2025-11-15T08:40:12.184468

Privacy-Preserving Distributed Estimation with Limited Data Rate

Ke, Wang, Zhang
This paper focuses on the privacy-preserving distributed estimation problem with a limited data rate, where the observations are the sensitive information. Specifically, a binary-valued quantizer-based privacy-preserving distributed estimation algorithm is developed, which improves the algorithm's privacy-preserving capability and simultaneously reduces the communication costs. The algorithm's privacy-preserving capability, measured by the Fisher information matrix, is dynamically enhanced over time. Notably, the Fisher information matrix of the output signals with respect to the sensitive information converges to zero at a polynomial rate, and the improvement in privacy brought by the quantizers is quantitatively characterized as a multiplicative effect. Regarding the communication costs, each sensor transmits only 1 bit of information to its neighbours at each time step. Additionally, the assumption on the negligible quantization error for real-valued messages is not required. While achieving the requirements of privacy preservation and reducing communication costs, the algorithm ensures that its estimates converge almost surely to the true value of the unknown parameter by establishing a co-design guideline for the time-varying privacy noises and step-sizes. A polynomial almost sure convergence rate is obtained, and then the trade-off between privacy and convergence rate is established. Numerical examples demonstrate the main results.
academic

Privacy-Preserving Distributed Estimation with Limited Data Rate

Basic Information

  • Paper ID: 2510.12549
  • Title: Privacy-Preserving Distributed Estimation with Limited Data Rate
  • Authors: Jieming Ke, Jimin Wang, Ji-Feng Zhang
  • Classification: eess.SY (Systems and Control), cs.SY (Systems and Control)
  • Published Journal: IEEE Transactions on Automatic Control
  • Paper Link: https://arxiv.org/abs/2510.12549

Abstract

This paper investigates privacy-preserving distributed estimation under limited data transmission rates, where observational data constitutes sensitive information. The authors propose a privacy-preserving distributed estimation algorithm based on binary quantizers that simultaneously enhances privacy protection while reducing communication costs. The algorithm's privacy capability is measured through the Fisher information matrix, which dynamically strengthens over time. The Fisher information matrix converges to zero at a polynomial rate, with privacy improvements from quantization characterized as a multiplicative effect. In terms of communication efficiency, each sensor transmits only 1 bit of information to its neighbors at each time step. Notably, the approach does not require the assumption that quantization errors from real-valued messages are negligible. While achieving privacy protection and reduced communication costs, the algorithm ensures almost sure convergence of estimates to the true unknown parameter through a co-design principle governing time-varying privacy noise and step sizes.

Research Background and Motivation

Problem Definition

The core problem addressed in this paper is how to achieve accurate parameter estimation in distributed sensor networks while protecting the privacy of observational data, with minimal communication overhead.

Importance Analysis

  1. Practical Application Needs: In medical research, different hospitals need to share clinical observational data for joint analysis, but such data involves patient privacy concerns
  2. Communication Resource Constraints: In practical distributed systems, communication bandwidth and energy consumption are important constraints
  3. Privacy Leakage Risks: Traditional distributed estimation algorithms directly transmit estimates or observational data, easily leading to sensitive information disclosure

Limitations of Existing Methods

  1. Homomorphic Encryption Methods: While providing high-dimensional security, they suffer from high computational complexity
  2. Randomized Perturbation Methods: Require transmission of real-valued messages, resulting in quantization errors and high communication costs in digital networks
  3. Existing Quantization Methods: Rely on the assumption that quantization errors from real-valued messages are negligible, and estimates do not converge to true values

Research Motivation

This paper aims to design an algorithm simultaneously satisfying three requirements:

  1. Privacy protection capability dynamically strengthens over time
  2. Each sensor transmits only 1 bit of information per time step
  3. Estimates almost surely converge to true values

Core Contributions

  1. Quantified Privacy Improvement: First quantitatively characterizes the privacy improvement effect of quantizers; under Gaussian privacy noise, binary quantizers can enhance privacy protection levels by at least π/2 times
  2. Dynamically Enhanced Privacy: Proposes the concept of dynamically enhanced privacy, where the Fisher information matrix converges to zero at polynomial rates, supporting multiple noise types (Gaussian, Laplace, heavy-tailed noise)
  3. Extremely Low Communication Overhead: Achieves 1 bit per sensor per time step communication, the lowest data transmission rate among existing quantization-based privacy-preserving algorithms
  4. Co-design Framework: Establishes co-design principles for time-varying privacy noise and step sizes, ensuring almost sure convergence under quantized communication
  5. Privacy-Convergence Trade-off: Establishes the trade-off relationship between privacy protection and convergence rate, providing parameter selection guidance for practical applications

Methodology Details

Task Definition

Consider a distributed system with N sensors, where sensor i observes unknown parameter θ ∈ ℝⁿ:

y_{i,k} = H_{i,k}θ + w_{i,k}

where y_{i,k} is sensitive observational data that requires privacy protection during distributed parameter estimation.

