Electrical and Electronic Engineering - Research Publications

Permanent URI for this collection

Search Results

Now showing 1 - 10 of 20
  • Item
    Thumbnail Image
    Information-theoretic privacy through chaos synchronization and optimal additive noise
    Murguia, C ; Shames, I ; Farokhi, F ; Nešić, D ; Farokhi, F (Springer, 2020)
    We study the problem of maximizing privacy of data sets by adding random vectors generated via synchronized chaotics oscillators. In particular, we consider the setup where information about data sets, queries, is sent through public (unsecured) communication channels to a remote station. To hide private features (specific entries) within the data set, we corrupt the response to queries by adding random vectors.We send the distorted query (the sum of the requested query and the random vector) through the public channel. The distribution of the additive random vector is designed to minimize the mutual information (our privacy metric) between private entries of the data set and the distorted query. We cast the synthesis of this distribution as a convex program in the probabilities of the additive random vector. Once we have the optimal distribution, we propose an algorithm to generate pseudorandom realizations from this distribution using trajectories of a chaotic oscillator. At the other end of the channel, we have a second chaotic oscillator, which we use to generate realizations from the same distribution. Note that if we obtain the same realizations on both sides of the channel, we can simply subtract the realization from the distorted query to recover the requested query. To generate equal realizations, we need the two chaotic oscillators to be synchronized, i.e., we need them to generate exactly the same trajectories on both sides of the channel synchronously in time. We force the two chaotic oscillators into exponential synchronization using a driving signal. Simulations are presented to illustrate our results.
  • Item
    Thumbnail Image
    Fisher information privacy with application to smart meter privacy using HVAC units
    Farokhi, F ; Sandberg, H ; Farokhi, F (Springer, 2020)
    In this chapter, we use Heating, Ventilation, and Air Conditioning (HVAC) units to preserve the privacy of households with smart meters in addition to regulating indoor temperature. We model the effect of the HVAC unit as an additive noise in the household consumption. The Cramér-Rao bound is used to relate the inverse of the trace of the Fisher information matrix to the quality of an adversary’s estimation error of the household private consumption from the aggregate consumption of the household with the HVAC unit. This establishes the Fisher information as the measure of privacy leakage. We compute the optimal privacy-preserving policy for controlling the HVAC unit through minimizing a weighted sum of the Fisher information and the cost operating the HVAC unit. The optimization problem also contains the constraints on the temperatures of the house.
  • Item
    Thumbnail Image
    A Fundamental Bound on Performance of Non-Intrusive Load Monitoring Algorithms with Application to Smart-Meter Privacy
    Farokhi, F (Elsevier BV, 2020)
    We prove that the expected estimation error of nonintrusive load monitoring algorithms is lower bounded by the trace of the inverse of the cross-correlation matrix between the derivatives of the load profiles of the appliances. We use this fundamental bound to develop privacy-preserving policies. Particularly, we devise a load-scheduling policy by maximizing the lower bound on the expected estimation error of non-intrusive load monitoring algorithms.
  • Item
    Thumbnail Image
    Linear quadratic control computation for systems with a directed tree structure
    Zafar, A ; Farokhi, F ; Cantoni, M (ELSEVIER, 2020)
  • Item
    Thumbnail Image
    Privacy Against State Estimation: An Optimization Framework based on the Data Processing Inequality
    Murguia, C ; Shames, I ; Farokhi, F ; Nesic, D (ELSEVIER, 2020-01-01)
    Information about the system state is obtained through noisy sensor measurements. This data is coded and transmitted to a trusted user through an unsecured communication network. We aim at keeping the system state private; however, because the network is not secure, opponents might access sensor data, which can be used to estimate the state. To prevent this, before transmission, we randomize coded sensor data by passing it through a probabilistic mapping, and send the corrupted data to the trusted user. Making use of the data processing inequality, we cast the synthesis of the probabilistic mapping as a convex program where we minimize the mutual information (our privacy metric) between two estimators, one constructed using the randomized sensor data and the other using the actual undistorted sensor measurements, for a desired level of distortion–how different coded sensor measurements and distorted data are allowed to be.
  • Item
    Thumbnail Image
    Review of results on smart-meter privacy by data manipulation, demand shaping, and load scheduling
    Farokhi, F (Institution of Engineering and Technology, 2020-10-01)
