Algorithm-Level Confidentiality for Average Consensus on Time-Varying Directed Graphs
Abstract
Average consensus plays a key role in distributed networks, with applications ranging from time synchronization, information fusion, load balancing, to decentralized control. Existing average consensus algorithms require individual agents to exchange explicit state values with their neighbors, which leads to the undesirable disclosure of sensitive information in the state. In this paper, we propose a novel average consensus algorithm for time-varying directed graphs that can protect the confidentiality of a participating agent against other participating agents. The algorithm injects randomness in interaction to obfuscate information on the algorithm-level and can ensure information-theoretic privacy without the assistance of any trusted third party or data aggregator. By leveraging the inherent robustness of consensus dynamics against random variations in interaction, our proposed algorithm can also guarantee the accuracy of average consensus. The algorithm is distinctly different from differential-privacy based average consensus approaches which enable confidentiality through compromising accuracy in obtained consensus value. Numerical simulations confirm the effectiveness and efficiency of our proposed approach.
Index Terms:
Average consensus, confidentiality, time-varying directed graphs.I Introduction
Averaging consensus is an important tool in distributed computing. For a network of agents interacting on a graph, average consensus can enable the states of all agents to converge to the average of their initial values through local interactions between neighboring agents.
Recently, average consensus is finding increased applications in load balancing [2, 3], network synchronization [4], distributed information fusion [5, 6], and decentralized control [7, 8]. To ensure all agents converge to the average value of their initial values, conventional average consensus approaches require individual agents to exchange explicit state values with their neighbors. This results in the disclosure of sensitive state information, which is sometimes undesirable in terms of confidentiality. In fact, in many applications such as the smart grid, health-care or banking networks, confidentiality is crucial for promoting participation in collaboration since individual agents tend not to trade confidentiality for performance [9, 10, 11]. For instance, a group of people using average consensus to reach a common opinion may want to keep their individual opinions secret [12]. Another typical example is power systems in which multiple generators have to reach agreement on cost while maintaining their individual generation information confidential [13].
To achieve confidentiality in average consensus, recently results have started to emerge. A commonly used confidentiality mechanism is differential privacy from the database literature [14, 15, 16, 17, 18, 19, 20] (and its variants [21, 22]) which injects independent (and hence uncorrelated) noises directly to agents’ states in order to achieve confidentiality in average consensus. However, the use of independent noises on the states in these approaches prevents converging to the exact average value [23]. To improve consensus accuracy, which is crucial in cyber-physical systems and sensor networks, [24, 25, 26, 27, 28, 29, 30, 31] inject carefully calculated correlated additive noises to agents’ states, instead of independent (and hence uncorrelated) noises used in differential-privacy based approaches. (A similar approach was proposed in [32] to achieve maximum consensus.) However, these prior works only consider average consensus under balanced and static network topologies. Different from injecting noises to agents’ states in the aforementioned approaches, [33] employed carefully designed mask maps to protect the actual states. Observability based approaches have also been reported to protect the confidentiality of multi-agent consensus [34, 35, 36]. Its idea is to design the topology of interactions such that the observability from a compromised agent is minimized, which amounts to minimizing the ability of the compromised agent to infer the initial states of other agents. Recently, encryption based approaches have been proposed to protect the confidentiality by encrypting exchanged messages with the assistance of additive homomorphic encryption [37, 38, 39, 40], with the price of increasing computation and communication overhead. Another confidentiality approach was proposed in [41] where each agent’s confidentiality is protected by decomposing its state into two sub-states. However, [41] relies on undirected interactions and is inapplicable to time-varying directed graphs considered in this paper.
This paper addresses the confidentiality of average consensus under time-varying directed graphs that are not necessarily balanced. Since push-sum based average consensus approaches do not require balanced topologies, we build our confidential average consensus algorithm on the push-sum approach. More specifically, to protect the confidentiality of the initial states of participating agents, in the first several iterations, we let agents send random values instead of their actual states to obfuscate their initial values. Of course, to guarantee the accuracy of average consensus, we have to judiciously design the state-update rule such that the randomness added in the first several iterations does not affect the final convergence result. Different from approaches injecting correlated additive noises directly to agents’ states, our approach adds independent (and hence uncorrelated in time) randomness directly to the average consensus dynamics, which makes it applicable to time-varying directed graphs. Compared with our prior work in [40] which employs homomorphic encryption to preserve confidentiality and [41] which protects each agent’s confidentiality by decomposing its state into two sub-states, this paper proposes a different approach that enables confidentiality by judiciously adding randomness in interaction dynamics. More importantly, both [40] and [41] rely on undirected interactions and hence are inapplicable to time-varying directed graphs considered in this paper. Some of the results here were presented at the 2018 IEEE Conference on Communications and Network Security (CNS) [1]. Compared with the conference version, the journal version has the following significant differences: 1) the journal version extends the results for constant directed graphs in [1] to time-varying directed graphs; 2) the journal version provides formal and rigorous analysis of convergence rate that does not exist in the conference version; 3) the journal version allows multiple adversaries to collude to infer the sensitive value a target agent, which is not addressed in our conference version; and 4) the journal version revises and enhances the proposed confidential average consensus algorithm to guarantee information-theoretic privacy, which is stronger than the confidentiality achieved in the conference version.
