Christoph Georg Schütz, Thomas Lorünser, Samuel Jaburek, Kevin Schütz, Florian Wohner, Roman Karl, Eduard Gringinger,
"A Distributed Architecture for Privacy-Preserving Optimization Using Genetic Algorithms and Multi-party Computation"
, in Sellami, M., Ceravolo, P., Reijers, H.A., Gaaloul, W., Panetto, H. (eds): Proceedings of the International Conference on Cooperative Information Systems (CoopIS 2022), Bozen, Italy, October 4-7, 2022, Serie Lecture Notes in Computer Science (LNCS), Vol. LNCS Vol. 13591, Springer Verlag, Seite(n) 168-185, 2022, ISBN: 978-3-031-17833-7
A Distributed Architecture for Privacy-Preserving Optimization Using Genetic Algorithms and Multi-party Computation
Sprache des Titels:
Proceedings of the International Conference on Cooperative Information Systems (CoopIS 2022), Bozen, Italy, October 4-7, 2022
In many industries, competitors are required to cooperate in order to conduct optimizations, e.g., to solve an assignment problem. For example, in air traffic flow management (ATFM), flight prioritization in case of temporarily reduced capacity of the air traffic network is an instance of the assignment problem. Participants, however, are typically reluctant to share sensitive information regarding their preferences for the optimization, which renders conventional approaches to optimization inadequate.This paper proposes amethod for combining genetic algorithms with multi-party computation (MPC) as the basis for building a platform for optimizing the assignment of resources to different agents under the assumption of an honest-but-curious platform provider; the method is illustrated on the ATFM use case. In the proposed method a genetic algorithm iteratively generates a population of candidate solutions to the assignment problem while a Privacy Engine component evaluates the population in each iteration step. The participants? private inputs are kept from competitors and not even the platform provider knows those inputs, receiving only encrypted input which is processed by MPC nodes in a way that preserves the secrecy of the inputs.
Keywords: Security, Evolutionary optimization, Assignment problem, Air traffic flow management