StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception

被引:0
作者
Zhang, Jianfeng [1 ]
Zhang, Wensheng [2 ]
Xu, Jingdong [1 ]
机构
[1] Nankai Univ, Coll Comp Sci, Tianjin, Peoples R China
[2] Chinese Acad Sci, Inst Automat, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyber deception; privacy; Internet of Things; edge computing; deep learning inference;
D O I
10.3233/JCS-220042
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the limited capabilities of user devices, such as smart phones, and the Internet of Things (IoT), edge intelligence is being recognized as a promising paradigm to enable effective analysis of the data generated by these devices with complex artificial intelligence (AI) models, and it often entails either fully or partially offloading the computation of neural networks from user devices to edge computing servers. To protect users' data privacy in the process, most existing researches assume that the private (sensitive) attributes of user data are known in advance when designing privacy-protection measures. This assumption is restrictive in real life, and thus limits the application of these methods. Inspired by the research in image steganography and cyber deception, in this paper, we propose StegEdge, a conceptually novel approach to this challenge. StegEdge takes as input the user-generated image and a randomly selected "cover" image that does not pose any privacy concern (e.g., downloaded from the Internet), and extracts the features such that the utility tasks can still be conducted by the edge computing servers, while potential adversaries seeking to reconstruct/recover the original user data or analyze sensitive attributes from the extracted features sent from users to the server, will largely acquire information of the cover image. Thus, users' data privacy is protected via a form of deception. Empirical results conducted on the CelebA and ImageNet datasets show that, at the same level of accuracy for utility tasks, StegEdge reduces the adversaries' accuracy of predicting sensitive attributes by up to 38% compared with other methods, while also defending against adversaries seeking to reconstruct user data from the extracted features.
引用
收藏
页码:393 / 417
页数:25
相关论文
共 49 条
  • [41] van der Maaten L, 2008, J MACH LEARN RES, V9, P2579
  • [42] Wu Zhenyu, 2020, IEEE Transactions on Pattern Analysis and Machine Intelligence
  • [43] Xiao TH, 2020, AAAI CONF ARTIF INTE, V34, P12434
  • [44] Toward Self-Learning Edge Intelligence in 6G
    Xiao, Yong
    Shi, Guangming
    Li, Yingyu
    Saad, Walid
    Poor, H. Vincent
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2020, 58 (12) : 34 - 40
  • [45] L2M-GAN: Learning to Manipulate Latent Space Semantics for Facial Attribute Editing
    Yang, Guoxing
    Fei, Nanyi
    Ding, Mingyu
    Liu, Guangzhen
    Lu, Zhiwu
    Xiang, Tao
    [J]. 2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, : 2950 - 2959
  • [46] Robust Watermarking for Deep Neural Networks via Bi-level Optimization
    Yang, Peng
    Lao, Yingjie
    Li, Ping
    [J]. 2021 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2021), 2021, : 14821 - 14830
  • [47] Yingjun Du, 2020, Computer Vision - ECCV 2020. 16th European Conference. Proceedings. Lecture Notes in Computer Science (LNCS 12355), P200, DOI 10.1007/978-3-030-58607-2_12
  • [48] Deep-Learning-Enhanced Multitarget Detection for End-Edge-Cloud Surveillance in Smart IoT
    Zhou, Xiaokang
    Xu, Xuesong
    Liang, Wei
    Zeng, Zhi
    Yan, Zheng
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (16): : 12588 - 12596
  • [49] Edge Intelligence: Paving the Last Mile of Artificial Intelligence With Edge Computing
    Zhou, Zhi
    Chen, Xu
    Li, En
    Zeng, Liekang
    Luo, Ke
    Zhang, Junshan
    [J]. PROCEEDINGS OF THE IEEE, 2019, 107 (08) : 1738 - 1762