Visible to the public A New Evolutionary Computation Framework for Privacy-Preserving Optimization

TitleA New Evolutionary Computation Framework for Privacy-Preserving Optimization
Publication TypeConference Paper
Year of Publication2021
AuthorsZhan, Zhi-Hui, Wu, Sheng-Hao, Zhang, Jun
Conference Name2021 13th International Conference on Advanced Computational Intelligence (ICACI)
Keywordsartificial intelligence, composability, compositionality, Computational Intelligence, cryptography, evolutionary computation, Linear programming, Neural networks, privacy, privacy preserving optimization problem, Processor scheduling, pubcrawl, rank-based cryptographic function, scheduling
AbstractEvolutionary computation (EC) is a kind of advanced computational intelligence (CI) algorithm and advanced artificial intelligence (AI) algorithm. EC algorithms have been widely studied for solving optimization and scheduling problems in various real-world applications, which act as one of the Big Three in CI and AI, together with fuzzy systems and neural networks. Even though EC has been fast developed in recent years, there is an assumption that the algorithm designer can obtain the objective function of the optimization problem so that they can calculate the fitness values of the individuals to follow the "survival of the fittest" principle in natural selection. However, in a real-world application scenario, there is a kind of problem that the objective function is privacy so that the algorithm designer can not obtain the fitness values of the individuals directly. This is the privacy-preserving optimization problem (PPOP) where the assumption of available objective function does not check out. How to solve the PPOP is a new emerging frontier with seldom study but is also a challenging research topic in the EC community. This paper proposes a rank-based cryptographic function (RCF) to protect the fitness value information. Especially, the RCF is adopted by the algorithm user to encrypt the fitness values of all the individuals as rank so that the algorithm designer does not know the exact fitness information but only the rank information. Nevertheless, the RCF can protect the privacy of the algorithm user but still can provide sufficient information to the algorithm designer to drive the EC algorithm. We have applied the RCF privacy-preserving method to two typical EC algorithms including particle swarm optimization (PSO) and differential evolution (DE). Experimental results show that the RCF-based privacy-preserving PSO and DE can solve the PPOP without performance loss.
DOI10.1109/ICACI52617.2021.9435860
Citation Keyzhan_new_2021