Customizable Utility-Privacy Trade-Off: A Flexible Autoenco der-Based Obfuscator

被引:0
作者
Jamshidi, Mohammad A. [1 ]
Mojahedian, Mohammad M. [1 ]
Aref, Mohammad R. [1 ]
机构
[1] Sharif Univ Tech, Informat Syst & Secur Lab ISSL, Tehran, Iran
来源
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 2024年 / 16卷 / 02期
关键词
Autoencoder; Collaborative Learning; Deep Neural Networks; Privacy-Utility Trade-Off;
D O I
10.22042/isecure.2024.422044.1037
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To enhance the accuracy of learning models, it becomes imperative to train them on more extensive datasets. Unfortunately, access to such data is often restricted because data providers are hesitant to share their data due to privacy concerns. Hence, it is critical to develop obfuscation techniques that empower data providers to transform their datasets into new ones that ensure the desired level of privacy. In this paper, we present an approach where data providers utilize a neural network based on the autoenco der architecture to safeguard the sensitive components of their data while preserving the utility of the remaining parts. More specifically, within the autoenco der framework and after the encoding process, a classifier is used to extract the private feature from the dataset. This feature is then decorrelated from the other remaining features and subsequently subjected to noise. The proposed method is flexible, allowing data providers to adjust their desired level of privacy by changing the noise level. Additionally, our approach demonstrates superior performance in achieving the desired trade-off between utility and privacy compared to similar methods, all while maintaining a simpler structure. (c) 2024 ISC. All rights reserved.
引用
收藏
页码:137 / 147
页数:11
相关论文
共 35 条
[1]  
Barnett SA, 2018, Arxiv, DOI arXiv:1806.11382
[2]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[3]   An efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation [J].
Anh-Tu Tran ;
The-Dung Luong ;
Karnjana, Jessada ;
Van-Nam Huynh .
NEUROCOMPUTING, 2021, 422 :245-262
[4]   The Algorithmic Foundations of Differential Privacy [J].
Dwork, Cynthia ;
Roth, Aaron .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4) :211-406
[5]   Privacy preserving decision tree learning over multiple parties [J].
Emekci, F. ;
Sahin, O. D. ;
Agrawal, D. ;
El Abbadi, A. .
DATA & KNOWLEDGE ENGINEERING, 2007, 63 (02) :348-361
[6]  
Fang MH, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1623
[7]  
Goodfellow I, 2017, Arxiv, DOI arXiv:1701.00160
[8]  
Hesamifard E, 2017, Arxiv, DOI [arXiv:1711.05189, DOI 10.48550/ARXIV.1711.05189]
[9]   Context-Aware Generative Adversarial Privacy [J].
Huang, Chong ;
Kairouz, Peter ;
Chen, Xiao ;
Sankar, Lalitha ;
Rajagopal, Ram .
ENTROPY, 2017, 19 (12)
[10]  
Jamshidi MA, 2023, Arxiv, DOI arXiv:2304.03538