Distributed Computing With Privacy

被引:0
|
作者
Tyagi, Himanshu [1 ]
机构
[1] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
SECRECY CAPACITIES; INFORMATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A set of terminals that observe correlated data seek to compute functions of the data using interactive public communication. At the same time it is required that this communication, observed by an eavesdropper, does not reveal the value of a private function of the data. In general, the private function and the functions computed by the terminals can be all different. We show that a class of functions are securely computable if and only if the conditional entropy of data given the value of private function is greater than the least rate of interactive communication required for an appropriately chosen multiterminal source coding task. A single-letter formula is provided for this rate in special cases.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Xiang, Tao
    Huang, Xiaoming
    Lu, Rongxing
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (12): : 11460 - 11472
  • [22] Privacy-Preserving Coded Mobile Edge Computing for Low-Latency Distributed Inference
    Schlegel, Reent
    Kumar, Siddhartha
    Rosnes, Eirik
    Amat, Alexandre Graell Graell, I
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (03) : 788 - 799
  • [23] Distributed computing - GRID computing
    Mauthe, A
    Heckmann, O
    PEER-TO-PEER SYSTEMS AND APPLICATIONS, 2005, 3485 : 193 - 206
  • [24] Competitive Privacy: Distributed Computation with Privacy Guarantees
    Sankar, Lalitha
    2013 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP), 2013, : 325 - 328
  • [25] Distributed Computing on Distributed Memory
    Prinz, Andreas
    SYSTEM ANALYSIS AND MODELING: LANGUAGES, METHODS, AND TOOLS FOR SYSTEMS ENGINEERING, SAM 2018, 2018, 11150 : 67 - 84
  • [26] Distributed computing
    Needham, Roger
    Computer Bulletin (London), 1994, 6 (Ser 4 pt 2):
  • [27] Privacy in Context: Privacy Issues in Ubiquitous Computing Applications
    O'Driscoll, Ciaran
    2008 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT, VOLS 1 AND 2, 2008, : 847 - 857
  • [28] The Privacy Preserving In Computing Offloading
    Zhao, Meng
    Li, Shuyu
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 1102 - 1105
  • [29] Differential Privacy on Edge Computing
    Jiang, Xiyu
    Tsou, Yao-Tung
    Kuo, Sy-Yen
    IEEE NANOTECHNOLOGY MAGAZINE, 2023, 17 (06) : 14 - 22
  • [30] Privacy infusion in ubiquitous computing
    Pallapa, Gautham
    Kumar, Mohan
    Das, Sajal K.
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 307 - 314