StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception

被引:0
作者
Zhang, Jianfeng [1 ]
Zhang, Wensheng [2 ]
Xu, Jingdong [1 ]
机构
[1] Nankai Univ, Coll Comp Sci, Tianjin, Peoples R China
[2] Chinese Acad Sci, Inst Automat, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber deception; privacy; Internet of Things; edge computing; deep learning inference;
D O I
10.3233/JCS-220042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the limited capabilities of user devices, such as smart phones, and the Internet of Things (IoT), edge intelligence is being recognized as a promising paradigm to enable effective analysis of the data generated by these devices with complex artificial intelligence (AI) models, and it often entails either fully or partially offloading the computation of neural networks from user devices to edge computing servers. To protect users' data privacy in the process, most existing researches assume that the private (sensitive) attributes of user data are known in advance when designing privacy-protection measures. This assumption is restrictive in real life, and thus limits the application of these methods. Inspired by the research in image steganography and cyber deception, in this paper, we propose StegEdge, a conceptually novel approach to this challenge. StegEdge takes as input the user-generated image and a randomly selected "cover" image that does not pose any privacy concern (e.g., downloaded from the Internet), and extracts the features such that the utility tasks can still be conducted by the edge computing servers, while potential adversaries seeking to reconstruct/recover the original user data or analyze sensitive attributes from the extracted features sent from users to the server, will largely acquire information of the cover image. Thus, users' data privacy is protected via a form of deception. Empirical results conducted on the CelebA and ImageNet datasets show that, at the same level of accuracy for utility tasks, StegEdge reduces the adversaries' accuracy of predicting sensitive attributes by up to 38% compared with other methods, while also defending against adversaries seeking to reconstruct user data from the extracted features.
引用
收藏
页码:393 / 417
页数:25
相关论文
共 49 条
  • [1] Information Dropout: Learning Optimal Representations Through Noisy Computation
    Achille, Alessandro
    Soatto, Stefano
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2018, 40 (12) : 2897 - 2905
  • [2] Andriushchenko Maksym, 2020, Computer Vision - ECCV 2020. 16th European Conference. Proceedings. Lecture Notes in Computer Science (LNCS 12368), P484, DOI 10.1007/978-3-030-58592-1_29
  • [3] Beaudry NJ, 2012, QUANTUM INF COMPUT, V12, P432
  • [4] Optimal classifier for imbalanced data using Matthews Correlation Coefficient metric
    Boughorbel, Sabri
    Jarray, Fethi
    El-Anbari, Mohammed
    [J]. PLOS ONE, 2017, 12 (06):
  • [5] Perceptual Indistinguishability-Net (PI-Net): Facial Image Obfuscation with Manipulable Semantics
    Chen, Jia-Wei
    Chen, Li-Ju
    Yu, Chia-Mu
    Lu, Chun-Shien
    [J]. 2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 6474 - 6483
  • [6] Deep Neural Network Based Vehicle and Pedestrian Detection for Autonomous Driving: A Survey
    Chen, Long
    Lin, Shaobo
    Lu, Xiankai
    Cao, Dongpu
    Wu, Hangbin
    Guo, Chi
    Liu, Chun
    Wang, Fei-Yue
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (06) : 3234 - 3246
  • [7] Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
  • [8] Edge Intelligence: The Confluence of Edge Computing and Artificial Intelligence
    Deng, Shuiguang
    Zhao, Hailiang
    Fang, Weijia
    Yin, Jianwei
    Dustdar, Schahram
    Zomaya, Albert Y.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) : 7457 - 7469
  • [9] A New High Capacity Image Steganography Method Combined With Image Elliptic Curve Cryptography and Deep Neural Network
    Duan, Xintao
    Guo, Daidou
    Liu, Nao
    Li, Baoxia
    Gou, Mengxiao
    Qin, Chuan
    [J]. IEEE ACCESS, 2020, 8 (25777-25788) : 25777 - 25788
  • [10] Direct Validation of the Information Bottleneck Principle for Deep Nets
    Elad, Adar
    Haviv, Doron
    Blau, Yochai
    Michaeli, Tomer
    [J]. 2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION WORKSHOPS (ICCVW), 2019, : 758 - 762