Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information

The distributed source coding problem is extended by positing that noisy measurements of a remote source are the correlated random variables that should be reconstructed at another terminal. We consider a secure and private distributed lossy source coding problem with two encoders and one decoder su...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on information forensics and security 2023-01, Vol.18, p.1-1
Hauptverfasser: Gunlu, Onur, Schaefer, Rafael F., Boche, Holger, Vincent Poor, H.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue
container_start_page 1
container_title IEEE transactions on information forensics and security
container_volume 18
creator Gunlu, Onur
Schaefer, Rafael F.
Boche, Holger
Vincent Poor, H.
description The distributed source coding problem is extended by positing that noisy measurements of a remote source are the correlated random variables that should be reconstructed at another terminal. We consider a secure and private distributed lossy source coding problem with two encoders and one decoder such that (i) all terminals noncausally observe a noisy measurement of the remote source; (ii) a private key is available to each legitimate encoder and all private keys are available to the decoder; (iii) rate-limited noiseless communication links are available between each encoder and the decoder; (iv) the amount of information leakage to an eavesdropper about the correlated random variables is defined as secrecy leakage, and privacy leakage is measured with respect to the remote source; and (v) two passive attack scenarios are considered, where a strong eavesdropper can access both communication links and a weak eavesdropper can choose only one of the links to access. Inner and outer bounds on the rate regions defined under secrecy, privacy, communication, and distortion constraints are derived for both passive attack scenarios. When one or both sources should be reconstructed reliably, the rate region bounds are simplified.
doi_str_mv 10.1109/TIFS.2023.3286285
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_10152476</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10152476</ieee_id><sourcerecordid>2830408609</sourcerecordid><originalsourceid>FETCH-LOGICAL-c284t-b5afed09a0b293de1ac8b0b9e94a6ba4ec866de4b574bf8effbb086dd15394913</originalsourceid><addsrcrecordid>eNpNkEFPwjAUxxejiYh-ABMPSzwP264r7ZGAKJFEk6EXD027vmEJrNhuEr69wxHi6b3D7__Pe78ousVogDESD4vZNB8QRNJBSjgjPDuLejjLWMIQweenHaeX0VUIK4QoxYz3os8cisZDrCoTv3n7o2qIJzbU3uqmBhPnrvEFxGNnbLWMd7b-OmEvsA9_uQkUzoCPc2sgnlWl8xtVW1ddRxelWge4Oc5-9D59XIyfk_nr02w8micF4bROdKZKMEgopIlIDWBVcI20AEEV04pCwRkzQHU2pLrkUJZaI86MwVkqqMBpP0q63rCDbaPl1tuN8nvplJUT-zGSzi_l2jYSCyYob_n7jt96991AqOWq_bJqT5SEp4i25Ui0FO6owrsQPJSnXozkwbk8OJcH5_LovM3cdRkLAP94nBE6ZOkvj-d-sQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2830408609</pqid></control><display><type>article</type><title>Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information</title><source>IEEE Electronic Library (IEL)</source><creator>Gunlu, Onur ; Schaefer, Rafael F. ; Boche, Holger ; Vincent Poor, H.</creator><creatorcontrib>Gunlu, Onur ; Schaefer, Rafael F. ; Boche, Holger ; Vincent Poor, H.</creatorcontrib><description>The distributed source coding problem is extended by positing that noisy measurements of a remote source are the correlated random variables that should be reconstructed at another terminal. We consider a secure and private distributed lossy source coding problem with two encoders and one decoder such that (i) all terminals noncausally observe a noisy measurement of the remote source; (ii) a private key is available to each legitimate encoder and all private keys are available to the decoder; (iii) rate-limited noiseless communication links are available between each encoder and the decoder; (iv) the amount of information leakage to an eavesdropper about the correlated random variables is defined as secrecy leakage, and privacy leakage is measured with respect to the remote source; and (v) two passive attack scenarios are considered, where a strong eavesdropper can access both communication links and a weak eavesdropper can choose only one of the links to access. Inner and outer bounds on the rate regions defined under secrecy, privacy, communication, and distortion constraints are derived for both passive attack scenarios. When one or both sources should be reconstructed reliably, the rate region bounds are simplified.