Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Quantifying Privacy Leakage in Multi-Agent Planning

Published: 05 February 2018 Publication History

Abstract

Multi-agent planning using MA-STRIPS–related models is often motivated by the preservation of private information. Such a motivation is not only natural for multi-agent systems but also is one of the main reasons multi-agent planning problems cannot be solved with a centralized approach. Although the motivation is common in the literature, the formal treatment of privacy is often missing. In this article, we expand on a privacy measure based on information leakage introduced in previous work, where the leaked information is measured in terms of transition systems represented by the public part of the problem with regard to the information obtained during the planning process. Moreover, we present a general approach to computing privacy leakage of search-based multi-agent planners by utilizing search-tree reconstruction and classification of leaked superfluous information about the applicability of actions. Finally, we present an analysis of the privacy leakage of two well-known algorithms—multi-agent forward search (MAFS) and Secure-MAFS—both in general and on a particular example. The results of the analysis show that Secure-MAFS leaks less information than MAFS.

References

[1]
Ronen I. Brafman. 2015. A privacy preserving algorithm for multi-agent planning and search. In Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI’15). 1530--1536.
[2]
Ronen I. Brafman and Carmel Domshlak. 2008. From one to many: Planning for loosely coupled multi-agent systems. In Proceedings of the 18th International Conference on Automated Planning and Scheduling (ICAPS’08). 28--35.
[3]
Christelle Braun, Konstantinos Chatzikokolakis, and Catuscia Palamidessi. 2009. Quantitative notions of leakage for one-try attacks. Electrical Notes in Theoretical Computer Science 249, 75--91.
[4]
Boi Faltings, Thomas Léauté, and Adrian Petcu. 2008. Privacy guarantees through distributed constraint satisfaction. In Proceedings of the International Conference on Intelligent Agent Technology. 350--358.
[5]
Rachel Greenstadt, Jonathan P. Pearce, and Milind Tambe. 2006. Analysis of privacy loss in distributed constraint optimization. In Proceedings of the 21st National Conference on Artificial Intelligence (AAAI’06). 647--653.
[6]
Patrik Haslum and Hector Geffner. 2000. Admissible heuristics for optimal planning. In Proceedings of the 5th International Conference on Artificial Intelligence (ICAPS’00). 140--149. http://www.aaai.org/Library/AIPS/2000/aips00-015.php.
[7]
Shlomi Maliah, Guy Shani, and Ronen Brafman. 2016a. Online macro generation for privacy preserving planning. In Proceedings of the 26th International Conference on Automated Planning and Scheduling.
[8]
Shlomi Maliah, Guy Shani, and Roni Stern. 2016b. Collaborative privacy preserving multi-agent planning. Autonomous Agents and Multi-Agent Systems 31, 3, 493--530.
[9]
Raz Nissim and Ronen I. Brafman. 2012. Multi-agent A* for parallel and distributed systems. In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS’12). 1265--1266.
[10]
Raz Nissim and Ronen I. Brafman. 2014. Distributed heuristic forward search for multi-agent planning. Journal of Artificial Intelligence Research 51, 293--332.
[11]
Geoffrey Smith. 2009. On the foundations of quantitative information flow. In Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures. 288--302.
[12]
Michal Štolba, Jan Tožička, and Antonín Komenda. 2016a. Secure multi-agent planning. In Proceedings of the 1st International Workshop on AI for Privacy and Security. ACM, New York, NY, 11.
[13]
Michal Štolba, Jan Tožička, and Antonín Komenda. 2016b. Secure multi-agent planning algorithms. In Proceedings of the 22nd European Conference on Artificial Intelligence (ECAI’16). 1714--1715.
[14]
Alejandro Torreño, Eva Onaindia, and Oscar Sapena. 2014. FMAP: Distributed cooperative multi-agent planning. Applied Intelligence 41, 2, 606--626.
[15]
Jan Tožička, Jan Jakubův, Antonín Komenda, and Michal Pěchouček. 2015. Privacy-concerned multiagent planning. Knowledge and Information Systems 48, 3, 581--618.
[16]
Roman Van Der Krogt. 2009. Quantifying privacy in multiagent planning. Multiagent and Grid Systems 5, 4, 451--469.
[17]
Andrew C. Yao. 1982. Protocols for secure computations. In Proceedings of the 23rd Annual Symposium on Foundations of Computer Science (SFCS’82). 160--164.

Cited By

View all
  • (2023)Differential privacy in cooperative multiagent planningProceedings of the Thirty-Ninth Conference on Uncertainty in Artificial Intelligence10.5555/3625834.3625867(347-357)Online publication date: 31-Jul-2023
  • (2023)Research and Performance of Information Management System Algorithm Based on Multi-Intelligence Technique2023 International Conference on Mechatronics, IoT and Industrial Informatics (ICMIII)10.1109/ICMIII58949.2023.00107(509-512)Online publication date: Jun-2023
  • (2022)Ontology-Based Approach for the Measurement of Privacy DisclosureInformation Systems Frontiers10.1007/s10796-021-10180-224:5(1689-1707)Online publication date: 1-Oct-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 18, Issue 3
Special Issue on Artificial Intelligence for Secruity and Privacy and Regular Papers
August 2018
314 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3185332
  • Editor:
  • Munindar P. Singh
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 February 2018
Accepted: 01 July 2017
Revised: 01 July 2017
Received: 01 October 2016
Published in TOIT Volume 18, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Multi-agent planning
  2. deterministic domain-independent planning
  3. privacy
  4. security

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Czech Science Foundation
  • Grant Agency of the Czech Technical University in Prague

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 20 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Differential privacy in cooperative multiagent planningProceedings of the Thirty-Ninth Conference on Uncertainty in Artificial Intelligence10.5555/3625834.3625867(347-357)Online publication date: 31-Jul-2023
  • (2023)Research and Performance of Information Management System Algorithm Based on Multi-Intelligence Technique2023 International Conference on Mechatronics, IoT and Industrial Informatics (ICMIII)10.1109/ICMIII58949.2023.00107(509-512)Online publication date: Jun-2023
  • (2022)Ontology-Based Approach for the Measurement of Privacy DisclosureInformation Systems Frontiers10.1007/s10796-021-10180-224:5(1689-1707)Online publication date: 1-Oct-2022
  • (2022)Reducing disclosed dependencies in privacy preserving planningAutonomous Agents and Multi-Agent Systems10.1007/s10458-022-09581-736:2Online publication date: 1-Oct-2022
  • (2022)Privacy preserving planning in multi-agent stochastic environmentsAutonomous Agents and Multi-Agent Systems10.1007/s10458-022-09554-w36:1Online publication date: 1-Apr-2022
  • (2020)Differentially Private Multi-Agent Planning for Logistic-like ProblemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2020.3017497(1-1)Online publication date: 2020
  • (2020)Trust in Robots: Challenges and OpportunitiesCurrent Robotics Reports10.1007/s43154-020-00029-yOnline publication date: 3-Sep-2020
  • (2019)Goal Recognition Control under Network Interdiction Using a Privacy Information MetricSymmetry10.3390/sym1108105911:8(1059)Online publication date: 17-Aug-2019
  • (2019)Opponent-Aware Planning with Admissible Privacy Preserving for UGV Security Patrol under Contested EnvironmentElectronics10.3390/electronics90100059:1(5)Online publication date: 18-Dec-2019
  • (2019)Efficient approaches for multi-agent planningKnowledge and Information Systems10.1007/s10115-018-1202-158:2(425-479)Online publication date: 1-Feb-2019
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media