Model Architecture

1. Binary Quantizer Design

The core innovation converts real-valued estimation information into binary signals:

  • If k = nq + l, sensor i generates a compressed vector φ_k with its l-th element equal to 1 and others 0
  • Compute scalar x_{i,k} = φ_k^T θ̂_{i,k-1}
  • Generate privacy noise d_{ij,k} and produce binary signal:
s_{ij,k} = {
  1,  if x_{i,k} + d_{ij,k} ≤ C_{ij}
  -1, otherwise
}

2. Algorithm 1: Binary Quantizer Privacy-Preserving Distributed Estimation

Privacy Protection Step: Convert previous time-step estimate to binary signal using binary quantizer
Information Fusion Step: θ̌_{i,k} = θ̂_{i,k-1} + φ_k ∑_{j∈N_{i,k}} α_{ij,k}a_{ij,k}(s_{ij,k} - s_{ji,k})
Estimate Update Step: θ̂_{i,k} = θ̌_{i,k} + β_{i,k}H̄_i^T(y_{i,k} - H̄_iθ̂_{i,k-1})

3. Fisher Information Privacy Metric

Uses the Fisher information matrix I_S(y) as the privacy measure:

I_S(y) = E[[(∂ln(P(S|y))/∂y)][(∂ln(P(S|y))/∂y)]^T|y]

Smaller Fisher information indicates better privacy protection.

Technical Innovation Points

1. Signal Comparison Mechanism

Unlike traditional quantization methods, this paper uses comparison of adjacent binary signals (s_{ij,k} - s_{ji,k}) for information fusion, avoiding limitations of biased compression rules.

2. Co-design Principles

Establishes co-design of privacy noise distributions {F_{ij,k}(·)} and step size sequences {α_{ij,k}, β_{i,k}}:

  • Privacy noise can be time-varying, even allowing polynomial growth
  • Step size design must satisfy stochastic approximation conditions while considering quantized communication characteristics

3. Markovian Switching Topology

Supports communication graphs switching among G^{(1)}, ..., G^{(M)} via Markov chains, simulating practical scenarios such as link failures.

Experimental Setup

Dataset

  • Sensor Network: 8-sensor system
  • Communication Topology: 4 switching graphs (shown in Figure 1), Markov chain switching
  • Parameter Settings: θ = 1, -1^T, sensor failure probability 0.5
  • Noise Model: Observational noise is zero-mean Gaussian with standard deviation 0.1

Evaluation Metrics

  1. Estimation Error: (1/100N)∑∑||θ̃^ς_{i,k}||²
  2. Privacy Level: Upper bound of EI_S(y_{i,k})
  3. Convergence Rate: Polynomial convergence rate analysis

Comparison Methods

  • Method from Reference 18: Traditional differential privacy distributed estimation
  • Algorithm 2 from Reference 28: Binary communication without privacy consideration
  • No Communication Case: Validates necessity of communication

Implementation Details

  • Step sizes: α_{ij,k} = 3/k^{0.8}, β_{i,k} = 3/k (for k≥8)
  • Privacy noise: Gaussian N(0,σ²_{ij,k}), Laplace Lap(0,b_{ij,k}), Cauchy Cauchy(0,r_{ij,k})
  • Noise parameters: σ_{ij,k} = b_{ij,k} = r_{ij,k} = k^{0.15}

Experimental Results

Main Results

1. Convergence Verification (Figure 2)

  • The proposed algorithm achieves convergence under all three privacy noise types
  • Compared to Reference 18, achieves similar estimation error with better privacy protection
  • Compared to Reference 28, smaller estimation error after 1000 iterations
  • No communication case shows non-convergence, validating communication necessity

2. Privacy Protection Effectiveness (Figure 3)

  • Upper bounds of non-zero elements in Fisher information matrix decrease over time
  • All three privacy noise types achieve dynamically enhanced privacy
  • Privacy protection level significantly outperforms Reference 18

