Quantifying Privacy Leakage in Multi-Agent Planning. Michal Štolba, J. T. & Komenda, A. In Proceedings of the 4th Workshop on Distributed and Multi-Agent Planning (DMAP-16), 2016.
abstract   bibtex   
Multi-agent planning using MA-STRIPS-related models is often motivated by the preservation of private information. Such motivation is not only natural for multi-agent systems, but is one of the main reasons, why multi-agent planning (MAP) problems cannot be solved centrally. Although the motivation is common in the literature, formal treatment of privacy is mostly missing. An exception is a definition of two extreme concepts, weak and strong privacy. In this paper, we first analyze privacy leakage in the terms of secure Multi-Party Computation and Quantitative Information Flow. Then, we follow by analyzing privacy leakage of the most common MAP paradigms. Finally, we propose a new theoretical class of secure MAP algorithms and show how the existing techniques can be modified in order to fall in the proposed class.
@INPROCEEDINGS{dmap2016stolba1,
author = {Michal {\v{S}}tolba, Jan To{\v{z}}i{\v{c}}ka and Anton{\'{\i}}n Komenda},
title = {Quantifying Privacy Leakage in Multi-Agent Planning},
booktitle = {Proceedings of the 4th Workshop on Distributed and Multi-Agent Planning (DMAP-16)},
abstract = {Multi-agent planning using MA-STRIPS-related models is often motivated by the preservation of private information. Such motivation is not only natural for multi-agent systems, but is one of the main reasons, why multi-agent planning (MAP) problems cannot be solved centrally. Although the motivation is common in the literature, formal treatment of privacy is mostly missing. An exception is a definition of two extreme concepts, weak and strong privacy. In this paper, we first analyze privacy leakage in the terms of secure Multi-Party Computation and Quantitative Information Flow. Then, we follow by analyzing privacy leakage of the most common MAP paradigms. Finally, we propose a new theoretical class of secure MAP algorithms and show how the existing techniques can be modified in order to fall in the proposed class.},
year = {2016}
}

Downloads: 0