Paralinguistic Privacy Protection at the Edge

被引:2
|
作者
Aloufi, Ranya [1 ]
Haddadi, Hamed [1 ]
Boyle, David [1 ]
机构
[1] Imperial Coll London, London, England
关键词
Voice user interface; Internet of Things (IoT); privacy; speech analysis; voice synthesis; Deep Learning; disentangled representation learning; model optimization;
D O I
10.1145/3570161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Voice user interfaces and digital assistants are rapidly entering our lives and becoming singular touch points spanning our devices. These always-on services capture and transmit our audio data to powerful cloud services for further processing and subsequent actions. Our voices and raw audio signals collected through these devices contain a host of sensitive paralinguistic information that is transmitted to service providers regardless of deliberate or false triggers. As our emotional patterns and sensitive attributes like our identity, gender, andwell-being are easily inferred using deep acoustic models, we encounter a newgeneration of privacy risks by using these services. One approach to mitigate the risk of paralinguistic-based privacy breaches is to exploit a combination of cloud-based processing with privacy-preserving, on-device paralinguistic information learning and filtering before transmitting voice data. In this article we introduce EDGY, a configurable, lightweight, disentangled representation learning framework that transforms and filters high-dimensional voice data to identify and contain sensitive attributes at the edge prior to offloading to the cloud. We evaluate EDGY's on-device performance and explore optimization techniques, including model quantization and knowledge distillation, to enable private, accurate, and efficient representation learning on resource-constrained devices. Our results show that EDGY runs in tens of milliseconds with 0.2% relative improvement in "zero-shot" ABX score or minimal performance penalties of approximately 5.95% word error rate (WER) in learning linguistic representations from raw voice signals, using a CPU and a single-core ARM processor without specialized hardware.
引用
收藏
页数:27
相关论文
共 50 条
  • [41] Protection of Big Data Privacy
    Mehmood, Abid
    Natgunanathan, Iynkaran
    Xiang, Yong
    Hua, Guang
    Guo, Song
    IEEE ACCESS, 2016, 4 : 1821 - 1834
  • [42] PRIVACY PROTECTION FOR USER AUTHENTICATION
    Hajny, Jan
    Pelka, Tomas
    Zeman, Vaclav
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 90 - 93
  • [43] Privacy protection for HealthGrid applications
    Claerhout, B
    De Moor, GJE
    METHODS OF INFORMATION IN MEDICINE, 2005, 44 (02) : 140 - 143
  • [44] To cloud or not to cloud: an on-line scheduler for dynamic privacy-protection of deep learning workload on edge devices
    Yibin Tang
    Ying Wang
    Huawei Li
    Xiaowei Li
    CCF Transactions on High Performance Computing, 2021, 3 : 85 - 100
  • [45] AdaBias: An Optimization Method With Bias Correction for Differential Privacy Protection
    Zhao, Xuanyu
    Hu, Tao
    Li, Jun
    Mao, Chunxia
    IEEE ACCESS, 2022, 10 : 107010 - 107021
  • [46] To cloud or not to cloud: an on-line scheduler for dynamic privacy-protection of deep learning workload on edge devices
    Tang, Yibin
    Wang, Ying
    Li, Huawei
    Li, Xiaowei
    CCF TRANSACTIONS ON HIGH PERFORMANCE COMPUTING, 2021, 3 (01) : 85 - 100
  • [47] A Privacy-Preserving System Design for Digital Presence Protection
    Yocam, Eric
    Alomari, Ahmad
    Gawanmeh, Amjad
    Mansoor, Wathiq
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (02): : 3091 - 3110
  • [48] Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT
    Liu, Tianen
    Wang, Yingjie
    Li, Yingshu
    Tong, Xiangrong
    Qi, Lianyong
    Jiang, Nan
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09): : 7928 - 7940
  • [49] Privacy Cost Analysis and Privacy Protection Based on Big Data
    周蔷
    岳开旭
    段垚
    JournalofDonghuaUniversity(EnglishEdition), 2019, 36 (01) : 96 - 105
  • [50] User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection
    Isaak, Jim
    Hanna, Mina J.
    COMPUTER, 2018, 51 (08) : 56 - 59