Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis

被引:1
作者
Zaman, Zakia [1 ,2 ]
Xue, Wanli [1 ,2 ]
Gauravaram, Praveen [3 ]
Hu, Wen [1 ,2 ]
Jiang, Jiaojiao [1 ,2 ]
Jha, Sanjay K. [1 ,2 ]
机构
[1] Univ New South Wales UNSW, Inst Cybersecur IFCYBER, Sydney, NSW 2052, Australia
[2] Cyber Secur Cooperat Res Ctr, Joondalup, WA 6027, Australia
[3] Tata Consultancy Serv Ltd, Brisbane, Qld 2060, Australia
关键词
Data privacy; Encoding; Differential privacy; Data models; Privacy; Data analysis; Cloud computing; Data encoding; bloom filter; privacy-preserving machine learning; differential privacy; privacy; utility;
D O I
10.1109/TIFS.2024.3468150
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The widespread integration of the Internet of Things (IoT) is crucial in advancing sustainable development. IoT service providers actively collect user data for analysis using sophisticated Deep Learning (DL) algorithms. This enables the extraction of valuable insights for business intelligence and improving service quality. However, as these datasets contain sensitive personal information, there is a risk of privacy breaches when DL models are employed. This vulnerability may result in Membership Inference Attacks (MIA), potentially leading to the unauthorized disclosure of highly sensitive data. Therefore, developing an efficient and privacy-preserving data analysis system for IoT is imperative. Recent research has highlighted the effectiveness of utilizing Bloom Filter (BF)-encoding in conjunction with Differential Privacy (DP) for safeguarding privacy during data analysis. Given its attributes of low complexity and high utility, this approach proves effective, particularly in resource-constrained IoT domains. With this in mind, we propose a novel framework for privacy-preserving IoT data analysis based on BF-encoded data. Our research introduces an innovative BF-encoding technique combined with Local Differential Privacy (LDP), capable of efficiently encoding various types of IoT data (such as facial images and smart-meter data) while maintaining privacy when integrated into DL algorithms for downstream analysis. Experimental results demonstrate that our BF-encoded data surpasses the utility of standard BF-encoded data when utilized in DL algorithms for downstream tasks, showcasing an approximate 30% improvement in classification accuracy. Furthermore, we assess the privacy of these DL models against MIA, revealing that attackers can only make random guesses with an accuracy of approximately 50%.
引用
收藏
页码:9173 / 9187
页数:15
相关论文
共 60 条
[41]   Toward Practical Privacy-Preserving Analytics for IoT and Cloud-Based Healthcare Systems [J].
Sharma, Sagar ;
Chen, Keke ;
Sheth, Amit .
IEEE INTERNET COMPUTING, 2018, 22 (02) :42-51
[42]   Membership Inference Attacks Against Machine Learning Models [J].
Shokri, Reza ;
Stronati, Marco ;
Song, Congzheng ;
Shmatikov, Vitaly .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :3-18
[43]   Privacy-Preserving Deep Learning [J].
Shokri, Reza ;
Shmatikov, Vitaly .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1310-1321
[44]   A Review of Binarized Neural Networks [J].
Simons, Taylor ;
Lee, Dah-Jye .
ELECTRONICS, 2019, 8 (06)
[45]  
Song LW, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P2615
[46]   Try before You Buy: Privacy-preserving Data Evaluation on Cloud-based Machine Learning Data Marketplace [J].
Song, Qiyang ;
Cao, Jiahao ;
Sun, Kun ;
Li, Qi ;
Xu, Ke .
37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, :260-272
[47]   Electrical Load Forecasting Using Edge Computing and Federated Learning [J].
Taik, Afaf ;
Cherkaoui, Soumaya .
ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,
[48]   Privacy-preserving matching of similar patients [J].
Vatsalan, Dinusha ;
Christen, Peter .
JOURNAL OF BIOMEDICAL INFORMATICS, 2016, 59 :285-298
[49]   A Graph Matching Attack on Privacy-Preserving Record Linkage [J].
Vidanage, Anushka ;
Christen, Peter ;
Ranbaduge, Thilina ;
Schnell, Rainer .
CIKM '20: PROCEEDINGS OF THE 29TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT, 2020, :1485-1494
[50]   Efficient Pattern Mining based Cryptanalysis for Privacy-Preserving Record Linkage [J].
Vidanage, Anushka ;
Ranbaduge, Thilina ;
Christen, Peter ;
Schnell, Rainer .
2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, :1698-1701