II Preliminaries and Problem Formulation
II-A Graph Representation
We represent a network of agents as a sequence of time-varying directed graphs where is the set of agents and is the time index. is the edge set at time , whose elements are such that holds if and only if there exists a directed edge from agent to agent at time , i.e., agent can send messages to agent at time . For notational convenience, we assume that there are no self edges, i.e., for all and . At time , each edge has an associated weight, . The out-neighbor set of agent at time , which represents the set of agents that can receive messages from agent at time , is denoted as . Similarly, at time , the in-neighbor set of agent , which represents the set of agents that can send messages to agent at time , is denoted as . From the above definitions, it can be obtained that and are equivalent. Agent ’s out-degree at time instant is represented by and its in-degree is represented by , where is the cardinality of the set .
At iteration , the incidence matrix for graph is defined as
(1) |
where represents the number of edges in . Note that the -th column of is corresponding to the -th edge in , and the sum of each column of is , i.e., .
For a sequence of time-varying directed graphs , we define as the set of directed edges that exist for infinitely many time instants, i.e.,
(2) |
We focus on time-varying directed graphs which satisfy the following assumptions:
Assumption 1
For a sequence of time-varying directed graphs , for any with , there exists at least one directed path from to in , i.e., is strongly connected.
Assumption 2
For a sequence of time-varying directed graphs , there exists an integer such that for every , agent directly communicates with agent at least once in every consecutive time instants. is called intercommunication interval bound.
Assumption 3
We assume that each agent has access to its out-degree at each iteration .
Remark 1
Assumption 3 is widely used in existing literature on time-varying directed graphs such as [42, 43, 44]. In fact, in many directed graphs, it is feasible for a node to know its out-neighbors. For example, in many safety-critical systems such as industrial control systems, the exchange of data occurs in a directed way due to unidirectional gateways (aka data diode) whereas control messages (a special type of messages used to configure network connections) can be exchanged in a bidirectional manner to establish connections [45].
II-B The Conventional Push-Sum
The conventional push-sum considers agents interacting on a constant directed graph , with each agent having an initial state () [46, 47]. Represent the average value of all initial states as . The conventional push-sum algorithm conducts two iterative computations simultaneously, and allows each agent to obtain the exact average of the initial values in an asymptotic way. This mechanism is summarized in Algorithm 0 below:
Algorithm 0: The conventional push-sum algorithm
-
1.
agents interact on a constant directed graph . Each agent is initialized with , , and . The weight associated with the edge satisfies if is true and otherwise. For any given , satisfies .
-
2.
At iteration step :
-
(a)
Agent calculates and , and sends both values to all of its out-neighbors .
-
(b)
After receiving the values of and from all its in-neighbors , agent updates and as follows:
(3) -
(c)
Agent uses the ratio to estimate the average value .
-
(a)
For the sake of notational simplicity, we rewrite (3) in the following more compact form:
(4) |
where and , and . From Algorithm 0, we have and . We can also obtain that the matrix is column-stochastic, i.e., holds for .
At iteration step , each agent computes the ratio to estimate the average value . Since is assumed to be a strongly connected directed graph, will converge to a rank- matrix exponentially fast [48, 49]. Defining as the limit of as , we can obtain the form of as where . Using the facts and , we can further have [50]:
(5) |
where and represent the -th element of vector and vector , respectively. Hence, all estimates will asymptotically converge to the average .
II-C Problem Formulation
In this paper, we will address average consensus under time-varying directed graphs while protecting the confidentiality of participating agents against adversaries. To this end, we first present some assumptions and definitions.
Assumption 4
We assume that all agents’ initial states are bounded. Without loss of generality, the lower bound and upper bound are denoted as and , respectively. Both and are assumed known to all agents.
Remark 2
It is worth noting that although the bounds and are assumed known to all agents, this does not mean that the minimum and maximum of all agents’ initial states are known to all agents. In fact, (resp. ) can be arbitrarily small (resp. large) compared with the actual minimum (resp. maximum) of agents’ initial states.
Definition 1
We define an honest-but-curious adversary as an agent who follows all protocol steps correctly but collects received messages in an attempt to infer the initial value of other participating agents.
Assumption 5
We assume that agents can collude, i.e., a set of honest-but-curious agents can share information with each other to infer the initial value of a target agent .
Definition 2
We define that confidentiality (privacy) of the initial value of agent is preserved if is indistinguishable from the viewpoint of honest-but-curious adversaries . By “indistinguishable,” we mean that the probability distribution of information set accessible to does not change when agent ’s initial state is altered to any under the constraint that the sum of the initial states of all nodes not in (i.e., ) is unchanged.
Our definition of confidentiality requires perfect indistinguishability of a target agent’s different initial states from the viewpoint of honest-but-curious adversaries , and, therefore, is more stringent than the confidentiality definition in [31, 32, 51, 52, 53] which defines confidentiality as the inability of an adversary to uniquely determine the sensitive value.
We next show that the conventional push-sum is not confidential. From (3) and (4), an honest-but-curious agent can receive and from its in-neighbor agent after the first iteration step . Then agent is able to uniquely determine by using the fact . Therefore, an honest-but-curious agent can always infer the initial values of all its in-neighbors, and hence the conventional push-sum algorithm cannot provide confidentiality against honest-but-curious adversaries. It is worth noting that using a similar argument, we can also obtain that the conventional push-sum is not confidential even when the weight is allowed to be time-varying (e.g., [47].)
