Differential Privacy in Multi-Party Resource Sharing

by   Utku Karaca, et al.

This study examines a resource-sharing problem involving multiple parties that agree to use a set of capacities together. We start with modeling the whole problem as a mathematical program, where all parties are required to exchange information to obtain the optimal objective function value. This information bears private data from each party in terms of coefficients used in the mathematical program. Moreover, the parties also consider the individual optimal solutions as private. In this setting, the concern for the parties is the privacy of their data and their optimal allocations. We propose a two-step approach to meet the privacy requirements of the parties. In the first step, we obtain a reformulated model that is amenable to a decomposition scheme. Although this scheme eliminates almost all data exchange, it does not provide a formal privacy guarantee. In the second step, we provide this guarantee with a differentially private algorithm at the expense of deviating slightly from the optimality. We provide bounds on this deviation and discuss the consequences of these theoretical results. The study ends with a simulation study on a planning problem that demonstrates an application of the proposed approach. Our work provides a new optimization model and a solution approach for optimal allocation of a set of shared resources among multiple parties who expect privacy of their data. The proposed approach is based on the decomposition of the shared resources and the randomization of the optimization iterations. With our analysis, we show that the resulting randomized algorithm does give a guarantee for the privacy of each party's data. As we work with a general optimization model, our analysis and discussion can be used in different application areas including production planning, logistics, and network revenue management.


page 1

page 2

page 3

page 4


Multi-Party Private Set Intersection: An Information-Theoretic Approach

We investigate the problem of multi-party private set intersection (MP-P...

Privacy-preserving Data Sharing on Vertically Partitioned Data

In this work, we present a method for differentially private data sharin...

Multi-party Private Set Operations with an External Decider

A Private Set Operation (PSO) protocol involves at least two parties wit...

Function-private Conditional Disclosure of Secrets and Multi-evaluation Threshold Distributed Point Functions

Conditional disclosure of secrets (CDS) allows multiple parties to revea...

ActShare: Sensitive Data Sharing with Reliable Leaker Identification

Data sharing among multiple parties becomes increasingly common today, s...

Differentially-private Federated Neural Architecture Search

Neural architecture search, which aims to automatically search for archi...

DPOAD: Differentially Private Outsourcing of Anomaly Detection through Iterative Sensitivity Learning

Outsourcing anomaly detection to third-parties can allow data owners to ...

Please sign up or login with your details

Forgot password? Click here to reset