AttrLeaks on the Edge: Exploiting Information Leakage from Privacy-Preserving Co-inference

被引:52
|
作者
Wang, Zhibo [1 ,2 ]
Liu, Kaixin [1 ]
Hu, Jiahui [2 ]
Ren, Ju [3 ]
Guo, Hengchang [1 ]
Yuan, Wei [1 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
[2] Zhejiang Univ, Sch Cyber Sci & Technol, Hangzhou 310027, Zhejiang, Peoples R China
[3] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Deep learning; Privacy; Collaboration; Transforms; Feature extraction; Prediction algorithms; Iron; Collaborative inference; Private information leakage; Attribute inference attack;
D O I
10.23919/cje.2022.00.031
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Collaborative inference (co-inference) accelerates deep neural network inference via extracting representations at the device and making predictions at the edge server, which however might disclose the sensitive information about private attributes of users (e.g., race). Although many privacy-preserving mechanisms on co-inference have been proposed to eliminate privacy concerns, privacy leakage of sensitive attributes might still happen during inference. In this paper, we explore privacy leakage against the privacy-preserving co-inference by decoding the uploaded representations into a vulnerable form. We propose a novel attack framework named AttrLeaks, which consists of the shadow model of feature extractor (FE), the susceptibility reconstruction decoder, and the private attribute classifier. Based on our observation that values in inner layers of FE (internal representation) are more sensitive to attack, the shadow model is proposed to simulate the FE of the victim in the black-box scenario and generates the internal representations. Then, the susceptibility reconstruction decoder is designed to transform the uploaded representations of the victim into the vulnerable form, which enables the malicious classifier to easily predict the private attributes. Extensive experimental results demonstrate that AttrLeaks outperforms the state of the art in terms of attack success rate.
引用
收藏
页码:1 / 12
页数:12
相关论文
共 50 条
  • [31] Roulette: A Semantic Privacy-Preserving Device-Edge Collaborative Inference Framework for Deep Learning Classification Tasks
    Li, Jingyi
    Liao, Guocheng
    Chen, Lin
    Chen, Xu
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 5494 - 5510
  • [32] Privacy-preserving SimRank over Distributed Information Network
    Chu, Yu-Wei
    Tai, Chih-Hua
    Chen, Ming-Syan
    Yu, Philip S.
    12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2012), 2012, : 840 - 845
  • [33] Information-theoretic privacy-preserving user authentication
    Kazempour, Narges
    Mirmohseni, Mahtab
    Aref, Mohammad Reza
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2025, 24 (01)
  • [34] Privacy-Preserving Constrained Quadratic Optimization With Fisher Information
    Farokhi, Farhad
    IEEE SIGNAL PROCESSING LETTERS, 2020, 27 : 545 - 549
  • [35] A Privacy-Preserving Authentication Scheme in an Edge-Fog Environment
    Ben Amor, Arij
    Abid, Mohamed
    Meddeb, Aref
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1225 - 1231
  • [36] Distributed Reinforcement Learning for Privacy-Preserving Dynamic Edge Caching
    Liu, Shengheng
    Zheng, Chong
    Huang, Yongming
    Quek, Tony Q. S.
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (03) : 749 - 760
  • [37] Privacy-Preserving Pedestrian Detection for Smart City with Edge Computing
    Yuan, Danni
    Zhu, Xiaoyan
    Mao, Yaoru
    Zheng, Binwen
    Wu, Tao
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [38] An evaluation of vertex and edge modification techniques for privacy-preserving on graphs
    Casas-Roma J.
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (11) : 15109 - 15125
  • [39] Privacy-Preserving on Graphs Using Randomization and Edge-Relevance
    Casas-Roma, Jordi
    MODELING DECISIONS FOR ARTIFICIAL INTELLIGENCE, MDAI 2014, 2014, 8825 : 204 - 216
  • [40] Privacy-Preserving Blockchained Edge Resource Auction With Fraud Resistance
    Chen, Lixing
    Gao, Feng
    Bai, Yang
    Wu, Jun
    Zhou, Pan
    Xu, Zichuan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (04): : 4076 - 4089