Differentially Private Distributed Mismatch Tracking Algorithm for Constraint-Coupled Resource Allocation Problems
Abstract
This paper considers privacy-concerned distributed constraint-coupled resource allocation problems over an undirected network, where each agent holds a private cost function and obtains the solution via only local communication. With privacy concerns, we mask the exchanged information with independent Laplace noise against a potential attacker with potential access to all network communications. We propose a differentially private distributed mismatch tracking algorithm (diff-DMAC) to achieve cost-optimal distribution of resources while preserving privacy. Adopting constant stepsizes, the linear convergence property of diff-DMAC in mean square is established under the standard assumptions of Lipschitz gradients and strong convexity. Moreover, it is theoretically proven that the proposed algorithm is -differentially private. And we also show the trade-off between convergence accuracy and privacy level. Finally, a numerical example is provided for verification.
I INTRODUCTION
Distributed resource allocation problem (DRAP) has received much attention due to its wide applications in various domains, including smart grids [1], wireless networks[2] and robot networks [3]. The goal of DRAP is to achieve the cost-optimal distribution of limited resources among users to meet their demands, local constraints, and possibly certain coupled global constraints, see [4] for example. Conventional centralized approaches are subject to performance limitations of the central entity, such as a single point of failure, limited scalability. Moreover, it may raise privacy concerns when the central agent is not reliable enough. Alternatively, distributed approaches which operate with only local information have better robustness and scalability, especially for large-scale systems [5, 6, 7].
To implement algorithms in a distributed manner, the information exchange between agents in the network is unavoidable which can raise concerns about privacy disclosure. For example, in the supply–demand optimization of the power grid, attackers can infer users’ life patterns from certain published information that is computed based on the demand from users[8]. While the aforementioned works consider an ambitious suite of topics under various constraints imposed by real-world applications, privacy is an aspect generally absent in their treatments.
Recently, privacy preservation becomes an increasingly critical issue for distributed systems. Encryption-based algorithms are proposed for distributed optimization problems [9], [10] and proved to be effective. However, the encryption technique leads to a high computational complexity which seems undesirable in large-scale networks. To preserve the privacy of the agents’ costs, an asynchronous heterogeneous-stepsize algorithm is proposed in [11], but the method assumes that the infomation of communication topology is unavailable to attackers.
Another thread to address distributed optimization problems is to adopt differential privacy technique which is robust to arbitrary auxiliary information exposed to attackers, including communication topology information, thus well suited for multi-agents scenarios. Motivated by the privacy concerns in EV charging networks, the work in [8] presents a differentially private distributed algorithm to solve distributed optimization problem, but an extra central agent is needed. In [12], the authors design a completely distributed algorithm that guarantees differential privacy by perturbing the states with Laplace noise. It requires the stepsize to be decaying to guarantee the convergence, resulting in a low convergence rate. Adopting the gradient-tracking scheme, a differentially private distributed algorithm is proposed in [13] which has a linear convergence rate with constant stepsizes. However, the proposed algorithm in [13] is only applicable to unconstrained problems. For solving the economic dispatch problem where both global and local constraints are considered, a privacy-preserving distributed optimization algorithm is proposed in [14] for quadratic cost functions and its effctiveness in preserving privacy is guaranteed through qualitative analysis. The extension to general DRAPs is performed in [15] for strongly convex and Lipschitz smooth cost functions. Additionally, quantitative analysis of privacy is provided. However, the work only considers scalar cost functions and the coupling within constraints is ignored.
In this paper, a differentially private distributed mismatch tracking algorithm (diff-DMAC) is proposed to solve constraint-coupled DRAPs with individual constraints and a global linear coupling constraint while preserving the privacy of the local cost functions. To meet the global coupled-constraint, a mismatch tracking step is introduced to obtain the supply-demand mismatch in the network. And the tracked global mismatch is then implemented for error compensation. With a constant stepsize, diff-DMAC has a provable linear convergence rate for strongly convex and Lipschitz smooth cost functions. We further present a rigorous analysis of the algorithm’s differential privacy and thus provide a stronger privacy guarantee. Finally, its convergence properties and effectiveness in privacy-preserving are numerically validated.
