999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Privacy-preserving scheduling model for minimizing the makespan on unrelated parallel machines

2021-07-23 09:40:16LiHaohao

Li Haohao

(School of Data Sciences, Zhejiang University of Finance and Economics,Hangzhou 310018, China)

Abstract:In this paper the scheduling problem Rm||Cmax is cast in a privacy-preserving framework. Consider the situation that the parameters in problem Rm||Cmax are partitioned into groups. Each group is owned by a distinct private entity that is unwilling to share or make public its own data. We construct a secure program based on the privately held data without revealing it by employing random matrix transformation. The secure program has the same optimal minimum value as the original mixed 0-1 linear program model of the problem Rm||Cmax, and the optimal solution to the secure program is publicly generated and is available to all entities. The 0-1 components in optimal solution to the secure program are coincident to those in optimal solution to the original solution.

Keywords: scheduling, 0-1 programming, privacy-preserving, secure program

1 Introduction

Recent interest in privacy-preserving classification and computation, wherein the data to be classified is owned by different entities that are unwilling to reveal the data they hold or make it public, has spread to the field of optimization[1]. In this work we deal with a privacy-preserving scheduling problem.

The scheduling problem ofRm||Cmaxis discussed widely which schedulesnjobs onmunrelated parallel machines with the objective of minimizing the makespan, i.e.,the total timespan required to process all the given tasks. Each jobjhas a processing requirementpijwhich depends on the machineijobjwill be processed on. In reality, the machines may be partitioned into groups where the processing information of different jobs depending on each group is owned by a distinct entity. Each entity is unwilling to share its information data to the others.

In this paper we considered about the unrelated parallel machine scheduling problem mentioned above, and propose a privately held solution method by recasting the original privacy-preserving problem into a public one.

2 Problem formulation

Considering about scheduling model on unrelated parallel machines to minimize makespan, it can be simply thought of a 0-1 linear programming problem. If let LetP=(pij)m×n. Suppose that the matrixPis divided intopblocks ofm1,m2,···,mp,n-dimensional rows withm1+m2+···+mp=m. Each block of rows of matrixPcorresponding to the index setsI1,I2,··· ,Ipis owned by a distinct entity that is unwilling to make this block of data public or share it with other entities. We wish to solve this scheduling problem without revealing any privately held data.

The constraints in problem (3) can be separated into two parts, the privacy ones and the public ones. Recast the problem (3) into matrix notation we have

where

in whichs1,s2,··· ,smare slack variables,

According to our knowledge, this kind of problem, optimization of a privacypreserving mixed linear 0-1 program,has not been solved so far and it is a very demanding problem. References[2-5]presented some efficient algorithms based on transformation techniques methods for privacy-preserving linear programming problems. Using those methods,the user is no longer bound to use simplex,but can take advantage of the all improvements to linear-programming algorithms, e.g., interior point methods and some newly proposed effective algorithms for linear optimization[6-7]. However, their methods cannot be used for the proposed problem in this paper because the proposed problem is confronted with 0-1 variables.

3 Problem solving

In this section,we propose a solution method for this privacy-preserving scheduling model, based on a random transformation technique, which was first used for privacypreserving linear programming model with inequality constraints[2]. However, this technique is not applicable directly to model(4), otherwise the 0-1 variables will reveal the private data.

It is useful to discuss more on model (4). Note that for a real variablex, the conditionx ∈{0,1}is equivalent to the equationx(x ?1) = 0. Thus, the privacypreserving scheduling model (4) is reformulated equivalently as

Better, he said to himself, trust to a thread than to the mercies of a king; and, gliding26 down, he found himself safe on the other side of the wall

To keep the privacy,each of entityIichooses its own privately held random matrixBIi ∈Rk×miwithk ≥m+n(i=1,··· ,p) and random numbers

where

whereOi ∈Rmi×(mn+1)is a zero matrix and

Let

and

where

We note immediately that the rank of the randomly generated matrixB ∈Rk×(n+m)(k ≥m+n) ism+n[8]. Utilizing this fact we define the following transformations:With this transformation our program (5) turns into the following “secure” program:

We now relate our original program (5) to the secure program (7).