III The Confidentiality Algorithm and Performance Analysis
In this section, we will propose a confidential average consensus algorithm for time-varying directed graphs, and then provide rigorous analysis of its convergence rate and enabled strength of confidentiality.
III-A Confidential Average Consensus Algorithm
The analysis above reveals that using the same weight for both and discloses the initial state value. Motivated by this observation and the work in [29], here we introduce a novel confidential average consensus algorithm which injects randomness in the dynamics of interactions in iterations . Note that here is a non-negative integer and is known to every agent. Its influence will be discussed in detail in Remark 11 and Remark 12.
Algorithm 1: Confidential average consensus algorithm
-
1.
agents interact on a sequence of time-varying directed graphs . Each agent is initialized with , , and where the function denotes the fractional part of a real number (here represents the largest integer not greater than ).
-
2.
At iteration step :
-
(a)
Agent generates a set of random weights with the sum of this set equal to , and sets for .
-
(b)
If , agent independently generates uniformly distributed values for its out-neighbors , and sets ; otherwise, agent sets for .
-
(c)
Agent sends and to its out-neighbors .
-
(d)
After receiving and from its in-neighbors , agent updates and as
(6) and
(7) respectively.
-
(e)
Agent uses the ratio to estimate the average value .
-
(a)
Remark 3
Compared to the conventional confidentiality-violating push-sum algorithm which broadcasts messages, Algorithm 1 needs agent to send different random numbers to different out-neighbors in iterations . This is a price of obtaining confidentiality without losing accuracy in the time-varying directed topology case.
Remark 4
The way of injecting randomness in is different in iterations from . In fact, in iterations , can be nonzero even when is zero. This is crucial in enabling strong confidentiality as receiving of a value zero will not allow the recipient to infer information about .
Remark 5
In Algorithm 1, the coupling weights are randomly chosen at every iteration. Compared with the commonly used deterministic setting in which the weights are set as for all , our setting is more general since it includes the commonly used setting as a special case by fixing to deterministic values. Furthermore, the random weights beyond step in Algorithm 1 can provide additional confidentiality protection for intermediate states after iteration . Given for , we can see that using random weights makes the intermediate state more difficult to infer than using deterministic weights .
Setting , , and to for , we can rewrite the update rules of for and for as
(8) |
Denoting , , and as , , and , we can further rewrite (8) into a matrix form
(9) |
For iteration , we have and . From Algorithm 1, we know that in (9) is time-varying and column-stochastic for .
Defining the transition matrix as follows
(10) |
for all and with , where , we can rewrite (9) as
(11) |
III-B Convergence Analysis
Next we prove that Algorithm 1 can guarantee that the estimates of all agents converge to the exact average value of initial values. We will also analyze the rate of convergence of Algorithm 1. Using the convergence definition in [43] and [54], we define the rate of convergence to be at least if there exists a positive constant value such that is true for all , where and is the average value. Note that this definition means a smaller corresponding to a faster convergence. To analyze the convergence rate of Algorithm 1, we first introduce Lemma 1 below:
Lemma 1
Proof: For , from (11) we have
(12) |
Represent as
(13) |
for . To prove for , it is sufficient to prove for . We divide our proof into two parts: and .
Part 1: for . One can verify that the following relationship holds
(14) | ||||
Given , one can obtain . Therefore, it follows that
(15) | ||||
is true for and , implying for .
Part 2: for . Under Assumptions 1 and 2, and the requirements on weights in Algorithm 1, and following the arguments in Lemma 2 in [55], we can obtain
(16) |
for . Since holds and is a column-stochastic matrix,
(17) |
should also be a column-stochastic matrix. Further using the fact leads to for . Therefore, we have
(18) |
for , meaning for .
Based on for , we can obtain for . In summary, we always have for .
Theorem 1
For a network of agents represented by a sequence of time-varying directed graphs satisfying Assumptions 1, 2, 3, and 4, under Algorithm 1, the estimate of each agent will converge to the average . More specifically, the rate of convergence of Algorithm 1 is at least , meaning that there exists a positive constant value satisfying for all .
Proof: From (6), we have
(19) | ||||
for where in the derivation we used the property for any . According to Assumption 4, holds for each agent . Given , one can obtain , leading to
(20) |
Further combining (19) and (20) yields
(21) |
Since is column stochastic, from (9) we have
(22) |
for . Then we rewrite (11) as
(23) |
for . Under Assumptions 1 and 2, and the requirements on weights in Algorithm 1, following Proposition 1(b) in [56], we know that the transition matrix will converge to a stochastic vector with a geometric rate for all and , i.e., for all and , we have
(24) |
with and . Defining as
(25) |
we have
(26) |
for all and . Further combining (25) with (23) leads to
(27) |
where in the derivation we used from (22). Then from (27), we have
(28) | ||||
Therefore, for and , we can obtain
(29) | ||||
where in the derivation we used from Lemma 1 and from (22). Further using the relationship and (26) yields
(30) |
for with given by
(31) |
Given , we have
(32) | ||||
where in the derivation we used from (21). Combining (32) with leads to
(33) | ||||
From (20) and (21), one can obtain . Defining as , then there must exist an integer such that holds. From (30), we can see that there must exist a positive integer such that
(34) |
holds for . Then it follows naturally one has
(35) |
for , which leads to
(36) |
for . Thus, we have
(37) | ||||
and further
(38) |
for with .
