TY - GEN
T1 - An overview of privacy improvements to k-optimal DCOP algorithms
AU - Greenstadt, Rachel
PY - 2009
Y1 - 2009
N2 - For agents to be trusted with sensitive data, they must have mechanisms to protect their users' privacy. This paper explores the privacy properties of k-optimal algorithms: Those algorithms that pro-duce locally optimal solutions that cannot be improved by changing the assignments of k or fewer agents. While these algorithms are subject to large amounts of privacy loss, they can be modified to reduce this privacy loss by an order of magnitude. The greatest improvements are achieved by replacing the centralized local search with a distributed algorithm, such as DPOP.
AB - For agents to be trusted with sensitive data, they must have mechanisms to protect their users' privacy. This paper explores the privacy properties of k-optimal algorithms: Those algorithms that pro-duce locally optimal solutions that cannot be improved by changing the assignments of k or fewer agents. While these algorithms are subject to large amounts of privacy loss, they can be modified to reduce this privacy loss by an order of magnitude. The greatest improvements are achieved by replacing the centralized local search with a distributed algorithm, such as DPOP.
KW - Distributed constraint optimization
KW - Security and privacy
UR - http://www.scopus.com/inward/record.url?scp=84899833393&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84899833393&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84899833393
SN - 9781615673346
T3 - Proceedings of the International Joint Conference on Autonomous Agents and Multiagent Systems, AAMAS
SP - 1282
EP - 1283
BT - 8th International Joint Conference on Autonomous Agents and Multiagent Systems 2009, AAMAS 2009
PB - International Foundation for Autonomous Agents and Multiagent Systems (IFAAMAS)
T2 - 8th International Joint Conference on Autonomous Agents and Multiagent Systems 2009, AAMAS 2009
Y2 - 10 May 2009 through 15 May 2009
ER -