Sequential Change Detection for Multiple Data Streams with Differential Privacy
Lixing Zhang, Liyan Xie, Ruizhi Zhang
TLDR
This paper introduces DP-SUM-CUSUM, a differentially private method for sequential change detection in multiple data streams.
Key contributions
- Proposes DP-SUM-CUSUM for differentially private multi-stream change detection.
- Achieves sequential ε-differential privacy using calibrated Laplace noise injection.
- Derives theoretical bounds on false alarms and detection delay, characterizing privacy-efficiency tradeoff.
- Validated through simulations and experiments on an IoT botnet dataset.
Why it matters
Existing multi-stream change detection methods lack privacy guarantees. This work addresses a critical gap by enabling secure and private monitoring of data streams, crucial for sensitive applications like IoT. It offers a robust framework for detecting changes while preserving data privacy.
Original Abstract
Sequential change-point detection seeks to rapidly identify distributional changes in streaming data while controlling false alarms. Existing multi-stream detection methods typically rely on non-private access to raw observations or intermediate statistics, limiting their usage in privacy-sensitive settings. We study sequential change-point detection for multiple data streams under differential privacy constraints. We consider multiple independent streams undergoing a synchronized change at an unknown time and in an unknown subset of streams, and propose DP-SUM-CUSUM, a differentially private detection procedure based on the summation of per-stream CUSUM statistics with calibrated Laplace noise injection. We show that DP-SUM-CUSUM satisfies sequential $\varepsilon$-differential privacy and derive bounds on the average run length to false alarm and the worst-case average detection delay, explicitly characterizing the privacy--efficiency tradeoff. A truncation-based extension is also presented to handle distributional shifts with unbounded log-likelihood ratios. Simulations and experiments on an Internet of Things (IoT) botnet dataset validate the proposed approach.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.