For , from (33), we have
(39) |
which further implies
(40) |
for . Defining as
(41) |
one can obtain
(42) |
for all . Therefore, each agent will converge to the average value with the rate of convergence of at least .
From Theorem 1, we can see that a smaller means a faster convergence. Under the relationship , to expedite the convergence, i.e., a smaller , it is sufficient to increase , which amounts to reducing the width of the range for the random selection of . Note that although a reduced range enables an honest-but-curious adversary to obtain a better estimation of the range of agent ’s intermediate states and for from received and , it does not affect the confidentiality of agent ’s initial state , as will be shown in the following subsection. It is also worth noting that to meet the requirement of randomly selecting weights in our algorithm, cannot be arbitrarily close to . In fact, must satisfy . An easy way to select is to set since is true for all and .
Remark 6
Theorem 1 provides a detailed analysis of the rate of convergence under time-varying directed graphs, the results on which are sparse in the literature on Push-Sum under time-varying random weights.
III-C Confidentiality Analysis
Before presenting our main confidentiality result, we first introduce the following lemma.
Lemma 2
Consider a network of agents represented by a sequence of time-varying directed graphs which satisfy Assumptions 1, 2, 3, 4, and 5. Under the proposed Algorithm 1, if at some time instant , agent has an in-neighbor or out-neighbor not belonging to , then under , the joint probability distributions of and are identical for any two different initial states subject to and for .
Proof: According to (6), we can rewrite the update rule of as follows
(43) | ||||
for . We stack all variables into a vector according to indices of edges in , namely, the index of is determined by the index of the edge in . Then we can further rewrite (43) in the following more compact form:
(44) |
for , where is the incidence matrix for graph at iteration .
Define the subsets of agents and as and , respectively. Let and represent the number of agents in and , respectively. It is clear that , , and are disjoint, and holds. For graph , we define the subgraph as where is the set of edges entirely within . The union of subgraphs for iterations is further denoted as , where is the union of edge sets for iterations . Denote the edge set as the collection of edges associated with all agents in at iteration , i.e., . Then the set of remaining edges not belonging to or can be denoted as , which is a collection of edges that are either entirely within or between and . Let , , and represent the number of edges in , , and , respectively. Note that , , and are disjoint, and we always have . Without loss of generality, we can partition the state vector as where , , and denote the state vectors of agents in , , and , respectively. Then we can further rewrite the update rule of for as
(45) | ||||
where is the incidence matrix for subgraph , and , , and are vectors stacking corresponding to edge sets , , and , respectively. It is obvious that is completely known to agents in since every element in is either sent or received by the agents in . From (45), we can further obtain
(46) | ||||
where , , and
(47) | ||||
It is worth noting that is the incidence matrix for graph . From (46), we have
(48) | ||||
Denoting as
(49) |
next we prove that is uniformly distributed in subject to if at some time instant , agent has an in-neighbor or out-neighbor not belonging to .
Given , if at some time instant , agent has an in-neighbor or out-neighbor not belonging to , the columns of are either ( is an in-neighbor of agent ) or ( is an out-neighbor of agent ). Denote the -th column of as , then can be expressed as
(50) |
where is the corresponding coefficient. Defining as , one can obtain
(51) | ||||
Since all the elements in are independent of each other and uniformly distributed in , we have that is uniformly distributed in . As is either or , we have that is uniformly distributed in subject to .
From (48), we have . Further taking into account the fact that is uniformly distributed in subject to if at some time instant , agent has an in-neighbor or out-neighbor not belonging to , we can obtain that is also uniformly distributed in subject to .
Now we analyze the probability distributions of under different initial conditions of agent . For any two different initial conditions subject to and for , one can obtain . Note that all the elements in and belong to the set . Thus, given , both and are uniformly distributed in subject to . Therefore, given , the probability distributions of under different and are identical when for and hold for some agent that is an in-neighbor or out-neighbor of agent at some time instant but does not belong to .
Now we are in position to present our main confidentiality result.
Theorem 2
Consider a network of agents represented by a sequence of time-varying directed graphs which satisfy Assumptions 1, 2, 3, 4, and 5. Under the proposed Algorithm 1, the confidentiality of agent can be preserved against if at some time instant , agent has an in-neighbor or out-neighbor not belonging to .
Proof: To show that the confidentiality of agent can be protected, we have to show that under different initial values of agent , the probability distributions are identical for honest-but-curious agents ’ information set. It suffices to prove that the probability distributions of information sets accessible to are identical for all subject to and for where agent is an in-neighbor or out-neighbor of agent at some time instant and does not belong to . Note that under such and , the sum of the initial states of all nodes not in keeps unchanged, i.e., . Given , this is equivalent to proving that the probability distributions of information sets accessible to are identical for all subject to and for . Denoting and as
(52) | ||||
where and are state vectors of agents in , and and are augmented vectors of and corresponding to edge set , respectively. We can see that agents in have access to both and at each iteration . Further denote , , , , , and as
(53) | ||||
According to Algorithm 1, represents all the information accessible to . We denote the conditional probability density of given as . Thus, to show that the confidentiality of agent can be protected, it is equivalent to proving for all subject to and for .
Since
(54) |
holds, to show , it suffices to prove that
(55) |
and
(56) |
hold for any subject to and for .
We first show . Since is independent of and , one can obtain . From (45), we can see that given , is independent of and , where and . So holds. Therefore, we have
(57) | ||||
where we used in the derivation.
