AttrLeaks on the Edge: Exploiting Information Leakage from Privacy-Preserving Co-inference

被引:52
|
作者
Wang, Zhibo [1 ,2 ]
Liu, Kaixin [1 ]
Hu, Jiahui [2 ]
Ren, Ju [3 ]
Guo, Hengchang [1 ]
Yuan, Wei [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] Zhejiang Univ, Sch Cyber Sci & Technol, Hangzhou 310027, Zhejiang, Peoples R China
[3] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Deep learning; Privacy; Collaboration; Transforms; Feature extraction; Prediction algorithms; Iron; Collaborative inference; Private information leakage; Attribute inference attack;
D O I
10.23919/cje.2022.00.031
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Collaborative inference (co-inference) accelerates deep neural network inference via extracting representations at the device and making predictions at the edge server, which however might disclose the sensitive information about private attributes of users (e.g., race). Although many privacy-preserving mechanisms on co-inference have been proposed to eliminate privacy concerns, privacy leakage of sensitive attributes might still happen during inference. In this paper, we explore privacy leakage against the privacy-preserving co-inference by decoding the uploaded representations into a vulnerable form. We propose a novel attack framework named AttrLeaks, which consists of the shadow model of feature extractor (FE), the susceptibility reconstruction decoder, and the private attribute classifier. Based on our observation that values in inner layers of FE (internal representation) are more sensitive to attack, the shadow model is proposed to simulate the FE of the victim in the black-box scenario and generates the internal representations. Then, the susceptibility reconstruction decoder is designed to transform the uploaded representations of the victim into the vulnerable form, which enables the malicious classifier to easily predict the private attributes. Extensive experimental results demonstrate that AttrLeaks outperforms the state of the art in terms of attack success rate.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [1] Privacy-Preserving Deep Learning and Inference
    Riazi, M. Sadegh
    Koushanfar, Farinaz
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [2] PrivStream: A privacy-preserving inference framework on IoT streaming data at the edge
    Wang, Dan
    Ren, Ju
    Wang, Zhibo
    Zhang, Yaoxue
    Shen, Xuemin
    INFORMATION FUSION, 2022, 80 : 282 - 294
  • [3] PENETRALIUM: Privacy-preserving and memory-efficient neural network inference at the edge
    Yang, Mengda
    Yi, Wenzhe
    Wang, Juan
    Hu, Hongxin
    Xu, Xiaoyang
    Li, Ziang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 156 : 30 - 41
  • [4] Privacy-Preserving QoS Forecasting in Mobile Edge Environments
    Zhang, Pengcheng
    Jin, Huiying
    Dong, Hai
    Song, Wei
    Bouguettaya, Athman
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (02) : 1103 - 1117
  • [5] Deniable-Based Privacy-Preserving Authentication Against Location Leakage in Edge Computing
    Zeng, Shengke
    Zhang, Hongjie
    Hao, Fei
    Li, Hongwei
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 1729 - 1738
  • [6] Privacy-Preserving Coded Mobile Edge Computing for Low-Latency Distributed Inference
    Schlegel, Reent
    Kumar, Siddhartha
    Rosnes, Eirik
    Amat, Alexandre Graell Graell, I
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (03) : 788 - 799
  • [7] Privacy-preserving edge caching: A probabilistic approach
    Hassanpour, Seyedeh Bahereh
    Khonsari, Ahmad
    Moradian, Masoumeh
    Shariatpanahi, Seyed Pooya
    COMPUTER NETWORKS, 2023, 226
  • [8] Privacy on the Edge: Customizable Privacy-Preserving Context Sharing in Hierarchical Edge Computing
    Gu, Bruce
    Gao, Longxiang
    Wang, Xiaodong
    Qu, Youyang
    Jin, Jiong
    Yu, Shui
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (04): : 2298 - 2309
  • [9] Improved Secure Deep Neural Network Inference Offloading with Privacy-Preserving Scalar Product Evaluation for Edge Computing
    Li, Jiarui
    Zhang, Zhuosheng
    Yu, Shucheng
    Yuan, Jiawei
    APPLIED SCIENCES-BASEL, 2022, 12 (18):
  • [10] No free lunch theorem for privacy-preserving LLM inference
    Zhang, Xiaojin
    Pang, Yahao
    Kang, Yan
    Chen, Wei
    Fan, Lixin
    Jin, Hai
    Yang, Qiang
    ARTIFICIAL INTELLIGENCE, 2025, 341