The rest of the paper is organized as follows. Section II formulates the constraint-coupled DRAP. The proposed algorithm is developed in Section III. And the theoretical analyses about its convergence and privacy are given in Section IV and V, respectively. Then the algorithm is numerically tested in Section VI. Finally, Section VII concludes the paper.
Notation: Vectors default to columns if not otherwise specified. Bold letter is defined as . The Kronecker product is denoted by . Let be the -dimension vector with all one entries. For vectors, we use to denote the 2-norm. And for matrices, denotes the spectral norm. denotes the minimum eigenvalue of matrix . We use to refer to the block-diagonal matrix with as blocks. For a random variable , denotes the Laplace distribution with pdf , where . If , we have , . is used to denote the probability. denotes the set of Borel subsets of topological space .
II Problem Formulation
We consider the following general constraint-coupled distributed resource allocation problem
(1) |
where is the agent ’s private cost function, is the decision vector of agent and denotes the local resource demand. is a local convex and closed set which encodes local constraints of agent . is the coupling matrix with full row rank and is invertible, i.e., .
Many practical problems take the form of problem (1), e.g.,[1, 16]. One typical example is the economic dispatch of multi-microgrid (multi-MG) systems as shown in Fig. 1, where both microturbines and non-dispatchable distributed generators are involved to provide energy to meet the loads, and the outputs of non-dispatchable distributed generators can fluctuate significantly [16]. When the supply-demand balance in the MG cannot be maintained, the coordination among MGs is needed and both within-MG, between-MG optimization problems should be considered to improve systems’ reliability [17].

Assumption 1: Each cost function is strongly convex and Lipschitz smooth, i.e.,
(2) |
and
(3) |
, where and are the strong convexity and Lipschitz constants, respectively. Define and .
The communication network over which agents exchange information can be represented by an undirected graph where is the set of agents and denotes the set of edges, accompanied with a nonnegative weighted matrix . For any in the network, denotes agent can exchange information with agent . The collection of all individual agents that agent can communicate with is defined as its neighbors set .
Assumption 2: The graph is undirected and connected and the weight matrix is doubly stochastic, i.e., and .
Assumptions 1-2 are standard when solving related problems.
In this problem, agents want to achieve the optimum while preserving the privacy of local cost functions which can be commercially sensitive in practice. To preserve privacy of functions, we add noise to mask the exchanged information at each time instant as . Let be the function set , the update of can be expressed in impact form
where denotes the update rule. Therefore, exchanged information can be determined if the initialization , the added noises , the communication topology and the function set are known. To provide theoretical guarantees on the privacy for their cost functions, the concept of differential privacy is introduced, see [15].
Definition 1: Given and two function sets and , the two subsets are -adjacent if there exists and some such that
where is the domain of and they satisfy that .
Definition 2: Given , for any two -adjacent function sets and any observation , the process keeps -differentially private if
where we define , and the observation encodes all the information collected by the potential attacker.
The attacker is assumed to know all auxiliary information, including the exchanged information between agents, communication topology, etc., except the parameter . Intuitively, differential privacy guarantees that the two function sets can not be distinguished through the released information and thus avoids the leakage of the optimal operating point.
III Algorithm Development
In this section, a distributed algorithm is designed to solve constraint-coupled DRAPs with privacy concerns. The following Proposition is presented to give the optimal conditions for constraint-coupled DRAP.
Proposition 1: is the optimal solution of (1) if it satisfies
i) ,
ii) there exists such that
(4) |
where is defined as the Cartesian product and the matrix .
Proof: i) is one of the feasible conditions of (1) which must be satisfied. Problem (4) can be decomposed into subproblems . It follows that
Summing the above inequality from to yields
If satisfies condition i), holds for any feasible solution of (1). Thus, we have which completes the proof.
In the following, we will use Proposition 1 to develop a distributed algorithm for solving the DRAP (1). Based on the condition ii) of Proposition 1, the -update is designed and the consensus protocol [18] is adopted to drive in each agent to same value
(5) | |||
(6) |
where we define .
Inspired by the gradient-tracking scheme [19] , a tracking step is introduced here to track the global supply-demand mismatch as follows
(7) |
Under Assumption 2, if the initialization condition holds, iteration (7) can infer that
(8) |
To guarantee the condition i) of Proposition 1 holds, the tracked mismatch is used as a compensation term for -update (5). Thus, the proposed algorithm is obtained
(9) | |||
(10) | |||
(11) |
The following Lemma shows the fixed point of the proposed algorithm is consistent with the optimal solution of the problem when Assumption 2 holds.
