zbMATH — the first resource for mathematics

A system-theoretic framework for privacy preservation in continuous-time multiagent dynamics. (English) Zbl 07269350
Summary: In multiagent dynamical systems, privacy protection corresponds to avoid disclosing the initial states of the agents while accomplishing a distributed task. The system-theoretic framework described in this paper for this scope, denoted dynamical privacy, relies on introducing output maps which act as masks, rendering the internal states of an agent indiscernible by the other agents. Our output masks are local (i.e., decided independently by each agent), time-varying functions asymptotically converging to the true states. The resulting masked system is also time-varying, and has the original unmasked system as its limit system. It is shown that dynamical privacy is not compatible with the existence of equilibria. Nevertheless the masked system retains the same convergence properties of the original system: the equilibria of the original systems become attractors for the masked system but lose the stability property. Application of dynamical privacy to popular examples of multiagent dynamics, such as models of social opinions, average consensus and synchronization, is investigated in detail.
93A16 Multi-agent systems
93D50 Consensus
93C10 Nonlinear systems in control theory
Full Text: DOI
[1] Aeyels, D.; Peuteman, J., A new asymptotic stability criterion for nonlinear time-variant differential equations, IEEE Transactions on Automatic Control, 43, 7, 968-971 (1998) · Zbl 0982.34044
[2] Alaeddini, A.; Morgansen, K.; Mesbahi, M., Adaptive communication networks with privacy guarantees, (2017 American control conference (ACC) (2017)), 4460-4465
[3] Altafini, C., A dynamical approach to privacy preserving average consensus, (IEEE 58th conf. on decision and control (2019))
[4] Ambrosin, M.; Braca, P.; Conti, M.; Lazzeretti, R., Odin: Obfuscation-based privacy-preserving consensus algorithm for decentralized information fusion in smart device networks, ACM Transactions on Internet Technology, 18, 1, 6:1-6:22 (2017)
[5] Arcak, M.; Kokotovic, P., Observer-based control of systems with slope-restricted nonlinearities, IEEE Transactions on Automatic Control, 46, 7, 1146-1150 (2001) · Zbl 1014.93033
[6] Artstein, Z., Limiting equations and stability of nonautonomous ordinary differential equations, (LaSalle, J., The stability of dynamical systems. The stability of dynamical systems, CBMS regional conference series in applied mathematics (1976), SIAM: SIAM Philadelphia)
[7] Artstein, Z., The limiting equations of nonautonomous ordinary differential equations, Journal of Differential Equations, 25, 2, 184-202 (1977) · Zbl 0358.34045
[8] Astolfi, A., A remark on an example by teel & hespanha with applications to cascaded systems, IEEE Transactions on Automatic Control, 52, 2, 289-293 (2007) · Zbl 1366.93005
[9] Chaillet, A.; Angeli, D., Integral input to state stable systems in cascade, Systems & Control Letters, 57, 7, 519-527 (2008) · Zbl 1140.93470
[10] Chen, T.; Liu, X.; Lu, W., Pinning complex networks by a single controller, IEEE Transactions on Circuits and Systems. I. Regular Papers, 54, 6, 1317-1326 (2007) · Zbl 1374.93297
[11] Cortés, J.; Dullerud, G. E.; Han, S.; Ny, J. L.; Mitra, S.; Pappas, G. J., Differential privacy in control and network systems, (IEEE 55th conf. on decision and control (2016)), 4252-4272
[12] Duan, X.; He, J.; Cheng, P.; Mo, Y.; Chen, J., Privacy preserving maximum consensus, (2015 54th IEEE conference on decision and control (CDC) (2015)), 4517-4522
[13] Dwork, C., Differential privacy, (Proceedings of the 33rd international conference on automata, languages and programming - Volume Part II, ICALP’06 (2006), Springer-Verlag: Springer-Verlag Berlin, Heidelberg), 1-12 · Zbl 1133.68330
[14] Farokhi, F.; Shames, I.; Batterham, N., Secure and private control using semi-homomorphic encryption, Control Engineering Practice, 67, 13-20 (2017)
[15] Fontan, A.; Altafini, C., Multiequilibria analysis for a class of collective decision-making networked systems, IEEE Transactions on Control of Networked Systems, 5, 4, 1931-1940 (2018) · Zbl 07045047
[16] Gupta, N.; Katz, J.; Chopra, N., Privacy in distributed average consensus, IFAC-PapersOnLine, 50, 1, 9515-9520 (2017), 20th IFAC World Congress
[17] Hale, M. T.; Egerstedt, M., Cloud-enabled differentially private multi-agent optimization with constraints, IEEE Transactions on Control of Network Systems, PP, 99, 1 (2017)
[18] He, J.; Cai, L.; Cheng, P.; Pan, J.; Shi, L., Consensus-based data-privacy preserving data aggregation, IEEE Transactions on Automatic Control, 1 (2019) · Zbl 07158602
[19] Huang, Z.; Mitra, S.; Dullerud, G., Differentially private iterative synchronous consensus, (Proceedings of the 2012 ACM workshop on privacy in the electronic society, WPES ’12 (2012), ACM: ACM New York, NY, USA), 81-90
[20] Khalil, H., Nonlinear systems (2002), Pearson Education, Prentice Hall
[21] Kogiso, K.; Fujita, T., Cyber-security enhancement of networked control systems using homomorphic encryption, (2015 54th IEEE conference on decision and control (CDC) (2015)), 6836-6843
