Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society 2012
DOI: 10.1145/2381966.2381978
|View full text |Cite
|
Sign up to set email alerts
|

Differentially private iterative synchronous consensus

Abstract: The iterative consensus problem requires a set of processes or agents with different initial values, to interact and update their states to eventually converge to a common value. Protocols solving iterative consensus serve as building blocks in a variety of systems where distributed coordination is required for load balancing, data aggregation, sensor fusion, filtering, clock synchronization and platooning of autonomous vehicles. In this paper, we introduce the private iterative consensus problem where agents … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

3
147
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 213 publications
(150 citation statements)
references
References 36 publications
(29 reference statements)
3
147
0
Order By: Relevance
“…The results in this paper generalize our previous work on differentially private iterative consensus [8] where the agent are required to converge to a common value while preserving the privacy of their initial values. Setting the coupling to zero, it is possible to recover the mechanism in [8] from the communication strategy proposed here.…”
Section: Related Work On Differential Privacysupporting
confidence: 66%
See 1 more Smart Citation
“…The results in this paper generalize our previous work on differentially private iterative consensus [8] where the agent are required to converge to a common value while preserving the privacy of their initial values. Setting the coupling to zero, it is possible to recover the mechanism in [8] from the communication strategy proposed here.…”
Section: Related Work On Differential Privacysupporting
confidence: 66%
“…Setting the coupling to zero, it is possible to recover the mechanism in [8] from the communication strategy proposed here.…”
Section: Related Work On Differential Privacymentioning
confidence: 99%
“…Since its introduction in [2], the Laplacian mechanism has become the standard tool in differential privacy and has been used as the basic building block in a number of works on differential privacy analysis in other more complex problem settings, e.g., [10], [11], [12], [13], [14], [5], [15], [16], [17], [18], [19], [20], [21], [22], [23], [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43], [44], [45], [46]. Given this near-routine use of the query-output independent adding of Laplacian noise, the following two questions are natural:…”
Section: ) Laplacian Mechanismmentioning
confidence: 99%
“…In [3], the notion of differential privacy was extended to dynamical systems to preserve the privacy of the inputs. Iterative consensus seeking algorithms that preserve the privacy of the initial conditions of the participants were considered in [4]. Corrupting the state measurements of agents in a distributed control setup was explored in [5] to keep the preferences of the agents (i.e., the way points that need to be followed) private.…”
Section: Introductionmentioning
confidence: 99%