Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints †

The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. The main additions to the classic function computation problem include (1) privacy leakage to an eavesdropper i...

Descripción completa

Detalles Bibliográficos
Autor principal: Günlü, Onur
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8774550/
https://www.ncbi.nlm.nih.gov/pubmed/35052136
http://dx.doi.org/10.3390/e24010110
_version_ 1784636374534586368
author Günlü, Onur
author_facet Günlü, Onur
author_sort Günlü, Onur
collection PubMed
description The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. The main additions to the classic function computation problem include (1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals’ observed sequences; (2) the information leakage to a fusion center with respect to the remote source is considered a new privacy leakage metric; (3) the function computed is allowed to be a distorted version of the target function, which allows the storage rate to be reduced compared to a reliable function computation scenario, in addition to reducing secrecy and privacy leakages; (4) two transmitting node observations are used to compute a function. Inner and outer bounds on the rate regions are derived for lossless and lossy single-function computation with two transmitting nodes, which recover previous results in the literature. For special cases, including invertible and partially invertible functions, and degraded measurement channels, simplified lossless and lossy rate regions are characterized, and one achievable region is evaluated as an example scenario.
format Online
Article
Text
id pubmed-8774550
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-87745502022-01-21 Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints † Günlü, Onur Entropy (Basel) Article The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. The main additions to the classic function computation problem include (1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals’ observed sequences; (2) the information leakage to a fusion center with respect to the remote source is considered a new privacy leakage metric; (3) the function computed is allowed to be a distorted version of the target function, which allows the storage rate to be reduced compared to a reliable function computation scenario, in addition to reducing secrecy and privacy leakages; (4) two transmitting node observations are used to compute a function. Inner and outer bounds on the rate regions are derived for lossless and lossy single-function computation with two transmitting nodes, which recover previous results in the literature. For special cases, including invertible and partially invertible functions, and degraded measurement channels, simplified lossless and lossy rate regions are characterized, and one achievable region is evaluated as an example scenario. MDPI 2022-01-11 /pmc/articles/PMC8774550/ /pubmed/35052136 http://dx.doi.org/10.3390/e24010110 Text en © 2022 by the author. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Günlü, Onur
Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints †
title Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints †
title_full Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints †
title_fullStr Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints †
title_full_unstemmed Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints †
title_short Function Computation under Privacy, Secrecy, Distortion, and Communication Constraints †
title_sort function computation under privacy, secrecy, distortion, and communication constraints †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8774550/
https://www.ncbi.nlm.nih.gov/pubmed/35052136
http://dx.doi.org/10.3390/e24010110
work_keys_str_mv AT gunluonur functioncomputationunderprivacysecrecydistortionandcommunicationconstraints