Scalable Unified Privacy-Preserving Machine Learning Framework (SUPM)

被引:0
作者
Miyaji, Atsuko [1 ]
Yamatsuki, Tatsuhiro [1 ]
Takahashi, Tomoka [1 ]
Wang, Ping-Lun [2 ]
Mimoto, Tomoaki [3 ]
机构
[1] Osaka Univ, Grad Sch Engn, Suita 5650871, Japan
[2] Carnegie Mellon Univ, Dept Elect & Comp Engn, Pittsburgh, PA USA
[3] KDDI Res Inc, Fujimino 3568502, Japan
关键词
privacy; data availability;
D O I
10.1587/transfun.2024TAP0011
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The widespread use of IoT devices is expected to enable the collection and utilization of a variety of data, including personal health information. For example, we could provide our personal information for machine learning operated by an external server, which in return detects signs of illness. However, it is necessary to protect privacy of personal information. Precisely, there are two issues in privacy preserving machine learning. One is data privacy which means to protect our privacy to external servers. The other is model privacy which means to protect our privacy from models. Local differential privacy (LDP) mechanisms have been proposed as a method to provide personal sensitive information to external servers with privacy protection. LDP mechanisms can ensure privacy by adding noise to data, but on the other hand, adding noise reduces their usefulness for analysis. In this paper, we propose a privacy-preserving machine learning framework, which can deal with both data privacy and model privacy. We also propose a LDP-mechanism framework which can deal with various attributes included in a single data. We also make sure feasibility of our mechanism in two cases of breast cancer screening data and ionosphere data set.
引用
收藏
页码:423 / 434
页数:12
相关论文
共 18 条
[1]  
archive.ics.uci.edu, UCI Machine Learning Repository
[2]  
Bellare Mihir., 2012, the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012, P784, DOI [10.1145/2382196.2382279, DOI 10.1145/2382196.2382279]
[3]   ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation [J].
Demmler, Daniel ;
Schneider, Thomas ;
Zohner, Michael .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[4]  
Ding B., 2018, Proc. AAAI, V32
[5]   Local Privacy and Statistical Minimax Rates [J].
Duchi, John C. ;
Jordan, Michael I. ;
Wainwright, Martin J. .
2013 IEEE 54TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS), 2013, :429-438
[6]  
Dwork Cynthia., 2011, ENCY CRYPTOGRAPHY SE, P338
[7]  
Gaboardi Marco., 2018, INT C MACH LEARN, P1626
[8]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[9]   Optimal Differentially Private Mechanisms for Randomised Response [J].
Holohan, Naoise ;
Leith, Douglas J. ;
Mason, Oliver .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) :2726-2735
[10]  
Kairouz P, 2014, ADV NEUR IN, V27