</description><identifier>ISSN: 1556-6013</identifier><identifier>ISSN: 1556-6021</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2023.3286285</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>6G mobile communication ; Coders ; Codes ; Communication ; Decoding ; Leakage ; Links ; Noise measurement ; passive attack ; Privacy ; Random variables ; rate-limited public communication ; Remote observing ; remote source ; Satellite broadcasting ; Secure and private distributed source coding ; Source coding ; weak eavesdropper</subject><ispartof>IEEE transactions on information forensics and security, 2023-01, Vol.18, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c284t-b5afed09a0b293de1ac8b0b9e94a6ba4ec866de4b574bf8effbb086dd15394913</cites><orcidid>0000-0002-2062-131X ; 0000-0002-0313-7788 ; 0000-0002-1702-9075 ; 0000-0002-8375-8946</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10152476$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,552,780,784,796,885,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10152476$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-196948$$DView record from Swedish Publication Index$$Hfree_for_read</backlink></links><search><creatorcontrib>Gunlu, Onur</creatorcontrib><creatorcontrib>Schaefer, Rafael F.</creatorcontrib><creatorcontrib>Boche, Holger</creatorcontrib><creatorcontrib>Vincent Poor, H.</creatorcontrib><title>Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>The distributed source coding problem is extended by positing that noisy measurements of a remote source are the correlated random variables that should be reconstructed at another terminal. We consider a secure and private distributed lossy source coding problem with two encoders and one decoder such that (i) all terminals noncausally observe a noisy measurement of the remote source; (ii) a private key is available to each legitimate encoder and all private keys are available to the decoder; (iii) rate-limited noiseless communication links are available between each encoder and the decoder; (iv) the amount of information leakage to an eavesdropper about the correlated random variables is defined as secrecy leakage, and privacy leakage is measured with respect to the remote source; and (v) two passive attack scenarios are considered, where a strong eavesdropper can access both communication links and a weak eavesdropper can choose only one of the links to access. Inner and outer bounds on the rate regions defined under secrecy, privacy, communication, and distortion constraints are derived for both passive attack scenarios. When one or both sources should be reconstructed reliably, the rate region bounds are simplified.</description><subject>6G mobile communication</subject><subject>Coders</subject><subject>Codes</subject><subject>Communication</subject><subject>Decoding</subject><subject>Leakage</subject><subject>Links</subject><subject>Noise measurement</subject><subject>passive attack</subject><subject>Privacy</subject><subject>Random variables</subject><subject>rate-limited public communication</subject><subject>Remote observing</subject><subject>remote source</subject><subject>Satellite broadcasting</subject><subject>Secure and private distributed source coding</subject><subject>Source coding</subject><subject>weak eavesdropper</subject><issn>1556-6013</issn><issn>1556-6021</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>D8T</sourceid><recordid>eNpNkEFPwjAUxxejiYh-ABMPSzwP264r7ZGAKJFEk6EXD027vmEJrNhuEr69wxHi6b3D7__Pe78ousVogDESD4vZNB8QRNJBSjgjPDuLejjLWMIQweenHaeX0VUIK4QoxYz3os8cisZDrCoTv3n7o2qIJzbU3uqmBhPnrvEFxGNnbLWMd7b-OmEvsA9_uQkUzoCPc2sgnlWl8xtVW1ddRxelWge4Oc5-9D59XIyfk_nr02w8micF4bROdKZKMEgopIlIDWBVcI20AEEV04pCwRkzQHU2pLrkUJZaI86MwVkqqMBpP0q63rCDbaPl1tuN8nvplJUT-zGSzi_l2jYSCyYob_n7jt96991AqOWq_bJqT5SEp4i25Ui0FO6owrsQPJSnXozkwbk8OJcH5_LovM3cdRkLAP94nBE6ZOkvj-d-sQ</recordid><startdate>20230101</startdate><enddate>20230101</enddate><creator>Gunlu, Onur</creator><creator>Schaefer, Rafael F.</creator><creator>Boche, Holger</creator><creator>Vincent Poor, H.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>ABXSW</scope><scope>ADTPV</scope><scope>AOWAS</scope><scope>D8T</scope><scope>DG8</scope><scope>ZZAVC</scope><orcidid>https://orcid.org/0000-0002-2062-131X</orcidid><orcidid>https://orcid.org/0000-0002-0313-7788</orcidid><orcidid>https://orcid.org/0000-0002-1702-9075</orcidid><orcidid>https://orcid.org/0000-0002-8375-8946</orcidid></search><sort><creationdate>20230101</creationdate><title>Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information</title><author>Gunlu, Onur ; Schaefer, Rafael F. ; Boche, Holger ; Vincent Poor, H.