[22] Lazzeretti, R.; Horn, S.; Braca, P.; Willett, P., Secure multi-party consensus gossip algorithms, (2014 IEEE international conference on acoustics, speech and signal processing (ICASSP) (2014)), 7406-7410
[23] Lee, T.-C.; Liaw, D.-C.; Chen, B.-S., A general invariance principle for nonlinear time-varying systems and its applications, IEEE Transactions on Automatic Control, 46, 12, 1989-1993 (2001) · Zbl 1011.93058
[24] Liu, Y.; Wu, J.; Manchester, I. R.; Shi, G., Dynamical privacy in distributed computing – part i: Privacy loss and PPSC mechanism (2019), arXiv e-prints, arXiv:1902.06966
[25] Loria, A.; Panteley, E.; Popovic, D.; Teel, A. R., A nested matrosov theorem and persistency of excitation for uniform convergence in stable nonautonomous systems, IEEE Transactions on Automatic Control, 50, 2, 183-198 (2005) · Zbl 1365.93471
[26] Manitara, N. E.; Hadjicostis, C. N., Privacy-preserving asymptotic average consensus, (2013 European control conference (ECC) (2013)), 760-765
[27] Markus, L., Asymptotically autonomous differential systems, (Lefschetz, S., Contribution to the theory of nonlinear oscillations. Contribution to the theory of nonlinear oscillations, Annals of mathematical studies (1956), Princeton Univ. Press: Princeton Univ. Press Princeton) · Zbl 0075.27002
[28] Mo, Y.; Murray, R. M., Privacy preserving average consensus, IEEE Transactions on Automatic Control, 62, 2, 753-765 (2017) · Zbl 1364.91048
[29] Monshizadeh, N.; Tabuada, P., Plausible deniability as a notion of privacy, (59th IEEE conference on decision and control (CDC) (2019))
[30] Mu, X.; Cheng, D., On the stability and stabilization of time-varying nonlinear control systems, Asian Journal of Control, 7, 3, 244-255 (2005)
[31] Nozari, E.; Tallapragada, P.; Cortés, J., Differentially private average consensus: Obstructions, trade-offs, and optimal algorithm design, Automatica, 81, 221-231 (2017) · Zbl 1372.93027
[32] Ny, J. L.; Pappas, G. J., Differentially private filtering, IEEE Transactions on Automatic Control, 59, 2, 341-354 (2014) · Zbl 1360.93701
[33] Olfati-Saber, R.; Murray, R., Consensus problems in networks of agents with switching topology and time-delays, IEEE Transactions on Automatic Control, 49, 9, 1520-1533 (2004) · Zbl 1365.93301
[34] Panteley, E.; Loria, A., On global uniform asymptotic stability of nonlinear time-varying systems in cascade, Systems & Control Letters, 33, 2, 131-138 (1998) · Zbl 0902.93059
[35] Panteley, E.; Loria, A., Growth rate conditions for uniform asymptotic stability of cascaded time-varying systems, Automatica, 37, 3, 453-460 (2001) · Zbl 0978.93059
[36] Proskurnikov, A. V.; Tempo, R., A tutorial on modeling and analysis of dynamic social networks. part i, Annual Reviews in Control, 43, 65-79 (2017)
[37] Rezazadeh, N.; Kia, S., Privacy preservation in a continuous-time static average consensus algorithm over directed graphs, (American control conference (2018)), 5890-5895
[38] Rouche, N.; Habets, P.; Laloy, M., (Stability theory by liapunov’s direct method. Stability theory by liapunov’s direct method, Applied mathematical sciences (2012), Springer New York) · Zbl 0364.34022
[39] Ruan, M.; Gao, H.; Wang, Y., Secure and privacy-preserving consensus, IEEE Transactions on Automatic Control, 64, 10, 4035-4049 (2019) · Zbl 07158480
[40] Saberi, A.; Kokotovic, P.; Sussmann, H., Global stabilization of partially linear composite systems, SIAM Journal on Control and Optimization, 28, 6, 1491-1503 (1990) · Zbl 0719.93071
[41] Sontag, E. D., A remark on the converging-input converging-state property, IEEE Transactions on Automatic Control, 48, 2, 313-314 (2003) · Zbl 1364.93736
[42] Sontag, E. D.; Krichman, M., An example of a GAS system which can be destabilized by an integrable perturbation, IEEE Transactions on Automatic Control, 48, 6, 1046-1049 (2003) · Zbl 1364.93669
[43] Sontag, E. D.; Wang, Y., On characterizations of the input-to-state stability property, Systems & Control Letters, 24, 5, 351-359 (1995) · Zbl 0877.93121
[44] Sussmann, H. J.; Kokotovic, P. V., The peaking phenomenon and the global stabilization of nonlinear systems, IEEE Transactions on Automatic Control, 36, 4, 424-440 (1991) · Zbl 0749.93070
[45] Teel, A. R.; Hespanha, J., Examples of GES systems that can be driven to infinity by arbitrarily small additive decaying exponentials, IEEE Transactions on Automatic Control, 49, 8, 1407-1410 (2004) · Zbl 1365.93431
[46] Wiese, M., Johansson, K. H., Oechtering, T. J., Papadimitratos, P., Sandberg, H., & Skoglund, M. (2016). Secure estimation for unstable systems. In: Proc. IEEE 55th conf. dec. contr. (CDC) (pp. 5059-5064).
[47] Yu, W.; Chen, G.; Lü, J.; Kurths, J., Synchronization via pinning control on general complex networks, SIAM Journal on Control and Optimization, 51, 2, 1395-1416 (2013) · Zbl 1266.93071
[48] Zhou, J.; an Lu, J.; Lü, J., Pinning adaptive synchronization of a general complex dynamical network, Automatica, 44, 4, 996-1003 (2008) · Zbl 1283.93032
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.