Machine Learning with Reconfigurable Privacy on Resource-Limited Computing Devices

被引:0
作者
Imtiaz, Sana [1 ,2 ]
Tania, Zannatun N. [1 ]
Chaudhry, Hassan Nazeer [3 ]
Arsalan, Muhammad [4 ]
Sadre, Ramin [2 ]
Vlassov, Vladimir [1 ]
机构
[1] KTH Royal Inst Technol, EECS SCS, Stockholm, Sweden
[2] Catholic Univ Louvain, ICTEAM INGI, Louvain La Neuve, Belgium
[3] Politecn Milan, DEIB, Milan, Italy
[4] Tech Univ Carolo Wilhelmina Braunschweig, FK EITP, Braunschweig, Germany
来源
19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021) | 2021年
关键词
Data privacy; optimization; greedy algorithms; machine learning; anonymization; consumer-producer models; edge devices; IoT; K-ANONYMITY;
D O I
10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00213
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ensuring user privacy while learning from the acquired Internet of Things sensor data, using limited available compute resources on edge devices, is a challenging task. Ideally, it is desirable to make all the features of the collected data private but due to resource limitations, it is not always possible as it may cause overutilization of resources, which in turn affects the performance of the whole system. In this work, we use the generalization techniques for data anonymization and provide customized injective privacy encoder functions to make data features private. Regardless of the resource availability, some data features must be essentially private. All other data features that may pose low privacy threat are termed as nonessential features. We propose Dynamic Iterative Greedy Search (DIGS), a novel approach with corresponding algorithms to select the set of optimal data features to be private for machine learning applications provided device resource constraints. DIGS selects the necessary and the most private version of data for the application, where all essential and a subset of nonessential features are made private on the edge device without resource overutilization. We have implemented DIGS in Python and evaluated it on Raspberry Pi model A (an edge device with limited resources) for an SVM-based classification on real-life health care data. Our evaluation results show that, while providing the required level of privacy, DIGS allows to achieve up to 26.21% memory, 16.67% CPU instructions, and 30.5% of network bandwidth savings as compared to making all the data private. Moreover, our chosen privacy encoding method has a positive impact on the accuracy of the classification model for our chosen application.
引用
收藏
页码:1592 / 1602
页数:11
相关论文
共 38 条
[21]   Joint Sparse Channel Recovery With Quantized Feedback for Multi-User Massive MIMO Systems [J].
Kulsoom, Farzana ;
Vizziello, Anna ;
Chaudhry, Hassan Nazeer ;
Savazzi, Pietro .
IEEE ACCESS, 2020, 8 :11046-11060
[22]   On-chip continuous blood cell sub-type separation by deterministic lateral displacement [J].
Li, Nan ;
Kamei, Daniel T. ;
Ho, Chili-Ming .
2007 2ND IEEE INTERNATIONAL CONFERENCE ON NANO/MICRO ENGINEERED AND MOLECULAR SYSTEMS, VOLS 1-3, 2007, :692-+
[23]   Tunable Measures for Information Leakage and Applications to Privacy-Utility Tradeoffs [J].
Liao, Jiachun ;
Kosut, Oliver ;
Sankar, Lalitha ;
Calmon, Flavio du Pin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (12) :8043-8066
[24]  
Machanavajjhala A., 2007, ACM T KNOWL DISCOV D, V1, P3
[25]   A personal data store approach for recommender systems: enhancing privacy without sacrificing accuracy [J].
Mazeh, Itzik ;
Shmueli, Erez .
EXPERT SYSTEMS WITH APPLICATIONS, 2020, 139
[26]  
Narendula R., 2010, 2010 22 INT TEL C IT, P1
[27]  
Niu Chaoyue, 2020, P 26 ANN INT C MOB C, P1
[28]   A Look at the Security and Privacy of Fitbit as a Health Activity Tracker [J].
Orlosky, Jason ;
Ezenwoye, Onyeka ;
Yates, Heather ;
Besenyi, Gina .
PROCEEDINGS OF THE 2019 ANNUAL ACM SOUTHEAST CONFERENCE (ACMSE 2019), 2019, :241-244
[29]  
Padron A., MULTIPARTY HOMOMORPH
[30]   Threats to Networking Cloud and Edge Datacenters in the Internet of Things [J].
Puthal, Deepak ;
Nepal, Surya ;
Ranjan, Rajiv ;
Chen, Jinjun .
IEEE CLOUD COMPUTING, 2016, 3 (03) :64-71