4.3 Article

Optimal Steiner trees under node and edge privacy conflicts

Journal

JOURNAL OF COMBINATORIAL OPTIMIZATION
Volume 43, Issue 5, Pages 1509-1533

Publisher

SPRINGER
DOI: 10.1007/s10878-020-00690-1

Keywords

Steiner tree problem; Telecommunication; Strategic network design; Integer programming; Constraint programming

Ask authors/readers for more resources

This work proposes concepts and solution methodologies for strategic network design problems in highly data-sensitive industries, focusing on cost-efficient tree-structured communication infrastructure. The novel side constraints related to customer privacy significantly complicate the optimization problem, and various privacy models are studied to address these constraints. Strong non-compact integer programming formulations are developed and tested on literature-based instances to analyze performance.
In this work, we suggest concepts and solution methodologies for a series of strategic network design problems that find application in highly data-sensitive industries, such as, for instance, the high-tech, governmental, or military sector. Our focus is on the installation of widely used cost-efficient tree-structured communication infrastructure. As base model we use the well-known Steiner tree problem, in which we are given terminal nodes, optional Steiner nodes, and potential network links between nodes. Its objective is to connect all terminals to a distributor node using a tree of minimum total edge costs. The novel, practically relevant side constraints are related to privacy concerns of customers, represented by terminals. In order to account for these, we study four privacy models that restrict the eligible infrastructure for the customer-distributor data exchange: (I) Selected pairs of terminals mutually exclude themselves as intermediate data-transmission nodes; (II) some pairs of terminals require disjoint paths to the distributor; (III) individual terminals forbid routing their data through allegedly untrustworthy links; and (IV) certain terminals do not allow the usage of doubtful links on their entire network branch. These topological data-privacy requirements significantly complicate the notoriously hard optimization problem. We clarify the model relationships by establishing dominance results, point out potential extensions and derive reduction tests. We present corresponding, strong non-compact integer programming (IP) formulations and embed these in efficient cutting plane methods. In addition, we develop constraint programming formulations that are used complementally to derive primal solutions. In a computational study, we analyze the performance of our methods on a diverse set of literature-based test instances.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.3
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available