Machine Learning with Reconfigurable Privacy on Resource-Limited Computing Devices

被引:0
作者
Imtiaz, Sana [1 ,2 ]
Tania, Zannatun N. [1 ]
Chaudhry, Hassan Nazeer [3 ]
Arsalan, Muhammad [4 ]
Sadre, Ramin [2 ]
Vlassov, Vladimir [1 ]
机构
[1] KTH Royal Inst Technol, EECS SCS, Stockholm, Sweden
[2] Catholic Univ Louvain, ICTEAM INGI, Louvain La Neuve, Belgium
[3] Politecn Milan, DEIB, Milan, Italy
[4] Tech Univ Carolo Wilhelmina Braunschweig, FK EITP, Braunschweig, Germany
来源
19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021) | 2021年
关键词
Data privacy; optimization; greedy algorithms; machine learning; anonymization; consumer-producer models; edge devices; IoT; K-ANONYMITY;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00213
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring user privacy while learning from the acquired Internet of Things sensor data, using limited available compute resources on edge devices, is a challenging task. Ideally, it is desirable to make all the features of the collected data private but due to resource limitations, it is not always possible as it may cause overutilization of resources, which in turn affects the performance of the whole system. In this work, we use the generalization techniques for data anonymization and provide customized injective privacy encoder functions to make data features private. Regardless of the resource availability, some data features must be essentially private. All other data features that may pose low privacy threat are termed as nonessential features. We propose Dynamic Iterative Greedy Search (DIGS), a novel approach with corresponding algorithms to select the set of optimal data features to be private for machine learning applications provided device resource constraints. DIGS selects the necessary and the most private version of data for the application, where all essential and a subset of nonessential features are made private on the edge device without resource overutilization. We have implemented DIGS in Python and evaluated it on Raspberry Pi model A (an edge device with limited resources) for an SVM-based classification on real-life health care data. Our evaluation results show that, while providing the required level of privacy, DIGS allows to achieve up to 26.21% memory, 16.67% CPU instructions, and 30.5% of network bandwidth savings as compared to making all the data private. Moreover, our chosen privacy encoding method has a positive impact on the accuracy of the classification model for our chosen application.
引用
收藏
页码:1592 / 1602
页数:11
相关论文
共 38 条
[1]   LotusNet: Tunable privacy for distributed online social network services [J].
Aiello, Luca Maria ;
Ruffo, Giancarlo .
COMPUTER COMMUNICATIONS, 2012, 35 (01) :75-88
[2]  
[Anonymous], 2016, INT C LEARN REPR
[3]  
[Anonymous], ADULT BMIHEALTHY WEI
[4]  
[Anonymous], How many calories are in one gram of fat, carbohydrate, or protein?
[5]  
Berkvosky S, 2007, RECSYS 07: PROCEEDINGS OF THE 2007 ACM CONFERENCE ON RECOMMENDER SYSTEMS, P9
[6]  
Bertino E, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), P3645, DOI 10.1109/BigData.2016.7841030
[7]  
Brakerski Z., 2014, ACM Trans. on Com. T, V6, P13
[8]   An Approach to Protect the Privacy of Cloud Data from Data Mining Based Attacks [J].
Dev, Himel ;
Sen, Tanmoy ;
Basak, Madhusudan ;
Ali, Mohammed Eunus .
2012 SC COMPANION: HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS (SCC), 2012, :1106-1115
[9]   Quantifying the Utility-Privacy Tradeoff in the Internet of Things [J].
Dong, Roy ;
Ratliff, Lillian J. ;
Cardenas, Alvaro A. ;
Ohlsson, Henrik ;
Sastry, S. Shankar .
ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2018, 2 (02)
[10]   PDMFRec: A Decentralised Matrix Factorisation with Tunable User-centric Privacy [J].
Duriakova, Erika ;
Tragos, Elias Z. ;
Smyth, Barry ;
Hurley, Neil ;
Pena, Francisco J. ;
Symeonidis, Panagiotis ;
Geraci, James ;
Lawlor, Aonghus .
RECSYS 2019: 13TH ACM CONFERENCE ON RECOMMENDER SYSTEMS, 2019, :457-461