To show , it suffices to prove
(58) | ||||
Given and , is independent of , which further leads to
(59) | ||||
Further taking into account the facts that 1) is conditionally independent of and given and ; and 2) is conditionally independent of and given , one can obtain
(60) | ||||
Similarly, one can also obtain
(61) | ||||
Therefore, to show , it suffices to prove . Denote as . To prove , we only need to prove
(62) |
From (46), we can obtain the following facts: 1) is conditionally independent of and given , , and ; and 2) and are conditionally independent of given , , , and . Taking into account these facts, we have
(63) | ||||
where in the derivation we used the independence between and . Similarly, one can obtain
(64) | ||||
From Lemma 2, we have that if at some time instant , agent has an in-neighbor or out-neighbor not belonging to , holds, where is the collection of all elements in and from iteration to iteration . Given that and hold for , we further have . Based on and , we have , implying if at some time instant , agent has an in-neighbor or out-neighbor not belonging to .
Therefore, we have for any subject to and for , meaning that the confidentiality of agent can be preserved if at some time instant , agent has an in-neighbor or out-neighbor that does not belong to .
Remark 7
Compared with our previous work [1] which defines privacy as the positivity of probability that adversaries’ accessible information set being the same under two different initial states, in this work we significantly improved our confidential results by proving that the probability distributions of information sets are identical under different initial states, meaning that the initial states are perfectly indistinguishable from the viewpoint of adversaries.
Remark 8
It is worth noting that although the confidential approach in [30] looks similar to ours (both protocols employ random values in the first several iterations), they are in fact significantly different. More specifically, to guarantee the accuracy of average consensus, not only does the confidential protocol in [30] require pairwise local averaging of exchanged random values in the first several iterations, but it also needs to compensate the errors induced by the random values immediately after the first several iterations, which is equivalent to introducing time-correlated additive random noises to agents’ states. To the contrary, our confidential approach exchanges time-uncorrelated random values for iterations . To ensure consensus accuracy, each agent uses a carefully-designed to compensate the errors induced by the random values at each iteration . Therefore, the random values used in our approach are space-correlated. As shown in Theorem 2, the space-correlated randomness can make the probability distributions of information sets accessible to adversaries identical under different initial states and hence achieves information-theoretic privacy, which is stronger than the confidentiality achieved using time-correlated noises in [30].
Next we proceed to show that if the conditions in Theorem 2 are not met, then the confidentiality of agent may be breached.
Theorem 3
Consider a network of agents represented by a sequence of time-varying directed graphs which satisfy Assumptions 1, 2, 3, 4, and 5. Under the proposed Algorithm 1, the confidentiality of agent cannot be preserved against if all in-neighbors and out-neighbors of agent belong to , i.e., . In fact, when is true, the initial value of agent can be uniquely determined by honest-but-curious agents in .
According to the requirements in Algorithm 1, we have for and for . Plugging these relationships into (6) and (7), we can obtain
(68) | ||||
for and
(69) | ||||
for , which further lead to
(70) | ||||
for and
(71) | ||||
for .
Under Assumption 5, if is true, then all terms on the right-hand side of (70) and (71) are known to the honest-but-curious agents in . Further taking into account , we have that agents in can uniquely determine for all . Under Assumption 1 and , there must exist at least one agent such that is true. This is because otherwise graph is not strongly connected, which does not satisfy Assumption 1. According to Assumption 2, agent directly communicates with agent at least once in every consecutive time instants. So there must exist at which agent directly communicates with agent , i.e., agent sends and to agent at iteration . As , every honest-but-curious agent in has access to and . So agents in can easily infer by using the following relationship
(72) |
and then determine the value of using (70). Further making use of (67), agents in can infer the value of , and then uniquely determine the initial value of agent using . Therefore, the confidentiality of agent cannot be preserved against if all in-neighbors and out-neighbors of agent belong to .
Remark 9
Remark 10
Remark 11
From the above analysis, we know that introducing randomness into interaction dynamics by each agent for is key to protect confidentiality against honest-but-curious agents. It is worth noting that compared with the conventional push-sum approach which does not take confidentiality into consideration, the introduced randomness in our approach has no influence on the convergence rate . However, the randomness does delay the convergence process and hence leads to a trade-off between confidentiality preservation and convergence time. This is confirmed in our numerical simulations in Fig. 2, which shows that convergence only initiates after .
Remark 12
If an adversary can obtain side information, then a larger protects the confidentiality of more intermediate states for . This is because for , can be easily obtained by its out-neighbor due to the relationship if side information about is available to the adversary . Therefore, although a larger leads to more delay in the convergence process, as discussed in Remark 11, it can protect more intermediate states ( for ) when an adversary can obtain side information. Of course, if side information is not of concern, a smaller is preferable to minimize the delay in the convergence process.
Remark 13
Our algorithm can be extended to preserve confidentiality against external eavesdroppers wiretapping all communication links without compromising algorithmic accuracy by patching partially homomorphic encryption. More specifically, using public-key cryptosystems (e.g., Paillier [57], RSA [58], and ElGamal [59]), each agent generates and floods its public key before the consensus iteration starts. Then in decentralized implementation, an agent encrypts its messages to be sent, which can be decrypted by a legitimate recipient without the help of any third party. Note that since public-key cryptosystems can only deal with integers, the final consensus result would be subject to a quantization error. However, as indicated in our previous work [40], the quantization error can be made arbitrarily small in implementation.