Lemma 1: Under Assumption 2, any fixed point of the proposed algorithm satisfies the optimal conditions of constraint-coupled DRAP.
Proof: It is not difficult to check that any fixed point of the proposed algorithm satisfies
(12) | |||
(13) | |||
(14) |
Under Assumption 2, from (12) and (14), we have
(15) |
Thus, holds and combining it with (12) yields
(16) |
Moreover, with proper initialization, from (8) we have
(17) |
where (13), (16) and (17) correspond to the optimal conditions in Proposition 1 which completes the proof.
With privacy concerns, agents exchange noise-masked information against potential attackers to prevent information disclosure. In [20], Laplace noise is shown to satisfy the necessary and sufficient condition of differential privacy. Furthermore, due to the noise accumulation in the tracking process as , the added noise needs to decay to ensure the convergence of . Likewise, also needs to decay for the convergence of and . Thus, the added noises are set to , where . That is, two diminishing Laplace noises are added to the communication process of , , respectively. Both of them are shown to be necessary in Section V.
Based on the mismatch tracking scheme and the information-masked protocol, a differentially private distributed mismatch tracking algorithm (diff-DMAC) is proposed which is shown in Algorithm 1 in details.
IV Convergence Analysis for diff-DMAC
In this section, we will establish the linear convergence rate of the proposed algorithm in mean square. And the upper and lower bounds of the convergence accuracy is also provided. We set , in the following analysis for simplicity while nonzero scenarios can be analyzed similarly.
Let and , , . From (7), (9), we have that
(18) | |||
(19) | |||
(20) | |||
(21) |
where , and the doubly stochasticity of the weight matrix is used here. Under Assumption 2, as a consequence of the Perron–Frobenius theorem, we have that , and thus
(22) |
Lemma 2: For positive , , , if holds, there exist , , such that
(23) |
The proof is omitted. Note that for any , , , also satisfy the condition (23). Define . Based on the above results, the following Theorem is proved by induction argument.
Theorem 1: Given a constant , where is defined as . Suppose Assumptions 1,2 hold, satisfies
(24) |
then the sequences generated by diff-DMAC satisfy
(25) | |||
(26) | |||
(27) | |||
(28) |
for some constant , where and satisfy
(29) | |||
(30) |
Under Assumption 1, the function
is differentiable and satisfies strongly convex and Lipschitz smooth [21]. Furthermore, it follows (10) and the Proposition B.25 in [22] that
(32) |
From (30) and (32), we can obtain that
(33) |
where under (24) and the last inequality follows from the strongly convexity and Lipschitz smoothness of .
We will prove (25)-(28) by induction. When , it is not difficult to find such that (25)-(28) hold. We assume that for all , (25)-(28) hold. Considering , we obtain from (31) and (33) that
(34) |
Under Assumption 1, (32) implies that
(37) |
where the last inequality is due to the Lipschitz smoothness of .
Note that constant , due to Lemma 2, there exist such that
(38) | |||
(39) | |||
(40) | |||
(41) |
Basd on equations (38)-(41), taking suffciently large yields
where we use the definition of and substituting these equations into (34)-(37) completes the proof.
Based on Theorem 1, we prove the linear convergence property of diff-DMAC and quantify its convergence accuracy.
Theorem 2: Suppose the conditions in Theorem 1 are satisfied. If further satisfies
(42) |
the sequence generated by diff-DMAC will converge linearly to the neighbor of the optimum in mean square and we have
(43) |
where is defined as .
Proof: Note that , it is not difficult to see that with chosen to satisfy (42), we can always find a constant such that equations (25)-(28) hold. Thus, the convergence of diff-DMAC is proved by Theorem 1.
Due to (29) and , we have
(44) |
Since , it is easy to obtain that
(45) |
The optimality condition of the update (10) implies that
(46) | ||||
(47) |
The facts that and imply
(49) | ||||
(50) |
V Differential Privacy
In this section, we present the privacy preserving performance of the proposed algorithm by theoretical analysis.
