Data privacy and utility trade-off based on mutual information neural estimator

被引:4
作者
Wu, Qihong [1 ]
Tang, Jinchuan [1 ]
Dang, Shuping [2 ]
Chen, Gaojie [3 ]
机构
[1] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang, Guizhou, Peoples R China
[2] Univ Bristol, Dept Elect & Elect Engn, Bristol, England
[3] Univ Surrey, Inst Commun Syst, 5G 6G Innovat Ctr, Guildford, England
关键词
Privacy utility trade-off; Mutual information neural estimator; KL-divergence; Neural networks; BIG DATA; MECHANISM; INTERNET;
D O I
10.1016/j.eswa.2022.118012
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the era of big data and the Internet of Things (IoT), data owners need to share a large amount of data with the intended receivers in an insecure environment, posing a trade-off issue between user privacy and data utility. The privacy utility trade-off was facilitated through a privacy funnel based on mutual information. In this article, we propose a privacy funnel which is using mutual information neural estimator (MINE) to optimize the privacy utility trade-off by estimating mutual information. Firstly, we estimate mutual information in a training way for data with unknown distributions and make the result a measure of privacy and utility. Secondly, we optimize the privacy utility trade-off by optimizing the mutual information added noise as an encoding process and minimizing cross-entropy mutual information between published data and non-sensitive data as a decoding process. Finally, simulations are conducted comparing our methodology to the Kraskov, Stogbauer, and Grassberger (KSG) estimation obtained by k-nearest neighbor as well as information bottleneck in the traditional method. Our results clearly demonstrate that the designed framework has better performance and attains convergence quicker in the scenario where enormous volumes of data are handled, and the largest data utility obtained by the MINE for a given privacy threshold is even better.
引用
收藏
页数:9
相关论文
共 47 条
[1]  
Adams M, 2017, TECHNOL INNOV MANAG, V7, P12
[2]  
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[3]  
[Anonymous], 2007, ACM T KNOWL DISCOV D, DOI [10.1145/1217299.1217302, DOI 10.1145/1217299.1217302]
[4]  
Barber D, 2004, ADV NEUR IN, V16, P201
[5]  
Belghazi MI, 2018, PR MACH LEARN RES, V80
[6]   Privacy Preserving Utility-Aware Mechanism for Data Uploading Phase in Participatory Sensing [J].
Ben Messaoud, Rim ;
Sghaier, Nouha ;
Moussa, Mohamed Ali ;
Ghamri-Doudane, Yacine .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2019, 18 (09) :2160-2173
[7]  
Calmon FD, 2012, ANN ALLERTON CONF, P1401, DOI 10.1109/Allerton.2012.6483382
[8]   A context-aware search system for Internet of Things based on hierarchical context model [J].
Chen, Yuanyi ;
Zhou, Jingyu ;
Guo, Minyi .
TELECOMMUNICATION SYSTEMS, 2016, 62 (01) :77-91
[9]   Privacy preservation through a greedy, distortion-based rule-hiding method [J].
Cheng, Peng ;
Roddick, John F. ;
Chu, Shu-Chuan ;
Lin, Chun-Wei .
APPLIED INTELLIGENCE, 2016, 44 (02) :295-306
[10]   Estimation of the information by an adaptive partitioning of the observation space [J].
Darbellay, GA ;
Vajda, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (04) :1315-1321