from Part I - Theoretical Foundations
Published online by Cambridge University Press: 28 June 2017
In this chapter we consider secure source coding problems in a network scenario consisting of multiple terminals. An information theoretic formulation using a mutual information-based secrecy/privacy measure is considered. We discuss how the networking aspects such as cooperation and interaction among nodes impact the fundamental tradeoff of the secure source coding system, i.e., the tradeoff among rate, distortion, and information leakage rate. Several problem settings are presented including the setting with a helper, the setting with an intermediate node, and the setting under a reconstruction privacy constraint. Results are presented together with some comprehensive discussions.
Introduction
The concept of information security and privacy is highly relevant today, and is expected to be even more so in future networks where almost everyone and everything will be connected (cf. Internet of Things (IoT), machine to machine (M2M), etc.). Users in the network may share information with one another for possible cooperation, but at the same time they wish to reveal as little information as possible to a certain network entity. Information security and privacy have emerged as necessary features and become standard requirements in modern communication systems. From the networking perspective, they may be addressed at different layers of the system. For example, encryption is used to protect information in the link layer. Nevertheless, a major security concern lies at the physical layer where the communication channel is vulnerable to eavesdropping. Addressing these issues at the physical layer is therefore essential and can effectively complement and improve the level of security in general.
Recently, due to potential applications in areas such as privacy in sensor networks and databases (see, e.g., [1]) and privacy of distributed storage (see, e.g., [2, 3] for privacy of genomic data), the concept of information security and privacy from a data compression perspective has been studied, under a common theme called secure source coding. In this chapter, we present some interesting instances of networked secure source coding problems that take into account information theoretic security and privacy requirements in the problem formulations. Different aspects of the network involving multiple terminals will be considered, e.g., coordination with a helper, cooperation through an intermediate node, and computation based on received information.
To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Find out more about the Kindle Personal Document Service.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.
To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.