Theorem 3: Suppose the conditions in Theorem 2 hold, if satisfies
(52) |
the proposed diff-DMAC preservses -differential privacy for the cost function of agent , where
(53) |
Proof: Two function sets have the same initialization and all auxiliary variables are known to attackers as mentioned in Section II. Therefore, exchanged variables must be same, i.e., and , otherwise, the two function sets will be easily distinguished. Therefore, for any , due to the realation , the added noise should satisfy
And for , since the noise should satisfy
(54) |
where , , and . Furthermore, it follows that
(55) |
where and .
Following the analysis in [13], we need to obtain the upper bound of to quantify the privacy level ,
(56) |
where , belongs to attacker’s observation.
For , the -update can be reritten as
From Definition 1, we have and . Similar to the analysis of Theorem 2, the optimal condition of the written -update yields
(57) |
The last inequality uses the relation . Then applying Cauchy–Schwarz inequality to the LHS of (57) yields
(58) |
From (54), (55) and the relation (58), we have
(59) |
The two roots of , denoted as are different and all lie in . Therefore, from (59), we have
(60) |
since and which can be derived from (54) and (55). These two equations also give that . Thus,
(61) |
where the last inequality follows the the sum formula of geometric series. And the inequality holds under (52).
Combining (56) and (61) yields the result corresponding to the definition of differential privacy of the cost function in Definition 2. Thus, the proof completes.
Note that the privacy level in Theorem 3 is related to both noise and . Both of them are necessary, since if at least one of them are set to zero, there does not exist a finite number , i.e., the differential privacy cannot be preserved.
Since the convergence accuracy is only related to the noise , the optimal value of can be obtained by setting and it gives
(62) |
Combining (43) with (62), we can derive that increasing added noise leads to a high level privacy but a low accuracy which shows the trade-off between accuracy and privacy.
VI Numerical Experiments
In this section, we conduct numerical experiments to verify our theoretical analysis. The proposed algorithm is tested on a multi-MG system with 14 microgrids [16]. Regarding the communication network, we generate an undirected graph by adding random links to a ring network. We consider the following problem with quadratic cost functions
(63) |
where coefficients are randomly chosen and the parameters of the generators are adopted from [1].
Set total load demand , the exchanged information is masked by independent Laplace noise with and we apply diff-DMAC to problem (63). Fig. 2 (a) shows how the mean square error (MSE) changes with iteration time , where the expected errors are approximated by averaging over 100 simulation results. The results validate the linear convergence rate of the proposed algorithm. Fix , the relation between error and is shown in Fig. 2 (b). We find that as becomes larger, the MSE of increases, which means larger noise brings lower accuracy. Moreover, the experimental result is strictly between the lower bound and upper bound given in Theorem 2.


As for the differential privacy of diff-DMAC, Theorem 3 is numerically tested with different as shown in Fig. 3(a). The experimental result is upper bounded by the theoretical result, i.e. , which verifies Theorem 3. Combining Fig. 3(a) with Fig. 3(b) shows that a bigger and slower decaying noise leads to a better privacy level. However, large noise also influences the convergence accuracy and Fig. 4 validates the aforementioned trade-off between privacy and accuracy.



VII Conclusion
In this paper, a differentially private distributed mismatch tracking algorithm has been proposed to solve constraint-coupled resource allocation problems with privacy concerns. Its linear convergence property has been established for strongly convex and Lipschitz-smooth cost functions. Then, the differential privacy of the proposed algorithm is theoretically proved and we also characterize the trade-off between accuracy and privacy. The theoretical results have been examined by numerical experiments.
References
- [1] S. Kar and G. Hug, “Distributed robust economic dispatch in power systems: A consensus + innovations approach,” in Proc. IEEE Power and Energy Society General Meeting, San Diego, CA, USA, July 2012, pp. 1–8.
- [2] L. Xiao, M. Johansson, and S. Boyd, “Simultaneous routing and resource allocation via dual decomposition,” IEEE Transactions on Communications, vol. 52, no. 7, pp. 1136–1144, 2004.
- [3] L. Jin and S. Li, “Distributed task allocation of multiple robots: A control perspective,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 48, no. 5, pp. 693–701, 2018.
- [4] A. Falsone, I. Notarnicola, G. Notarstefano, and M. Prandini, “Tracking-ADMM for distributed constraint-coupled optimization,” Automatica, vol. 117, p. 108962, 2020.
