Abstract

The problem of reliable function computation is extended by imposing privacy, secrecy, and storage constraints on a remote source whose noisy measurements are observed by multiple parties. The main additions to the classic function computation problem include (1) privacy leakage to an eavesdropper is measured with respect to the remote source rather than the transmitting terminals’ observed sequences; (2) the information leakage to a fusion center with respect to the remote source is considered a new privacy leakage metric; (3) the function computed is allowed to be a distorted version of the target function, which allows the storage rate to be reduced compared to a reliable function computation scenario, in addition to reducing secrecy and privacy leakages; (4) two transmitting node observations are used to compute a function. Inner and outer bounds on the rate regions are derived for lossless and lossy single-function computation with two transmitting nodes, which recover previous results in the literature. For special cases, including invertible and partially invertible functions, and degraded measurement channels, simplified lossless and lossy rate regions are characterized, and one achievable region is evaluated as an example scenario.

Highlights

  • We consider function computation scenarios in a network with multiple nodes involved

  • In a classic function computation scenario, the nodes exchange messages through authenticated, noiseless, and public communication links, which results in undesired information leakage about the computed function [3,4,5]

  • We consider function computation scenarios where the function computed is allowed to be a distorted version of the target function, which is relevant for various recent function computation applications

Read more

Summary

Introduction

We consider function computation scenarios in a network with multiple nodes involved. An extension of the results in [18] are given in [20], where two privacy constraints are considered on a remote source whose different noisy measurements are observed by multiple nodes in the same network. The extension in [20] is different from the previous secure and private function computation models due to the assumption that there exists a remote source that is the main reason for the correlation between the random sequences observed by the nodes in the same network. It is shown in [20] that with such a remote source model, two different privacy leakage rate values should be limited, unlike a single constraint considered in [18]. We consider function computation scenarios where the function computed is allowed to be a distorted version of the target function, which is relevant for various recent function computation applications

Models for Function Inputs and Outputs
Summary of Contributions
Organization
Notation
System Model
Lossless Single-Function Computation
Lossy Single-Function Computation
U2 X1 X2 XYZ e e
Rate Regions for Special Sets of Computed Functions and Measurement Channels
Invertible Functions and Two Different Degraded Channels
Eve’s Channel is Physically Degraded
Fusion Center’s Channel is Physically Degraded
Lossless Rate Region Example
Inner Bound
Outer Bound
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.