3. Privacy-Convergence Trade-off (Figure 4)

  • Different χ values (1.3, 1.6, 1.9) demonstrate trade-off relationship
  • Larger χ values provide better privacy protection but slower convergence
  • Validates theoretical analysis of trade-off relationship

Ablation Studies

  • Effect of Removing φ_k: In high-dimensional cases (n=12), modified algorithm without φ_k converges faster
  • Different Noise Type Comparison: Gaussian, Laplace, and Cauchy noise all prove effective

Case Analysis

Medical Application Experiment

  • Data: Analysis of hypertension event rates in 281,299 British Caucasians
  • Setup: 20-sensor network, event rate θ≈0.2699
  • Results: Successfully achieves privacy-preserving distributed estimation

Experimental Findings

  1. 1-bit Communication Feasibility: Proves effective estimation is achievable with extremely low communication overhead
  2. Growing Noise Compatibility: Algorithm handles privacy noise growing over time
  3. Heavy-tailed Noise Robustness: Heavy-tailed noise such as Cauchy distribution does not affect convergence

Privacy Protection Methods Classification

  1. Homomorphic Encryption Methods 5-8: High security but high computational complexity
  2. Randomized Perturbation Methods 9-14: Low computational complexity but require real-valued transmission
  3. State Decomposition Methods 15 and Privacy Masking Methods 16

Quantized Communication Research

  1. Infinite-level Quantization 1: Traditional distributed estimation
  2. Finite Data Rate 21-27: Based on biased compression rules, requiring real-valued message assumptions
  3. Binary Strategies 28,29: Estimates do not converge to true values

Quantized Privacy Protection

  1. Dynamic Quantization Encryption 30: Combining homomorphic encryption
  2. Dithered Lattice Quantization 31-34: Achieves differential privacy but lacks quantitative analysis

Conclusions and Discussion

Main Conclusions

  1. Theoretical Contribution: First quantitatively characterizes the multiplicative privacy improvement effect of quantizers
  2. Algorithm Performance: Achieves dynamically enhanced privacy, 1-bit communication, and almost sure convergence
  3. Practical Value: Provides parameter selection guidance for privacy-convergence trade-offs

Limitations

  1. Dimensionality Constraints: The φ_k mechanism shows slower convergence in high-dimensional parameters (can be mitigated through modifications)
  2. Noise Assumptions: Requires satisfaction of specific noise distribution assumptions
  3. Network Topology: Assumes joint connectivity; actual networks may be more complex

Future Directions

  1. Distributed Optimization Extension: Apply methods to distributed optimization problems
  2. Measurement Matrix Protection: Extend to protecting privacy of measurement matrices H_{i,k}
  3. Adaptive Parameter Selection: Develop adaptive strategies for privacy noise and step size selection

In-depth Evaluation

Strengths

  1. Theoretical Rigor: Provides complete convergence and privacy theoretical analysis, including almost sure convergence rates and Fisher information convergence rates
  2. Practical Innovation: 1-bit communication represents the lowest among existing methods, with significant practical value
  3. Unified Framework: Supports multiple noise types (Gaussian, Laplace, Cauchy) with unified analytical framework
  4. Quantitative Characterization: First to quantitatively analyze the privacy improvement effect of quantizers

Weaknesses

  1. Missing Complexity Analysis: Lacks computational complexity analysis of the algorithm
  2. Parameter Selection Guidance: While providing theoretical guidance, practical parameter selection still requires empirical tuning
  3. Insufficient Large-scale Validation: Experimental scale is relatively small, lacking large-scale network validation

Impact

  1. Theoretical Contribution: Fisher information framework for privacy analysis provides foundation for subsequent research
  2. Practical Value: Extremely low communication overhead makes algorithm suitable for resource-constrained environments
  3. Cross-domain Applications: Promising applications in medical, smart grid, and other domains

Applicable Scenarios

  1. Medical Data Sharing: Multi-hospital joint research scenarios
  2. Internet of Things Sensing: Resource-constrained sensor networks
  3. Smart Grid: Distributed state estimation with privacy protection
  4. Financial Risk Control: Multi-institution collaborative risk assessment

References

The paper cites 60 relevant references covering distributed estimation, privacy protection, quantized communication, and other important works in multiple domains, providing solid theoretical foundation for the research.


Overall Evaluation: This is a high-quality paper emphasizing both theory and application, making important contributions to privacy-preserving distributed estimation. The algorithm design is ingenious, theoretical analysis is rigorous, and experimental validation is comprehensive, demonstrating significant academic value and practical significance.