- [5] J. Xu, S. Zhu, Y. C. Soh, and L. Xie, “A dual splitting approach for distributed resource allocation with regularization,” IEEE Transactions on Control of Network Systems, vol. 6, no. 1, pp. 403–414, 2019.
- [6] J. Zhang, K. You, and K. Cai, “Distributed dual gradient tracking for resource allocation in unbalanced networks,” IEEE Transactions on Signal Processing, vol. 68, pp. 2186–2198, 2020.
- [7] N. S. Aybat and E. Y. Hamedani, “A distributed ADMM-like method for resource sharing over time-varying networks,” SIAM Journal on Optimization, vol. 29, no. 4, pp. 3036–3068, 2019.
- [8] S. Han, U. Topcu, and G. J. Pappas, “Differentially private distributed constrained optimization,” IEEE Transactions on Automatic Control, vol. 62, no. 1, pp. 50–64, 2017.
- [9] M. Ruan, H. Gao, and Y. Wang, “Secure and privacy-preserving consensus,” IEEE Transactions on Automatic Control, vol. 64, no. 10, pp. 4035–4049, 2019.
- [10] X. Huo and M. Liu, “Privacy-preserving distributed multi-agent cooperative optimization—paradigm design and privacy analysis,” IEEE Control Systems Letters, vol. 6, pp. 824–829, 2022.
- [11] Y. Lou, L. Yu, S. Wang, and P. Yi, “Privacy preservation in distributed subgradient optimization algorithms,” IEEE Transactions on Cybernetics, vol. 48, no. 7, pp. 2154–2165, 2018.
- [12] J. Zhu, C. Xu, J. Guan, and D. O. Wu, “Differentially private distributed online algorithms over time-varying directed networks,” IEEE Transactions on Signal and Information Processing over Networks, vol. 4, no. 1, pp. 4–17, 2018.
- [13] T. Ding, S. Zhu, J. He, C. Chen, and X. Guan, “Differentially private distributed optimization via state and direction perturbation in multiagent systems,” IEEE Transactions on Automatic Control, vol. 67, no. 2, pp. 722–737, 2022.
- [14] S. Mao, Y. Tang, Z. Dong, K. Meng, Z. Y. Dong, and F. Qian, “A privacy preserving distributed optimization algorithm for economic dispatch over time-varying directed networks,” IEEE Transactions on Industrial Informatics, vol. 17, no. 3, pp. 1689–1701, 2021.
- [15] T. Ding, S. Zhu, C. Chen, J. Xu, and X. Guan, “Differentially private distributed resource allocation via deviation tracking,” IEEE Transactions on Signal and Information Processing over Networks, vol. 7, pp. 222–235, 2021.
- [16] K. Wu, Q. Li, Z. Chen, J. Lin, Y. Yi, and M. Chen, “Distributed optimization method with weighted gradients for economic dispatch problem of multi-microgrid systems,” Energy, vol. 222, p. 119898, 2021.
- [17] D. O. Amoateng, M. Al Hosani, M. S. Elmoursi, K. Turitsyn, and J. L. Kirtley, “Adaptive voltage and frequency control of islanded multi-microgrids,” IEEE Transactions on Power Systems, vol. 33, no. 4, pp. 4454–4465, 2018.
- [18] R. Olfati-Saber and R. Murray, “Consensus problems in networks of agents with switching topology and time-delays,” IEEE Transactions on Automatic Control, vol. 49, no. 9, pp. 1520–1533, 2004.
- [19] J. Xu, S. Zhu, Y. C. Soh, and L. Xie, “Augmented distributed gradient methods for multi-agent optimization under uncoordinated constant stepsizes,” in Proc. 54th IEEE Conference on Decision and Control, Osaka, Japan, Dec. 2015, pp. 2055–2060.
- [20] J. He and L. Cai, “Differential private noise adding mechanism: Basic conditions and its application,” in Proc. American Control Conference, Seattle, WA, USA, May 2017, pp. 1673–1678.
- [21] J.-B. Hiriart-Urruty and C. Lemaréchal, Convex Analysis and Minimization Algorithms II: Advanced Theory and Bundle Methods. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993, vol. 306.
- [22] D. Bertsekas, Nonlinear Programming. Belmont, Massachusetts:Athena Scientific, 2016.