Privacy-preserving obfuscation of critical infrastructure networks

Ferdinando Fioretto, Terrence W.K. Mak, Pascal Van Hentenryck

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

9 Citations (Scopus)

Abstract

The paper studies how to release data about a critical infrastructure network (e.g., a power network or a transportation network) without disclosing sensitive information that can be exploited by malevolent agents, while preserving the realism of the network. It proposes a novel obfuscation mechanism that combines several privacy-preserving building blocks with a bi-level optimization model to significantly improve accuracy. The obfuscation is evaluated for both realism and privacy properties on real energy and transportation networks. Experimental results show the obfuscation mechanism substantially reduces the potential damage of an attack exploiting the released data to harm the real network.

Original languageEnglish
Title of host publicationProceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence
EditorsSarit Kraus
Place of PublicationMarina del Rey CA USA
PublisherAssociation for the Advancement of Artificial Intelligence (AAAI)
Pages1086-1092
Number of pages7
ISBN (Electronic)9780999241141
DOIs
Publication statusPublished - 2019
Externally publishedYes
EventInternational Joint Conference on Artificial Intelligence 2019 - Macao, China
Duration: 10 Aug 201916 Aug 2019
Conference number: 28th
https://ijcai19.org/
https://www.ijcai.org/proceedings/2019/ (Proceedings)

Publication series

NameIJCAI International Joint Conference on Artificial Intelligence
PublisherAssociation for the Advancement of Artificial Intelligence (AAAI)
Volume2019-August
ISSN (Print)1045-0823

Conference

ConferenceInternational Joint Conference on Artificial Intelligence 2019
Abbreviated titleIJCAI 2019
Country/TerritoryChina
CityMacao
Period10/08/1916/08/19
Internet address

Keywords

  • Constraints and SAT
  • Constraints
  • Applications
  • Multidisciplinary Topics and Applications
  • Security and Privacy

Cite this