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c284t-b5afed09a0b293de1ac8b0b9e94a6ba4ec866de4b574bf8effbb086dd15394913</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>6G mobile communication</topic><topic>Coders</topic><topic>Codes</topic><topic>Communication</topic><topic>Decoding</topic><topic>Leakage</topic><topic>Links</topic><topic>Noise measurement</topic><topic>passive attack</topic><topic>Privacy</topic><topic>Random variables</topic><topic>rate-limited public communication</topic><topic>Remote observing</topic><topic>remote source</topic><topic>Satellite broadcasting</topic><topic>Secure and private distributed source coding</topic><topic>Source coding</topic><topic>weak eavesdropper</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gunlu, Onur</creatorcontrib><creatorcontrib>Schaefer, Rafael F.</creatorcontrib><creatorcontrib>Boche, Holger</creatorcontrib><creatorcontrib>Vincent Poor, H.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>SWEPUB Linköpings universitet full text</collection><collection>SwePub</collection><collection>SwePub Articles</collection><collection>SWEPUB Freely available online</collection><collection>SWEPUB Linköpings universitet</collection><collection>SwePub Articles full text</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gunlu, Onur</au><au>Schaefer, Rafael F.</au><au>Boche, Holger</au><au>Vincent Poor, H.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2023-01-01</date><risdate>2023</risdate><volume>18</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1556-6013</issn><issn>1556-6021</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>The distributed source coding problem is extended by positing that noisy measurements of a remote source are the correlated random variables that should be reconstructed at another terminal. We consider a secure and private distributed lossy source coding problem with two encoders and one decoder such that (i) all terminals noncausally observe a noisy measurement of the remote source; (ii) a private key is available to each legitimate encoder and all private keys are available to the decoder; (iii) rate-limited noiseless communication links are available between each encoder and the decoder; (iv) the amount of information leakage to an eavesdropper about the correlated random variables is defined as secrecy leakage, and privacy leakage is measured with respect to the remote source; and (v) two passive attack scenarios are considered, where a strong eavesdropper can access both communication links and a weak eavesdropper can choose only one of the links to access. Inner and outer bounds on the rate regions defined under secrecy, privacy, communication, and distortion constraints are derived for both passive attack scenarios. When one or both sources should be reconstructed reliably, the rate region bounds are simplified.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2023.3286285</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-2062-131X</orcidid><orcidid>https://orcid.org/0000-0002-0313-7788</orcidid><orcidid>https://orcid.org/0000-0002-1702-9075</orcidid><orcidid>https://orcid.org/0000-0002-8375-8946</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1556-6013
ispartof IEEE transactions on information forensics and security, 2023-01, Vol.18, p.1-1
issn 1556-6013
1556-6021
1556-6021
language eng
recordid cdi_ieee_primary_10152476
source IEEE Electronic Library (IEL)
subjects 6G mobile communication
Coders
Codes
Communication
Decoding
Leakage
Links
Noise measurement
passive attack
Privacy
Random variables
rate-limited public communication
Remote observing
remote source
Satellite broadcasting
Secure and private distributed source coding
Source coding
weak eavesdropper
title Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T14%3A37%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20and%20Private%20Distributed%20Source%20Coding%20with%20Private%20Keys%20and%20Decoder%20Side%20Information&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Gunlu,%20Onur&rft.date=2023-01-01&rft.volume=18&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2023.3286285&rft_dat=%3Cproquest_RIE%3E2830408609%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2830408609&rft_id=info:pmid/&rft_ieee_id=10152476&rfr_iscdi=true