IV Results Validation
We conducted numerical simulations to verify the correctness and the effectiveness of our proposed approach.
We first evaluated our proposed Algorithm 1 under a network of agents interacting on a time-varying directed graph. More specifically, we used the interaction graph in Fig. 1(a) when is even and Fig. 1(b) when is odd. It can be verified that this time-varying directed graph satisfies Assumptions 1 and 2. Parameter was set to . The initial values for were randomly chosen from . We used to measure the estimation error between the estimate and the true average value at iteration , i.e.,
(73) |
Three experiments were conducted with parameter being , , and , respectively. The evolution of is shown in Fig. 2. It can be seen that approached , meaning that every agent converged to the average value . From Fig. 2, we can also see that Algorithm 1 did not start to converge in the first iterations due to the introduced randomness, which confirms our analysis in Remark 11.


We also evaluated the influence of parameter on the convergence rate . The interaction graph was the same as above. was set to . The simulation results are given in Fig. 3 where the mean and variance of from runs of the algorithm are shown under different values of . Fig. 3 shows that as increases, the convergence rate decreases (i.e., the convergence speed increases), which confirms our analysis in Sec. III-B.

We then compared the proposed Algorithm 1 with existing data-obfuscation based approaches, more specifically, the differential-privacy based approach in [14], the decaying-noise approach in [27], and the finite-noise-sequence approach in [31]. Under the same setup as in the previous simulation, we chose the initial values as , which led to an average value . We adopted the weight matrix from [14], i.e., the -th entry was for and for . As the graph is directed and imbalanced, and does not meet the undirected or balanced assumption in [14, 31, 27], all three approaches failed to achieve average consensus, as shown in the numerical simulation results in Fig. 4, Fig. 5, and Fig. 6, respectively.



Finally, we conducted numerical simulations to verify the scalability of our proposed Algorithm 1 using a network of agents. At every iteration , each agent was assumed to have three out-neighbors, i.e.,
(74) |
where the superscript “” represents modulo operation on , i.e., . The initial values for were randomly chosen from . and were set to and , respectively. The evolution of estimation error is shown in Fig. 7. It can be seen that converged to , implying that our proposed algorithm can guarantee the convergence of all agents to the actual average value even when the network size is large.

V Conclusions
We proposed a confidential average consensus algorithm for time-varying directed graphs. In distinct difference from existing differential-privacy based approaches which enable confidentiality through compromising the accuracy of obtained consensus value, we leveraged the inherent robustness of average consensus to embed randomness in interaction dynamics, which guarantees confidentiality of participating agents without sacrificing the accuracy of average consensus. Finally, we provided numerical simulation results to confirm the effectiveness and efficiency of our proposed approach.
References
- [1] H. Gao, C. Zhang, M. Ahmad, and Y. Q. Wang, “Privacy-preserving average consensus on directed graphs using push-sum,” in 2018 IEEE Conference on Communications and Network Security (CNS), 2018.
- [2] J. E. Boillat, “Load balancing and poisson equation in a graph,” Concurrency and Computation: Practice and Experience, vol. 2, no. 4, pp. 289–313, 1990.
- [3] G. Cybenko, “Dynamic load balancing for distributed memory multiprocessors,” J. Parallel Distrib. Comput., vol. 7, no. 2, pp. 279–301, 1989.
- [4] N. A. Lynch, Distributed algorithms. San Francisco, CA: Morgan Kaufmann Publishers, 1996.
- [5] D. S. Scherber and H. C. Papadopoulos, “Locally constructed algorithms for distributed computations in ad-hoc networks,” in Proc. Information Processing Sensor Networks (IPSN), 2004, pp. 11–19.
- [6] L. Xiao, S. Boyd, and S. Lall, “A scheme for robust distributed sensor fusion based on average consensus,” in Proc. Information Processing Sensor Networks (IPSN), 2005, pp. 63–70.
- [7] R. Olfati-Saber and R. M. Murray, “Consensus problems in networks of agents with switching topology and time-delays,” IEEE Trans. Autom. Control, vol. 49, no. 9, pp. 1520–1533, 2004.
- [8] W. Ren and R. W. Beard, “Consensus seeking in multiagent systems under dynamically changing interaction topologies,” IEEE Trans. Autom. Control, vol. 50, no. 5, pp. 655–661, 2005.
- [9] O. L. Mangasarian, “Privacy-preserving linear programming,” Optimization Letters, vol. 5, no. 1, pp. 165–172, 2011.
- [10] R. Hoenkamp, G. B. Huitema, and A. J. C. de Moor-van Vugt, “The neglected consumer: the case of the smart meter rollout in the netherlands,” Renew. Energy Law Policy Rev., pp. 269–282, 2011.
- [11] Y. Lou, L. Yu, S. Wang, and P. Yi, “Privacy preservation in distributed subgradient optimization algorithms,” IEEE Trans. Cybern., vol. 48, no. 7, pp. 2154–2165, 2017.
- [12] J. N. Tsitsiklis, “Problems in decentralized decision making and computation,” Ph.D. dissertation, 1984.
- [13] Z. Zhang and M. Y. Chow, “Incremental cost consensus algorithm in a smart grid environment,” in 2011 IEEE Power and Energy Society General Meeting, 2011, pp. 1–6.
