Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information
The distributed source coding problem is extended by positing that noisy measurements of a remote source are the correlated random variables that should be reconstructed at another terminal. We consider a secure and private distributed lossy source coding problem with two encoders and one decoder su...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on information forensics and security 2023-01, Vol.18, p.1-1 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | IEEE transactions on information forensics and security |
container_volume | 18 |
creator | Gunlu, Onur Schaefer, Rafael F. Boche, Holger Vincent Poor, H. |
description | The distributed source coding problem is extended by positing that noisy measurements of a remote source are the correlated random variables that should be reconstructed at another terminal. We consider a secure and private distributed lossy source coding problem with two encoders and one decoder such that (i) all terminals noncausally observe a noisy measurement of the remote source; (ii) a private key is available to each legitimate encoder and all private keys are available to the decoder; (iii) rate-limited noiseless communication links are available between each encoder and the decoder; (iv) the amount of information leakage to an eavesdropper about the correlated random variables is defined as secrecy leakage, and privacy leakage is measured with respect to the remote source; and (v) two passive attack scenarios are considered, where a strong eavesdropper can access both communication links and a weak eavesdropper can choose only one of the links to access. Inner and outer bounds on the rate regions defined under secrecy, privacy, communication, and distortion constraints are derived for both passive attack scenarios. When one or both sources should be reconstructed reliably, the rate region bounds are simplified. |
doi_str_mv | 10.1109/TIFS.2023.3286285 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_10152476</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10152476</ieee_id><sourcerecordid>2830408609</sourcerecordid><originalsourceid>FETCH-LOGICAL-c284t-b5afed09a0b293de1ac8b0b9e94a6ba4ec866de4b574bf8effbb086dd15394913</originalsourceid><addsrcrecordid>eNpNkEFPwjAUxxejiYh-ABMPSzwP264r7ZGAKJFEk6EXD027vmEJrNhuEr69wxHi6b3D7__Pe78ousVogDESD4vZNB8QRNJBSjgjPDuLejjLWMIQweenHaeX0VUIK4QoxYz3os8cisZDrCoTv3n7o2qIJzbU3uqmBhPnrvEFxGNnbLWMd7b-OmEvsA9_uQkUzoCPc2sgnlWl8xtVW1ddRxelWge4Oc5-9D59XIyfk_nr02w8micF4bROdKZKMEgopIlIDWBVcI20AEEV04pCwRkzQHU2pLrkUJZaI86MwVkqqMBpP0q63rCDbaPl1tuN8nvplJUT-zGSzi_l2jYSCyYob_n7jt96991AqOWq_bJqT5SEp4i25Ui0FO6owrsQPJSnXozkwbk8OJcH5_LovM3cdRkLAP94nBE6ZOkvj-d-sQ</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2830408609</pqid></control><display><type>article</type><title>Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information</title><source>IEEE Electronic Library (IEL)</source><creator>Gunlu, Onur ; Schaefer, Rafael F. ; Boche, Holger ; Vincent Poor, H.</creator><creatorcontrib>Gunlu, Onur ; Schaefer, Rafael F. ; Boche, Holger ; Vincent Poor, H.</creatorcontrib><description>The distributed source coding problem is extended by positing that noisy measurements of a remote source are the correlated random variables that should be reconstructed at another terminal. We consider a secure and private distributed lossy source coding problem with two encoders and one decoder such that (i) all terminals noncausally observe a noisy measurement of the remote source; (ii) a private key is available to each legitimate encoder and all private keys are available to the decoder; (iii) rate-limited noiseless communication links are available between each encoder and the decoder; (iv) the amount of information leakage to an eavesdropper about the correlated random variables is defined as secrecy leakage, and privacy leakage is measured with respect to the remote source; and (v) two passive attack scenarios are considered, where a strong eavesdropper can access both communication links and a weak eavesdropper can choose only one of the links to access. Inner and outer bounds on the rate regions defined under secrecy, privacy, communication, and distortion constraints are derived for both passive attack scenarios. When one or both sources should be reconstructed reliably, the rate region bounds are simplified.