported by NSF ECCS-1247944 and NSF CMMI 1436786.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bo, C., Shen, G., Liu, J., Li, X.-Y., Zhang, Y., Zhao, F.: Privacy. tag: privacy concern expressed and respected. In: SenSys, pp. 163–176. ACM (2014)

    Google Scholar 

  2. Chen, X., Wu, X., Li, X.-Y., He, Y., Liu, Y.: Privacy-preserving high-quality map generation with participatory sensing. In: INFOCOM, pp. 2310–2318. IEEE (2014)

    Google Scholar 

  3. Zhao, J., Jung, T., Wang, Y., Li, X.: Achieving differential privacy of data disclosure in the smart grid. In: INFOCOM, pp. 504–512. IEEE (2014)

    Google Scholar 

  4. Modi, P.J., Shen, W.-M., Tambe, M., Yokoo, M.: Adopt: Asynchronous distributed constraint optimization with quality guarantees. A.I. (2005)

    Google Scholar 

  5. Boyd, S., Parikh, N., Chu, E., Peleato, B., Eckstein, J.: Distributed optimization and statistical learning via the alternating direction method of multipliers. Foundations and Trends in Machine Learning (2011)

    Google Scholar 

  6. Shi, Y., Hou, Y.T.: A distributed optimization algorithm for multi-hop cognitive radio networks. In: INFOCOM. IEEE (2008)

    Google Scholar 

  7. Yokoo, M., Suzuki, K., Hirayama, K.: Secure distributed constraint satisfaction: Reaching agreement without revealing private information. A.I. (2005)

    Google Scholar 

  8. Silaghi, M.C., Mitra, D.: Distributed constraint satisfaction and optimization with privacy enforcement. In: IAT. IEEE (2004)

    Google Scholar 

  9. Silaghi, M.C., Yokoo, M.: Nogood based asynchronous distributed optimization (adopt ng). In: AAMAS. ACM (2006)

    Google Scholar 

  10. Yokoo, M., Durfee, E.H., Ishida, T., Kuwabara, K.: The distributed constraint satisfaction problem: Formalization and algorithms. IEEE Transactions on Knowledge and Data Engineering (1998)

    Google Scholar 

  11. Zivan, R.: Anytime local search for distributed constraint optimization. In: AAMAS (2008)

    Google Scholar 

  12. Jung, T., Mao, X., Li, X.-Y., Tang, S.-J., Gong, W., Zhang, L.: Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation. In: INFOCOM, pp. 2634–2642. IEEE (2013)

    Google Scholar 

  13. Yao, A.C.: Protocols for secure computations. In: FOCS (1982)

    Google Scholar 

  14. Yao, A.C.-C.: How to generate and exchange secrets. In: FOCS. IEEE (1986)

    Google Scholar 

  15. Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Communications of the ACM (1985)

    Google Scholar 

  16. Jung, T., Li, X.-Y.: Enabling privacy-preserving auctions in big data. In: BigSecurity, INFOCOM Workshops. IEEE (2015)

    Google Scholar 

  17. Zhang, L., Jung, T., Feng, P., Liu, K., Li, X.-Y., Liu, Y.: Pic: enable large-scale privacy-preserving content-based image search on cloud. In: ICPP. IEEE (2015)

    Google Scholar 

  18. Zhang, L., Jung, T., Liu, C., Ding, X., Li, X.-Y., Liu, Y.: Pop: privacy-preserving outsourced photo sharing and searching for mobile devices. In: ICDCS. IEEE (2015)

    Google Scholar 

  19. Zhang, L., Li, X.-Y., Liu, Y.: Message in a sealed bottle: privacy preserving friending in social networks. In ICDCS, pp. 327–336. IEEE (2013)

    Google Scholar 

  20. Yokoo, M., Ishida, T., Durfee, E.H., Kuwabara, K.: Distributed constraint satisfaction for formalizing distributed problem solving. In: ICDCS. IEEE (1992)

    Google Scholar 

  21. Jung, T., Li, X.-Y., Wan, Z., Wan, M.: Privacy preserving cloud data access with multi-authorities. In: INFOCOM, pp. 2625–2633. IEEE (2013)

    Google Scholar 

  22. Zhang, L., Li, X.-Y., Liu, Y., Jung, T.: Verifiable private multi-party computation: ranging and ranking. In: INFOCOM, pp. 605–609. IEEE (2013)

    Google Scholar 

  23. Jung, T., Li, X., Wan, Z., Wan, M.: Control cloud data access privilege and anonymity with fully anonymous attribute based encryption. TIFS 10(1), 190–199 (2014)

    Google Scholar 

  24. Li, X.-Y., Jung, T.: Search me if you can: privacy-preserving location query service. In: INFOCOM, pp. 2760–2768. IEEE (2013)

    Google Scholar 

  25. Zhang, L., Li, X., Liu, K., Jung, T., Liu, Y.: Message in a sealed bottle: Privacy preserving friending in mobile social networks. TMC (2014)

    Google Scholar 

  26. Wikipedia. http://en.wikipedia.org/wiki/Set_cover_problem

  27. Jung, T., Li, X.-Y.: Collusion-tolerable privacy-preserving sum and product calculation without secure channel. TDSC 12(1), 45–57 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junze Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Jung, T., Li, XY., Han, J. (2015). A Framework for Optimization in Big Data: Privacy-Preserving Multi-agent Greedy Algorithm. In: Wang, Y., Xiong, H., Argamon, S., Li, X., Li, J. (eds) Big Data Computing and Communications. BigCom 2015. Lecture Notes in Computer Science(), vol 9196. Springer, Cham. https://doi.org/10.1007/978-3-319-22047-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-22047-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-22046-8

  • Online ISBN: 978-3-319-22047-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics