Practical Membership Inference Attack Against Collaborative Inference in Industrial IoT

被引:24
作者
Chen, Hanxiao [1 ]
Li, Hongwei [1 ]
Dong, Guishan [2 ]
Hao, Meng [1 ]
Xu, Guowen [1 ]
Huang, Xiaoming [3 ]
Liu, Zhe [4 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
[2] Inst China Elect Technol Grp Corp, Chengdu 610041, Peoples R China
[3] Shenzhen CyberAray Network Technol Co Ltd, Shenzhen 518000, Peoples R China
[4] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
基金
国家重点研发计划;
关键词
Collaboration; Data models; Data privacy; Training data; Servers; Computational modeling; Training; Collaborative inference; deep learning (DL); industrial Internet of things (IIoT); membership inference attack;
D O I
10.1109/TII.2020.3046648
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The effectiveness of state-of-the-art deep learning (DL) models has empowered the development of industrial Internet of things (IIoT). Recently, considering resource-constrained and privacy-required IIoT devices, collaborative inference has been proposed, which splits DL models and deploys them in IIoT devices and an edge server separately. However, in this article, we argue that there are still severe privacy vulnerabilities in collaborative inference systems. And we devise the first membership inference attack (MIA) against collaborative inference, to infer whether a particular data sample is used for training the model of IIoT systems. Existing MIAs either assume full access to the systems' APIs or availability of the target model's parameters, which is not applicable in realistic IIoT environments. In contrast to prior works, we propose transfer-inherit shadow learning and thus relax these key assumptions. We evaluate our attack on different datasets and various settings, and the results show it has high effectiveness.
引用
收藏
页码:477 / 487
页数:11
相关论文
共 30 条
[1]  
[Anonymous], 2014, P USENIX OSDI
[2]  
[Anonymous], 2017, arXiv
[3]  
[Anonymous], 2018, ARXIV PREPRINT ARXIV
[4]   The industrial internet of things (IIoT): An analysis framework [J].
Boyes, Hugh ;
Hallaq, Bit ;
Cunningham, Joe ;
Watson, Tim .
COMPUTERS IN INDUSTRY, 2018, 101 :1-12
[5]  
Demontis A, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P321
[6]   Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J].
Fredrikson, Matt ;
Jha, Somesh ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1322-1333
[7]  
Fredrikson M, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P17
[8]  
Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1
[9]   Distributed learning of deep neural network over multiple agents [J].
Gupta, Otkrist ;
Raskar, Ramesh .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 116 :1-8
[10]   Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence [J].
Hao, Meng ;
Li, Hongwei ;
Luo, Xizhao ;
Xu, Guowen ;
Yang, Haomiao ;
Liu, Sen .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (10) :6532-6542