- [14] Z. Huang, S. Mitra, and G. Dullerud, “Differentially private iterative synchronous consensus,” in Proceedings of the 2012 ACM workshop on Privacy in the electronic society, 2012, pp. 81–90.
- [15] Z. Huang, S. Mitra, and N. Vaidya, “Differentially private distributed optimization,” in Proc. Int. Conf. Distrib. Comput. Netw., 2015, pp. 4:1–4:10.
- [16] E. Nozari, P. Tallapragada, and J. Cortés, “Differentially private average consensus with optimal noise selection,” IFAC-PapersOnLine, vol. 48, no. 22, pp. 203–208, 2015.
- [17] ——, “Differentially private average consensus: obstructions, trade-offs, and optimal algorithm design,” Automatica, vol. 81, pp. 221–231, 2017.
- [18] V. Katewa, F. Pasqualetti, and V. Gupta, “On privacy vs. cooperation in multi-agent systems,” Int. J. Control, vol. 91, no. 7, pp. 1693–1707, 2018.
- [19] L. Gao, S. Deng, W. Ren, and C. Hu, “Differentially private consensus with quantized communication,” IEEE Trans. Cybern., 2019.
- [20] D. Ye, T. Zhu, W. Zhou, and S. Y. Philip, “Differentially private malicious agent avoidance in multiagent advising learning,” IEEE Trans. Cybern., 2019.
- [21] M. Kefayati, M. S. Talebi, B. H. Khalaj, and H. R. Rabiee, “Secure consensus averaging in sensor networks using random offsets,” in Proc. IEEE Int. Conf. Telecommun. Malaysia Int. Conf. Commun., 2007, pp. 556–560.
- [22] X. Wang, J. He, P. Cheng, and J. Chen, “Privacy preserving average consensus with different privacy guarantee,” in 2018 Annual American Control Conference (ACC). IEEE, 2018, pp. 5189–5194.
- [23] Y. Wang, Z. Huang, S. Mitra, and G. E. Dullerud, “Differential privacy in linear distributed control systems: Entropy minimizing mechanisms and performance tradeoffs,” IEEE Trans. Control Netw. Syst., vol. 4, no. 1, pp. 118–130, 2017.
- [24] J. He, L. Cai, P. Cheng, J. Pan, and L. Shi, “Distributed privacy-preserving data aggregation against dishonest nodes in network systems,” IEEE Internet of Things Journal, vol. 6, no. 2, pp. 1462–1470, 2018.
- [25] ——, “Consensus-based data-privacy preserving data aggregation,” IEEE Transactions on Automatic Control, vol. 64, no. 12, pp. 5222–5229, 2019.
- [26] J. He, L. Cai, C. Zhao, P. Cheng, and X. Guan, “Privacy-preserving average consensus: privacy analysis and algorithm design,” IEEE Transactions on Signal and Information Processing over Networks, vol. 5, no. 1, pp. 127–138, 2018.
- [27] Y. Mo and R. M. Murray, “Privacy preserving average consensus,” IEEE Trans. Autom. Control, vol. 62, no. 2, pp. 753–765, 2017.
- [28] T. Charalambous, N. E. Manitara, and C. N. Hadjicostis, “Privacy-preserving average consensus over digraphs in the presence of time delays,” in 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2019, pp. 238–245.
- [29] N. Gupta, J. Kat, and N. Chopra, “Statistical privacy in distributed average consensus on bounded real inputs,” in 2019 American Control Conference (ACC). IEEE, 2019, pp. 1836–1841.
- [30] A. B. Pilet, D. Frey, and F. Taiani, “Robust privacy-preserving gossip averaging,” in International Symposium on Stabilizing, Safety, and Security of Distributed Systems. Springer, 2019, pp. 38–52.
- [31] N. E. Manitara and C. N. Hadjicostis, “Privacy-preserving asymptotic average consensus,” in 2013 European Control Conference, 2013, pp. 760–765.
- [32] X. Duan, J. He, P. Cheng, Y. Mo, and J. Chen, “Privacy preserving maximum consensus,” in 2015 IEEE 54th Annual Conference on Decision and Control (CDC), 2015, pp. 4517–4522.
- [33] C. Altafini, “A dynamical approach to privacy preserving average consensus,” in 2019 IEEE 58th Conference on Decision and Control (CDC). IEEE, 2019, pp. 4501–4506.
- [34] S. Pequito, S. Kar, S. Sundaram, and A. P. Aguiar, “Design of communication networks for distributed computation with privacy guarantees,” in 2014 IEEE 53rd Annual Conference on Decision and Control (CDC), 2014, pp. 1370–1376.
- [35] I. D. Ridgley, R. A. Freeman, and K. M. Lynch, “Simple, private, and accurate distributed averaging,” in 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2019, pp. 446–452.
- [36] A. Alaeddini, K. Morgansen, and M. Mesbahi, “Adaptive communication networks with privacy guarantees,” in Proceedings of 2017 American Control Conference, 2017, pp. 4460–4465.
- [37] M. Kishida, “Encrypted average consensus with quantized control law,” in 2018 IEEE Conference on Decision and Control (CDC). IEEE, 2018, pp. 5850–5856.
- [38] C. N. Hadjicostis and A. D. Dominguez-Garcia, “Privacy-preserving distributed averaging via homomorphically encrypted ratio consensus,” IEEE Trans. Autom. Control, 2020.