    Simple analysis of energy consumption patterns recorded by smart meters can be used to deduce household occupancy. With access to higher-resolution smart-meter readings, we can infer more detailed information about the household including the use of individual electric appliances through non-intrusive load monitoring techniques. The extent of privacy concerns caused by smart meters has proved to an obstacle in the roll-out of smart meters in some countries. This highlights the need for investigating smart-meter privacy. Mechanisms for ensuring smart-meter privacy fall in broad categories of data manipulation, demand shaping, and load scheduling. In smart-meter data manipulation, the smart meter collects real, potentially high-resolution data about the energy consumption within the house. This data is then manipulated before communication with to utility providers and retailers. The manipulation could be non-stochastic, such as aggregation, binning, and down-sampling, or stochastic, such as additive noise. In demand shaping and load scheduling, smart-meter readings are communicated without any interference but the consumption is manipulated by renewable energy sources, batteries, or shifting loads to render nonintrusive load monitoring ineffective. In this study, the author reviews these approaches and presents several methods relying on homomorphic encryption, differential privacy, information theory, and statistics for ensuring privacy.
  • Item
    Thumbnail Image
    Deconvoluting kernel density estimation and regression for locally differentially private data
    Farokhi, F (NATURE PORTFOLIO, 2020-12-07)
    Local differential privacy has become the gold-standard of privacy literature for gathering or releasing sensitive individual data points in a privacy-preserving manner. However, locally differential data can twist the probability density of the data because of the additive noise used to ensure privacy. In fact, the density of privacy-preserving data (no matter how many samples we gather) is always flatter in comparison with the density function of the original data points due to convolution with privacy-preserving noise density function. The effect is especially more pronounced when using slow-decaying privacy-preserving noises, such as the Laplace noise. This can result in under/over-estimation of the heavy-hitters. This is an important challenge facing social scientists due to the use of differential privacy in the 2020 Census in the United States. In this paper, we develop density estimation methods using smoothing kernels. We use the framework of deconvoluting kernel density estimators to remove the effect of privacy-preserving noise. This approach also allows us to adapt the results from non-parametric regression with errors-in-variables to develop regression models based on locally differentially private data. We demonstrate the performance of the developed methods on financial and demographic datasets.
  • Item
    No Preview Available
    Structured computation of optimal controls for constrained cascade systems
    Cantoni, M ; Farokhi, F ; Kerrigan, E ; Shames, I (Taylor & Francis, 2020-01)
    Constrained finite-horizon linear-quadratic optimal control problems are studied within the context of discrete-time dynamics that arise from the series interconnection of subsystems. A structured algorithm is devised for computing the Newton-like steps of primal-dual interior-point methods for solving a particular re-formulation of the problem as a quadratic program. This algorithm has the following properties: (i) the computation cost scales linearly in the number of subsystems along the cascade; and (ii) the computations can be distributed across a linear processor network, with localised problem data dependencies between the processor nodes and low communication overhead. The computation cost of the approach, which is based on a fixed permutation of the primal and dual variables, scales cubically in the time horizon of the original optimal control problem. Limitations in these terms are explored as part of a numerical example. This example involves application of the main results to model data for the cascade dynamics of an automated irrigation channel in particular.
  • Item
    Thumbnail Image
    An Explicit Formula for the Zero-Error Feedback Capacity of a Class of Finite-State Additive Noise Channels
    Saberi, A ; Farokhi, F ; Nair, GN (IEEE, 2020)
    It is known that for a discrete channel with correlated additive noise, the ordinary capacity with or without feedback both equal log q−H(Z), where H(Z)is the entropy rate of the noise process Z and q is the alphabet size. In this paper, a class of finite-state additive noise channels is introduced. It is shown that the zero-error feedback capacity of such channels is either zero or C 0 f = log q - h(Z), where h(Z) is the topological entropy of the noise process. Moreover, the zero-error capacity without feedback is lower-bounded by log q - 2h(Z). We explicitly compute the zero-error feedback capacity for several examples, including channels with isolated errors and a Gilbert-Elliot channel.
  • Item
    Thumbnail Image
    Privacy-Preserving Public Release of Datasets for Support Vector Machine Classification
    Farokhi, F (Institute of Electrical and Electronics Engineers (IEEE), 2020)
    We consider the problem of publicly releasing a dataset for support vector machine classification while not infringing on the privacy of data subjects (i.e., individuals whose private information is stored in the dataset). The dataset is systematically obfuscated using an additive noise for privacy protection. Motivated by the Cramér-Rao bound, inverse of the trace of the Fisher information matrix is used as a measure of the privacy. Conditions are established for ensuring that the classifier extracted from the original dataset and the obfuscated one are close to each other (capturing the utility). The optimal noise distribution is determined by maximizing a weighted sum of the measures of privacy and utility. The optimal privacy-preserving noise is proved to achieve local differential privacy. The results are generalized to a broader class of optimization-based supervised machine learning algorithms. Applicability of the methodology is demonstrated on multiple datasets.