</description><identifier>ISSN: 1556-6013</identifier><identifier>ISSN: 1556-6021</identifier><identifier>EISSN: 1556-6021</identifier><identifier>DOI: 10.1109/TIFS.2023.3286285</identifier><identifier>CODEN: ITIFA6</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>6G mobile communication ; Coders ; Codes ; Communication ; Decoding ; Leakage ; Links ; Noise measurement ; passive attack ; Privacy ; Random variables ; rate-limited public communication ; Remote observing ; remote source ; Satellite broadcasting ; Secure and private distributed source coding ; Source coding ; weak eavesdropper</subject><ispartof>IEEE transactions on information forensics and security, 2023-01, Vol.18, p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c284t-b5afed09a0b293de1ac8b0b9e94a6ba4ec866de4b574bf8effbb086dd15394913</cites><orcidid>0000-0002-2062-131X ; 0000-0002-0313-7788 ; 0000-0002-1702-9075 ; 0000-0002-8375-8946</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10152476$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>230,314,552,780,784,796,885,27924,27925,54758</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10152476$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-196948$$DView record from Swedish Publication Index$$Hfree_for_read</backlink></links><search><creatorcontrib>Gunlu, Onur</creatorcontrib><creatorcontrib>Schaefer, Rafael F.</creatorcontrib><creatorcontrib>Boche, Holger</creatorcontrib><creatorcontrib>Vincent Poor, H.</creatorcontrib><title>Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information</title><title>IEEE transactions on information forensics and security</title><addtitle>TIFS</addtitle><description>The distributed source coding problem is extended by positing that noisy measurements of a remote source are the correlated random variables that should be reconstructed at another terminal. We consider a secure and private distributed lossy source coding problem with two encoders and one decoder such that (i) all terminals noncausally observe a noisy measurement of the remote source; (ii) a private key is available to each legitimate encoder and all private keys are available to the decoder; (iii) rate-limited noiseless communication links are available between each encoder and the decoder; (iv) the amount of information leakage to an eavesdropper about the correlated random variables is defined as secrecy leakage, and privacy leakage is measured with respect to the remote source; and (v) two passive attack scenarios are considered, where a strong eavesdropper can access both communication links and a weak eavesdropper can choose only one of the links to access. Inner and outer bounds on the rate regions defined under secrecy, privacy, communication, and distortion constraints are derived for both passive attack scenarios. When one or both sources should be reconstructed reliably, the rate region bounds are simplified.</description><subject>6G mobile communication</subject><subject>Coders</subject><subject>Codes</subject><subject>Communication</subject><subject>Decoding</subject><subject>Leakage</subject><subject>Links</subject><subject>Noise measurement</subject><subject>passive attack</subject><subject>Privacy</subject><subject>Random variables</subject><subject>rate-limited public communication</subject><subject>Remote observing</subject><subject>remote source</subject><subject>Satellite broadcasting</subject><subject>Secure and private distributed source coding</subject><subject>Source coding</subject><subject>weak eavesdropper</subject><issn>1556-6013</issn><issn>1556-6021</issn><issn>1556-6021</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><sourceid>D8T</sourceid><recordid>eNpNkEFPwjAUxxejiYh-ABMPSzwP264r7ZGAKJFEk6EXD027vmEJrNhuEr69wxHi6b3D7__Pe78ousVogDESD4vZNB8QRNJBSjgjPDuLejjLWMIQweenHaeX0VUIK4QoxYz3os8cisZDrCoTv3n7o2qIJzbU3uqmBhPnrvEFxGNnbLWMd7b-OmEvsA9_uQkUzoCPc2sgnlWl8xtVW1ddRxelWge4Oc5-9D59XIyfk_nr02w8micF4bROdKZKMEgopIlIDWBVcI20AEEV04pCwRkzQHU2pLrkUJZaI86MwVkqqMBpP0q63rCDbaPl1tuN8nvplJUT-zGSzi_l2jYSCyYob_n7jt96991AqOWq_bJqT5SEp4i25Ui0FO6owrsQPJSnXozkwbk8OJcH5_LovM3cdRkLAP94nBE6ZOkvj-d-sQ</recordid><startdate>20230101</startdate><enddate>20230101</enddate><creator>Gunlu, Onur</creator><creator>Schaefer, Rafael F.</creator><creator>Boche, Holger</creator><creator>Vincent Poor, H.</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>JQ2</scope><scope>KR7</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>ABXSW</scope><scope>ADTPV</scope><scope>AOWAS</scope><scope>D8T</scope><scope>DG8</scope><scope>ZZAVC</scope><orcidid>https://orcid.org/0000-0002-2062-131X</orcidid><orcidid>https://orcid.org/0000-0002-0313-7788</orcidid><orcidid>https://orcid.org/0000-0002-1702-9075</orcidid><orcidid>https://orcid.org/0000-0002-8375-8946</orcidid></search><sort><creationdate>20230101</creationdate><title>Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information</title><author>Gunlu, Onur ; Schaefer, Rafael F. ; Boche, Holger ; Vincent Poor, H.