- [39] W. Fang, M. Zamani, and Z. Chen, “Secure and privacy preserving consensus for second-order systems based on paillier encryption,” arXiv preprint arXiv:1805.01065, 2018.
- [40] M. Ruan, H. Gao, and Y. Wang, “Secure and privacy-preserving consensus,” IEEE Trans. Autom. Control, vol. 64, no. 10, pp. 4035–4049, 2019.
- [41] Y. Wang, “Privacy-preserving average consensus via state decomposition,” IEEE Trans. Autom. Control, vol. 64, no. 11, pp. 4711–4716, 2019.
- [42] A. Nedić and A. Olshevsky, “Distributed optimization over time-varying directed graphs,” IEEE Transactions on Automatic Control, vol. 60, no. 3, pp. 601–615, 2014.
- [43] A. Nedic, A. Olshevsky, and W. Shi, “Achieving geometric convergence for distributed optimization over time-varying graphs,” SIAM Journal on Optimization, vol. 27, no. 4, pp. 2597–2633, 2017.
- [44] J. Zhu, C. Xu, J. Guan, and D. O. Wu, “Differentially private distributed online algorithms over time-varying directed networks,” IEEE Transactions on Signal and Information Processing over Networks, vol. 4, no. 1, pp. 4–17, 2018.
- [45] A. Scott, “Tactical data diodes in industrial automation and control systems,” SANS Institute InfoSec Reading Room, 2015.
- [46] D. Kempe, A. Dobra, and J. Gehrke, “Gossip-based computation of aggregate information,” in Proc. 44th IEEE Symp. Found. Comput. Sci., 2003, pp. 482–491.
- [47] F. Bénézit, V. Blondel, P. Thiran, J. Tsitsiklis, and M. Vetterli, “Weighted gossip: Distributed averaging using non-doubly stochastic matrices,” in Proc. IEEE Int. Symp. Inf. Theory, 2010, pp. 1753–1757.
- [48] E. Seneta, Non-negative Matrices and Markov Chains. Springer, 1973.
- [49] J. A. Fill, “Eigenvalue bounds on convergence to stationarity for nonreversible markov chains, with an application to the exclusion process,” Ann. Appl. Probab., pp. 62–87, 1991.
- [50] C. N. Hadjicostis, A. D. Domínguez-García, and T. Charalambous, “Distributed averaging and balancing in network systems: with applications to coordination and control,” Foundations and Trends® in Systems and Control, vol. 5, no. 2-3, pp. 99–292, 2018.
- [51] K. Liu, H. Kargupta, and J. Ryan, “Random projection-based multiplicative data perturbation for privacy preserving distributed data mining,” IEEE Trans. Knowl. Data Eng., vol. 18, no. 1, pp. 92–106, 2006.
- [52] S. Han, W. K. Ng, L. Wan, and V. C. S. Lee, “Privacy-preserving gradient-descent methods,” IEEE Trans. Knowl. Data Eng., vol. 22, no. 6, pp. 884–899, 2010.
- [53] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 222–233, 2014.
- [54] A. Nedić, A. Olshevsky, and W. Shi, “A geometrically convergent method for distributed optimization over time-varying graphs,” in Proc. IEEE 55th Conf. Decis. Control, 2016, pp. 1023–1029.
- [55] A. Nedic and A. Ozdaglar, “Distributed subgradient methods for multi-agent optimization,” IEEE Transactions on Automatic Control, vol. 54, no. 1, pp. 48–61, 2009.
- [56] A. Nedić, A. Ozdaglar, and P. A. Parrilo, “Constrained consensus and optimization in multi-agent networks,” IEEE Trans. Autom. Control, vol. 55, no. 4, pp. 922–938, 2010.
- [57] P. Paillier, “Public-key cryptosystems based on composite degree residuosity classes,” in International conference on the theory and applications of cryptographic techniques. Springer, 1999, pp. 223–238.
- [58] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
- [59] T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” IEEE transactions on information theory, vol. 31, no. 4, pp. 469–472, 1985.
![]() |
Huan Gao was born in Shandong, China. He received the B.S. degree in automation and the M.Sc. degree in control theory and control engineering from Northwestern Polytechnical University, Xi’an, Shaanxi, China, in 2011 and 2015, respectively, and the Ph.D. degree in electrical engineering from Clemson University, Clemson, SC, USA, in 2020. He is currently an Associate Professor with the School of Automation, Northwestern Polytechnical University. His research interests include decentralized optimization, cooperative control, and privacy preservation in distributed systems. |
![]() |
Yongqiang Wang was born in Shandong, China. He received the B.S. degree in electrical engineering and automation, the B.S. degree in computer science and technology from Xi’an Jiaotong University, Xi’an, Shaanxi, China, in 2004, and the M.Sc. and Ph.D. degrees in control science and engineering from Tsinghua University, Beijing, China, in 2009. From 2007 to 2008, he was with the University of Duisburg-Essen, Germany, as a Visiting Student. He was a Project Scientist with the University of California at Santa Barbara, Santa Barbara. He is currently an Associate Professor with the Department of Electrical and Computer Engineering, Clemson University. His current research interests include distributed control, optimization, and learning, with emphasis on privacy protection. He currently serves as an associate editor for IEEE Transactions on Control of Network systems and IEEE Transactions on Automatic Control. |