Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2970030.2970042acmotherconferencesArticle/Chapter ViewAbstractPublication PagespraiseConference Proceedingsconference-collections
research-article

Secure Multi-Agent Planning

Published: 29 August 2016 Publication History

Abstract

Multi-agent planning using MA-STRIPS-related models is often motivated by the preservation of private information. Such motivation is not only natural for multi-agent systems, but is one of the main reasons, why multi-agent planning problems cannot be solved centrally. Although the motivation is common in the literature, formal treatment of privacy is mostly missing. An exception is a definition of two extreme concepts, weak and strong privacy.
In this paper, we first analyze privacy leakage in the terms of secure Multi-Party Computation and Quantitative Information Flow. Then, we follow by analyzing privacy leakage of the most common MAP paradigms. Finally, we propose a new theoretical class of secure MAP algorithms and show how the existing techniques can be modified in order to fall in the proposed class.

References

[1]
R. I. Brafman. A privacy preserving algorithm for multi-agent planning and search. In Procs. of the IJCAI'15, pages 1530--1536, 2015.
[2]
R. I. Brafman and C. Domshlak. From one to many: Planning for loosely coupled multi-agent systems. In Procs. of the ICAPS'08, pages 28--35, 2008.
[3]
C. Braun, K. Chatzikokolakis, and C. Palamidessi. Quantitative notions of leakage for one-try attacks. Electr. Notes Theor. Comput. Sci., 249:75--91, 2009.
[4]
P. Haslum and H. Geffner. Admissible heuristics for optimal planning. In Proceedings of the Fifth International Conference on Artificial Intelligence Planning Systems, ICAPS, pages 140--149, 2000.
[5]
S. Maliah, G. Shani, and R. Stern. Collaborative privacy preserving multi-agent planning. Procs. of the AAMAS'16, pages 1--38, 2016.
[6]
R. Nissim and R. I. Brafman. Distributed heuristic forward search for multi-agent planning. JAIR, 51:293--332, 2014.
[7]
G. Smith. On the foundations of quantitative information flow. In Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures, FOSSACS, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS, pages 288--302, 2009.
[8]
A. Torreño, E. Onaindia, and O. Sapena. FMAP: distributed cooperative multi-agent planning. AI, 41(2):606--626, 2014.
[9]
J. Tožička, J. Jakubův, K. Durkota, A. Komenda, and M. Pěchouček. Multiagent planning supported by plan diversity metrics and landmark actions. In Proceedings of the 6th International Conference on Agents and Artificial Intelligence, ICAART, volume 1, pages 178--189, 2014.
[10]
J. Tožička, J. Jakubův, A. Komenda, and M. Pěchouček. Privacy-concerned multiagent planning. KAIS, pages 1--38, 2015.
[11]
R. Van Der Krogt. Quantifying privacy in multiagent planning. Multiagent and Grid Systems, 5(4):451--469, 2009.
[12]
A. C. Yao. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS, pages 160--164, 1982.

Cited By

View all
  • (2023)Width-Based Search for Multi Agent Privacy-Preserving PlanningArtificial Intelligence10.1016/j.artint.2023.103883(103883)Online publication date: Feb-2023
  • (2022)Reducing disclosed dependencies in privacy preserving planningAutonomous Agents and Multi-Agent Systems10.1007/s10458-022-09581-736:2Online publication date: 10-Oct-2022
  • (2022)Privacy leakage of search-based multi-agent planning algorithmsAutonomous Agents and Multi-Agent Systems10.1007/s10458-022-09568-436:2Online publication date: 2-Jul-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
PrAISe '16: Proceedings of the 1st International Workshop on AI for Privacy and Security
August 2016
91 pages
ISBN:9781450343046
DOI:10.1145/2970030
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 August 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. automated planning
  2. multi-agent systems
  3. privacy

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Grantová Agentura České Republiky
  • Czech Science Foundation
  • Grant Agency of the CTU in Prague

Conference

PrAISe '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Width-Based Search for Multi Agent Privacy-Preserving PlanningArtificial Intelligence10.1016/j.artint.2023.103883(103883)Online publication date: Feb-2023
  • (2022)Reducing disclosed dependencies in privacy preserving planningAutonomous Agents and Multi-Agent Systems10.1007/s10458-022-09581-736:2Online publication date: 10-Oct-2022
  • (2022)Privacy leakage of search-based multi-agent planning algorithmsAutonomous Agents and Multi-Agent Systems10.1007/s10458-022-09568-436:2Online publication date: 2-Jul-2022
  • (2022)Privacy preserving planning in multi-agent stochastic environmentsAutonomous Agents and Multi-Agent Systems10.1007/s10458-022-09554-w36:1Online publication date: 26-Mar-2022
  • (2022)An efficient lightweight coordination model to multi-agent planningKnowledge and Information Systems10.1007/s10115-021-01638-5Online publication date: 5-Jan-2022
  • (2020)Differentially Private Multi-Agent Planning for Logistic-like ProblemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.3017497(1-1)Online publication date: 2020
  • (2019)Opponent-Aware Planning with Admissible Privacy Preserving for UGV Security Patrol under Contested EnvironmentElectronics10.3390/electronics90100059:1(5)Online publication date: 18-Dec-2019
  • (2018)Quantifying Privacy Leakage in Multi-Agent PlanningACM Transactions on Internet Technology10.1145/313332618:3(1-21)Online publication date: 5-Feb-2018
  • (2018)$${\upvarepsilon }$$-Strong Privacy Preserving Multi-agent PlanningAgents and Artificial Intelligence10.1007/978-3-319-93581-2_8(137-156)Online publication date: 21-Jun-2018
  • (2016)Secure multi-agent planning algorithmsProceedings of the Twenty-second European Conference on Artificial Intelligence10.3233/978-1-61499-672-9-1714(1714-1715)Online publication date: 29-Aug-2016

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media