2018 Annual American Control Conference (ACC) 2018
DOI: 10.23919/acc.2018.8431397
|View full text |Cite
|
Sign up to set email alerts
|

Privacy in Feedback: The Differentially Private LQG

Abstract: Information communicated within cyber-physical systems (CPSs) is often used in determining the physical states of such systems, and malicious adversaries may intercept these communications in order to infer future states of a CPS or its components. Accordingly, there arises a need to protect the state values of a system. Recently, the notion of differential privacy has been used to protect state trajectories in dynamical systems, and it is this notion of privacy that we use here to protect the state trajectori… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1

Relationship

2
7

Authors

Journals

citations
Cited by 26 publications
(21 citation statements)
references
References 12 publications
0
21
0
Order By: Relevance
“…Specifically, we will consider that a zero‐mean Gaussian random noise ykam is added to the output y k with the understanding that yka𝒩0,ya with ya=σy2Im and I m is an m th‐order identity matrix. By following the work of Reference 1, in order to meet the ϵ,δ‐differential privacy requirements we select, σydy2ϵ(Kδ+Kδ2+2ϵ), where Kδ=(12πδet22dt)1, ϵ,δ+ and dy+ stands for the 2‐norm sensitivity, which represents the difference between systems with and without the added noise 34 …”
Section: Problem Formulationmentioning
confidence: 99%
“…Specifically, we will consider that a zero‐mean Gaussian random noise ykam is added to the output y k with the understanding that yka𝒩0,ya with ya=σy2Im and I m is an m th‐order identity matrix. By following the work of Reference 1, in order to meet the ϵ,δ‐differential privacy requirements we select, σydy2ϵ(Kδ+Kδ2+2ϵ), where Kδ=(12πδet22dt)1, ϵ,δ+ and dy+ stands for the 2‐norm sensitivity, which represents the difference between systems with and without the added noise 34 …”
Section: Problem Formulationmentioning
confidence: 99%
“…Techniques from works such as Kalman Filter with DP [23] and LQG with DP [17] can be used to augment the output privacy of a secure filter and controller. However, such techniques reduce the accuracy of the result and stability is difficult to guarantee.…”
Section: Related Workmentioning
confidence: 99%
“…We can bound ∆ ℓ2 y via ∆ ℓ2 y ≤ s 1 (C)B [16], where s 1 (•) is the maximum singular value of a matrix. Various mechanisms have been developed for enforcing differential privacy in the literature [6].…”
Section: Definition 3 (Sensitivity For Input Perturbation Privacy)mentioning
confidence: 99%