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c284t-b5afed09a0b293de1ac8b0b9e94a6ba4ec866de4b574bf8effbb086dd15394913</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>6G mobile communication</topic><topic>Coders</topic><topic>Codes</topic><topic>Communication</topic><topic>Decoding</topic><topic>Leakage</topic><topic>Links</topic><topic>Noise measurement</topic><topic>passive attack</topic><topic>Privacy</topic><topic>Random variables</topic><topic>rate-limited public communication</topic><topic>Remote observing</topic><topic>remote source</topic><topic>Satellite broadcasting</topic><topic>Secure and private distributed source coding</topic><topic>Source coding</topic><topic>weak eavesdropper</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gunlu, Onur</creatorcontrib><creatorcontrib>Schaefer, Rafael F.</creatorcontrib><creatorcontrib>Boche, Holger</creatorcontrib><creatorcontrib>Vincent Poor, H.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Civil Engineering Abstracts</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>SWEPUB Linköpings universitet full text</collection><collection>SwePub</collection><collection>SwePub Articles</collection><collection>SWEPUB Freely available online</collection><collection>SWEPUB Linköpings universitet</collection><collection>SwePub Articles full text</collection><jtitle>IEEE transactions on information forensics and security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Gunlu, Onur</au><au>Schaefer, Rafael F.</au><au>Boche, Holger</au><au>Vincent Poor, H.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information</atitle><jtitle>IEEE transactions on information forensics and security</jtitle><stitle>TIFS</stitle><date>2023-01-01</date><risdate>2023</risdate><volume>18</volume><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1556-6013</issn><issn>1556-6021</issn><eissn>1556-6021</eissn><coden>ITIFA6</coden><abstract>The distributed source coding problem is extended by positing that noisy measurements of a remote source are the correlated random variables that should be reconstructed at another terminal. We consider a secure and private distributed lossy source coding problem with two encoders and one decoder such that (i) all terminals noncausally observe a noisy measurement of the remote source; (ii) a private key is available to each legitimate encoder and all private keys are available to the decoder; (iii) rate-limited noiseless communication links are available between each encoder and the decoder; (iv) the amount of information leakage to an eavesdropper about the correlated random variables is defined as secrecy leakage, and privacy leakage is measured with respect to the remote source; and (v) two passive attack scenarios are considered, where a strong eavesdropper can access both communication links and a weak eavesdropper can choose only one of the links to access. Inner and outer bounds on the rate regions defined under secrecy, privacy, communication, and distortion constraints are derived for both passive attack scenarios. When one or both sources should be reconstructed reliably, the rate region bounds are simplified.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TIFS.2023.3286285</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-2062-131X</orcidid><orcidid>https://orcid.org/0000-0002-0313-7788</orcidid><orcidid>https://orcid.org/0000-0002-1702-9075</orcidid><orcidid>https://orcid.org/0000-0002-8375-8946</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1556-6013 |
ispartof | IEEE transactions on information forensics and security, 2023-01, Vol.18, p.1-1 |
issn | 1556-6013 1556-6021 1556-6021 |
language | eng |
recordid | cdi_ieee_primary_10152476 |
source | IEEE Electronic Library (IEL) |
subjects | 6G mobile communication Coders Codes Communication Decoding Leakage Links Noise measurement passive attack Privacy Random variables rate-limited public communication Remote observing remote source Satellite broadcasting Secure and private distributed source coding Source coding weak eavesdropper |
title | Secure and Private Distributed Source Coding with Private Keys and Decoder Side Information |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T14%3A37%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20and%20Private%20Distributed%20Source%20Coding%20with%20Private%20Keys%20and%20Decoder%20Side%20Information&rft.jtitle=IEEE%20transactions%20on%20information%20forensics%20and%20security&rft.au=Gunlu,%20Onur&rft.date=2023-01-01&rft.volume=18&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1556-6013&rft.eissn=1556-6021&rft.coden=ITIFA6&rft_id=info:doi/10.1109/TIFS.2023.3286285&rft_dat=%3Cproquest_RIE%3E2830408609%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2830408609&rft_id=info:pmid/&rft_ieee_id=10152476&rfr_iscdi=true |