Privacy Leakage in GAN Enabled Load Profile Synthesis

被引:1
作者
Huang, Jiaqi
Wu, Chenye [1 ]
机构
[1] Chinese Univ Hong Kong, Sch Sci & Engn, Shenzhen 518172, Guangdong, Peoples R China
来源
2022 IEEE SUSTAINABLE POWER AND ENERGY CONFERENCE (ISPEC) | 2022年
基金
中国国家自然科学基金;
关键词
Privacy; Data Synthesis; GAN; Differential Privacy; Load Profiling;
D O I
10.1109/iSPEC54162.2022.10033029
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Load profile synthesis is a commonly used technique for preserving smart meter data privacy. Recent efforts have successfully integrated advanced generative models, such as the Generative Adversarial Networks (GAN), to synthesize highquality load profiles. Such methods are becoming increasingly popular for conducting privacy-preserving load data analytics. It is commonly believed that performing analyses on synthetic data can ensure certain privacy. In this paper, we examine this common belief. Specifically, we reveal the privacy leakage issue in load profile synthesis enabled by GAN. We first point out that the synthesis process cannot provide any provable privacy guarantee, highlighting that directly conducting load data analytics based on such data is extremely dangerous. The sample re-appearance risk is then presented under different volumes of training data, which indicates that the original load data could be directly leaked by GAN without any intentional effort from adversaries. Furthermore, we discuss potential approaches that might address this privacy leakage issue.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Elimination of leakage in GaN-on-diamond
    Alvarez, B.
    Francis, D.
    Faili, F.
    Lowe, F.
    Twitchen, D.
    Lee, K. B.
    Houston, P.
    2016 IEEE COMPOUND SEMICONDUCTOR INTEGRATED CIRCUIT SYMPOSIUM (CSICS), 2016, : 114 - 117
  • [22] RDP-FedGAN: A Rnyi-Differential Privacy Empowered Federated Learning GAN in Smart Parking
    Du, Miao
    Yang, Peng
    Liu, Yinqiu
    Tian, Wen
    Xiong, Zehui
    Han, Zhu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2025, 74 (01) : 100 - 109
  • [23] Security and Privacy in Artificial Intelligence-Enabled 6G
    Xu, Qichao
    Su, Zhou
    Li, Ruidong
    IEEE NETWORK, 2022, 36 (05): : 188 - 196
  • [24] Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive Survey
    Husnoo, Muhammad Akbar
    Anwar, Adnan
    Chakrabortty, