Log in

An inference–proof approach to privacy-preserving horizontally partitioned linear programs

  • Original Paper
  • Published:
Optimization Letters Aims and scope Submit manuscript

Abstract

Mangasarian (Optim. Lett., 6(3), 431–436, 2012) proposed a constraints transformation based approach to securely solving the horizontally partitioned linear programs among multiple entities—every entity holds its own private equality constraints. More recently, Li et al. (Optim. Lett., doi:10.1007/s11590-011-0403-2, 2012) extended the transformation approach to horizontally partitioned linear programs with inequality constraints. However, such transformation approach is not sufficiently secure – occasionally, the privately owned constraints are still under high risk of inference. In this paper, we present an inference–proof algorithm to enhance the security for privacy-preserving horizontally partitioned linear program with arbitrary number of equality and inequality constraints. Our approach reveals significantly less information than the prior work and resolves the potential inference attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mangasarian, O.L.: Privacy-preserving horizontally partitioned linear programs. Optim. Lett. 6(3), 431–436 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  2. Li, W., Li, H., Deng, C.:. Privacy-preserving horizontally partitioned linear programs with inequality constraints. Optim. Lett. doi:10.1007/s11590-011-0403-2

  3. Mangasarian, O.L.: Privacy-preserving linear programming. Optim. Lett. 5(1), 165–172 (2011)

    Google Scholar 

  4. Li, J., Atallah, M.J.: Secure and private collaborative linear programming. In: CollaborateCom, pp. 1–8 (2006)

  5. Vaidya, J.: Privacy-preserving linear programming. In: SAC, pp. 2002–2007 (2009)

  6. Bednarz, A., Bean, A.N., Roughan, M.: Hiccups on the road to privacy-preserving linear programming. In: WPES ’09, pp. 117–120 (2009)

  7. Vaidya, J.: A secure revised simplex algorithm for privacy-preserving linear programming. In: AINA ’09, pp. 347–354 (2009)

  8. Hong, Y., Vaidya, J., Lu, H.: Efficient distributed linear programming with limited disclosure. In: DBSec, pp. 172–187 (2011)

  9. Hong, Y., Vaidya, J., Lu, H.: Secure and efficient distributed linear programming. J. Comput. Secur. (2012, to appear)

  10. Dreier, J., Kerschbaum, F.: Practical privacy-preserving multiparty linear programming based on problem transformation. In: PASSAT (2011)

  11. Du, W.: A study of several specific secure two-party computation problems. Ph.D. thesis, Purdue University, West Lafayette (2001)

  12. Feng, X., Zhang, Z.: The rank of a random matrix. Appl. Math. Comput. 185(1), 689–694 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  13. Sakuma, J., Kobayashi, S.: A genetic algorithm for privacy preserving combinatorial optimization. In: GECCO, pp. 1372–1379 (2007)

  14. Hong, Y., Vaidya, J., Lu, H., Shafiq, B.: Privacy-preserving tabu search for distributed graph coloring. In: PASSAT, pp. 951–958 (2011)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuan Hong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hong, Y., Vaidya, J. An inference–proof approach to privacy-preserving horizontally partitioned linear programs. Optim Lett 8, 267–277 (2014). https://doi.org/10.1007/s11590-012-0572-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11590-012-0572-7

Keywords

Navigation