Theorem 3.1Letk ≥m+nfor the random matrixB ∈Rk×(n+m). The secure program (7) is solvable if and only if the program (5) is solvable in which case the optimal objective values of the two programs are identical.

ProofBecause the rank of the random matrixBism+n, the following equivalence is obviously true

We now turn to a specific example to show the privacy-preserving process.

4 An illustrative example

In this section,a specific example is discussed to demonstrate the proposed method.

Example 4.1Consider the scheduling problemR2||Cmax: two unrelated parallel machines are available to process a set of three jobs with processing time given in a matrix

LetI1={1},I2={2}. The specific matrices and vectors corresponding to program(5) of the scheduling problem are

wherex11,x12,x13,x21,x22,x23are 0-1 variables andt,s1,s2are non-negative variables.

It can be shown that the optimal solution of this scheduling problem is

and the optimal objective value is 3, i.e., job 3 should be processed on machine 1 and job 1 and job 2 should be processed on machine 2,the makespan of the whole scheduling is 3.

Setk=5. The entity 1 generates its own privately held matrix

and random numbersr11=5, a11=2, and makes public only its matrix products

Also, the entity 2 generates its own privately held matrix

and random numbersr21=3, a21=2, and makes public only its matrix products

5 Conclusions

In this paper, we have shown how to securely model the scheduling problemRm||Cmaxwhen its processing information is horizontally partitioned among entities unwilling to share their data or make it public. The model integrates the public and the privacy-preserving data of the scheduling problem. An example illustrating the model has been given to demonstrate the utility of the model and the method to retrieve the optimal solution of the model. It would be interesting to extend this idea to other scheduling problems.

主站蜘蛛池模板: 在线看片中文字幕| 狠狠色丁香婷婷综合| 亚洲a级在线观看| 国产九九精品视频| 中文字幕日韩丝袜一区| 伊人久久精品无码麻豆精品| www.国产福利| 在线亚洲精品福利网址导航| 免费人成在线观看视频色| 91精品在线视频观看| 久久免费看片| 国产精品亚洲一区二区三区z| 欧美日韩国产在线观看一区二区三区 | 国产无码性爱一区二区三区| 中文字幕不卡免费高清视频| 国产精品白浆无码流出在线看| 久久国产精品77777| 日本午夜视频在线观看| 5555国产在线观看| 日本一本在线视频| 麻豆精品视频在线原创| 婷婷色在线视频| 又污又黄又无遮挡网站| 亚洲黄色激情网站| 国产免费一级精品视频| 免费在线成人网| 毛片网站在线看| 亚洲国产精品人久久电影| 青青草国产一区二区三区| 欧美午夜在线视频| 国产精品午夜电影| 国产成人精品亚洲日本对白优播| 在线国产91| 99人妻碰碰碰久久久久禁片| 亚洲综合第一区| 欧美午夜视频在线| 国产色伊人| 免费精品一区二区h| 国产一级毛片yw| 欧美人在线一区二区三区| 国产黄色免费看| 久热精品免费| 欧美第二区| 国产va在线| 澳门av无码| 亚洲欧洲日韩久久狠狠爱| 日韩在线永久免费播放| 日韩美毛片| 亚洲AV无码乱码在线观看代蜜桃| 丰满人妻一区二区三区视频| 国产精品青青| 思思热在线视频精品| 成人av专区精品无码国产| 伊人激情综合网| 日韩视频免费| 久久午夜夜伦鲁鲁片不卡| 成人在线天堂| 亚洲狼网站狼狼鲁亚洲下载| 国产欧美日本在线观看| 免费高清毛片| 欧美成人手机在线视频| 国产新AV天堂| 欧美啪啪精品| 国产欧美高清| 国产乱肥老妇精品视频| 亚洲成肉网| 91在线播放免费不卡无毒| 久久熟女AV| 欧美日韩在线观看一区二区三区| 欧美无遮挡国产欧美另类| 国产91高跟丝袜| 亚洲无码免费黄色网址| 毛片久久久| 精品人妻一区无码视频| 中文字幕丝袜一区二区| 精品夜恋影院亚洲欧洲| 综合人妻久久一区二区精品| 久久影院一区二区h| 在线免费无码视频| 在线亚洲天堂| 中国特黄美女一级视频| 最近最新中文字幕免费的一页|