Paralinguistic Privacy Protection at the Edge

被引:2
|
作者
Aloufi, Ranya [1 ]
Haddadi, Hamed [1 ]
Boyle, David [1 ]
机构
[1] Imperial Coll London, London, England
关键词
Voice user interface; Internet of Things (IoT); privacy; speech analysis; voice synthesis; Deep Learning; disentangled representation learning; model optimization;
D O I
10.1145/3570161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Voice user interfaces and digital assistants are rapidly entering our lives and becoming singular touch points spanning our devices. These always-on services capture and transmit our audio data to powerful cloud services for further processing and subsequent actions. Our voices and raw audio signals collected through these devices contain a host of sensitive paralinguistic information that is transmitted to service providers regardless of deliberate or false triggers. As our emotional patterns and sensitive attributes like our identity, gender, andwell-being are easily inferred using deep acoustic models, we encounter a newgeneration of privacy risks by using these services. One approach to mitigate the risk of paralinguistic-based privacy breaches is to exploit a combination of cloud-based processing with privacy-preserving, on-device paralinguistic information learning and filtering before transmitting voice data. In this article we introduce EDGY, a configurable, lightweight, disentangled representation learning framework that transforms and filters high-dimensional voice data to identify and contain sensitive attributes at the edge prior to offloading to the cloud. We evaluate EDGY's on-device performance and explore optimization techniques, including model quantization and knowledge distillation, to enable private, accurate, and efficient representation learning on resource-constrained devices. Our results show that EDGY runs in tens of milliseconds with 0.2% relative improvement in "zero-shot" ABX score or minimal performance penalties of approximately 5.95% word error rate (WER) in learning linguistic representations from raw voice signals, using a CPU and a single-core ARM processor without specialized hardware.
引用
收藏
页数:27
相关论文
共 50 条
  • [31] Survey on Multi-Access Edge Computing Security and Privacy
    Ranaweera, Pasika
    Jurcut, Anca Delia
    Liyanage, Madhusanka
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (02): : 1078 - 1124
  • [32] OpenTag: Privacy Protection for RFID
    Holtzman, Henry
    Lee, Sanghoon
    Shen, Daniel
    IEEE PERVASIVE COMPUTING, 2009, 8 (02) : 71 - 77
  • [33] On Privacy Protection in Biometric Passports
    Kalman, Gyoergy
    Noll, Josef
    THIRD INTERNATIONAL CONFERENCE ON DIGITAL SOCIETY: ICDS 2009, PROCEEDINGS, 2009, : 60 - 64
  • [34] Privacy Protection Framework for Android
    Mishra, Bharavi
    Agarwal, Aastha
    Goel, Ayush
    Ansari, Aman Ahmad
    Gaur, Pramod
    Singh, Dilbag
    Lee, Heung-No
    IEEE ACCESS, 2022, 10 : 7973 - 7988
  • [35] Data protection: The future of privacy
    Wong, Rebecca
    COMPUTER LAW & SECURITY REVIEW, 2011, 27 (01) : 53 - 57
  • [36] Privacy Protection of Fingerprint Database
    Li, Sheng
    Kot, Alex C.
    IEEE SIGNAL PROCESSING LETTERS, 2011, 18 (02) : 115 - 118
  • [37] Protection Goals for Privacy Engineering
    Hansen, Marit
    Jensen, Meiko
    Rost, Martin
    2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW), 2015, : 159 - 166
  • [38] A Solution For Privacy Protection In MapReduce
    Quang Tran
    Sato, Hiroyuki
    2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2012, : 515 - 520
  • [39] Secure Estimation With Privacy Protection
    Liang, Shi
    Lam, James
    Lin, Hong
    IEEE TRANSACTIONS ON CYBERNETICS, 2023, 53 (08) : 4947 - 4961
  • [40] Fingerprint Combination for Privacy Protection
    Li, Sheng
    Kot, Alex C.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (02) : 350 - 360