When AI Meets Information Privacy: The Adversarial Role of AI in Data Sharing Scenario

被引:5
作者
Majeed, Abdul [1 ]
Hwang, Seong Oun [1 ]
机构
[1] Gachon Univ, Dept Comp Engn, Seongnam 13120, South Korea
关键词
AI-powered attacks; artificial intelligence; background knowledge; compromising privacy; data publishing; personal data; privacy; safeguarding privacy; synthetic data; utility; UTILITY;
D O I
10.1109/ACCESS.2023.3297646
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Artificial intelligence (AI) is a transformative technology with a substantial number of practical applications in commercial sectors such as healthcare, finance, aviation, and smart cities. AI also has strong synergy with the information privacy (IP) domain from two distinct aspects: as a protection tool (i.e., safeguarding privacy), and as a threat tool (i.e., compromising privacy). In the former case, AI techniques are amalgamated with the traditional anonymization techniques to improve various key components of the anonymity process, and therefore, privacy is safeguarded effectively. In the latter case, some adversarial knowledge is aggregated with the help of AI techniques and subsequently used to compromise the privacy of individuals. To the best of our knowledge, threats posed by AI-generated knowledge such as synthetic data (SD) to information privacy are often underestimated, and most of the existing anonymization methods do not consider/model this SD-based knowledge that can be available to the adversary, leading to privacy breaches in some cases. In this paper, we highlight the role of AI as a threat tool (i.e., AI used to compromise an individual's privacy), with a special focus on SD that can serve as background knowledge leading to various kinds of privacy breaches. For instance, SD can encompass pertinent information (e.g., total # of attributes in data, distributions of sensitive information, category values of each attribute, minor and major values of some attributes, etc.) about real data that can offer a helpful hint to the adversary regarding the composition of anonymized data, that can subsequently lead to uncovering the identity or private information. We perform reasonable experiments on a real-life benchmark dataset to prove the pitfalls of AI in the data publishing scenario (when a database is either fully or partially released to public domains for conducting analytics).
引用
收藏
页码:76177 / 76195
页数:19
相关论文
共 50 条
[41]   Unified Ecosystem for Data Sharing and AI-Driven Predictive Maintenance in Aviation [J].
Kabashkin, Igor ;
Susanin, Vitaly .
COMPUTERS, 2024, 13 (12)
[42]   Enhancing User Acceptance of an AI Agent's Recommendation in Information-Sharing Environments [J].
Kehat, Rebecca ;
Hirschprung, Ron S. ;
Alkoby, Shani .
APPLIED SCIENCES-BASEL, 2024, 14 (17)
[43]   When AI meets additive manufacturing: Challenges and emerging opportunities for human-centered products development [J].
Liu, Chenang ;
Tian, Wenmeng ;
Kan, Chen .
JOURNAL OF MANUFACTURING SYSTEMS, 2022, 64 :648-656
[44]   Privacy Preserving Data Mining as Proof of Useful Work: Exploring an AI/Blockchain Design [J].
Turesson, Hjalmar K. ;
Kim, Henry ;
Laskowski, Marek ;
Roatis, Alexandra .
JOURNAL OF DATABASE MANAGEMENT, 2021, 32 (01) :69-85
[45]   Digital health fiduciaries: protecting user privacy when sharing health data [J].
Arora, Chirag .
ETHICS AND INFORMATION TECHNOLOGY, 2019, 21 (03) :181-196
[46]   Digital health fiduciaries: protecting user privacy when sharing health data [J].
Chirag Arora .
Ethics and Information Technology, 2019, 21 :181-196
[47]   Unlocking biomedical data sharing: A structured approach with digital twins and artificial intelligence (AI) for open health sciences [J].
Jean-Quartier, Claire ;
Stryeck, Sarah ;
Thien, Alexander ;
Vrella, Burim ;
Kleinschuster, Jeremias ;
Spreitzer, Emil ;
Wali, Mojib ;
Mueller, Heimo ;
Holzinger, Andreas ;
Jeanquartier, Fleur .
DIGITAL HEALTH, 2024, 10
[48]   Hiding Sensitive Information when Sharing Distributed Transactional Data [J].
Ghoshal, Abhijeet ;
Hao, Jing ;
Menon, Syam ;
Sarkar, Sumit .
INFORMATION SYSTEMS RESEARCH, 2020, 31 (02) :473-490
[49]   When Strength Turns Into Weakness: Exploring the Role of AI in the Closure of Zillow Offers [J].
Gudigantala N. ;
Mehrotra V. .
Journal of Information Systems Education, 2024, 35 (01) :67-72
[50]   THE IMPACT OF PRIVACY CALCULUS AND TRUST ON USER INFORMATION PARTICIPATION BEHAVIOR IN AI-BASED MEDICAL CONSULTATION-THE MODERATING ROLE OF GENDER [J].
Luo, Yumei ;
Li, Xiaoqi ;
Ye, Qiongwei .
JOURNAL OF ELECTRONIC COMMERCE RESEARCH, 2023, 24 (01) :48-67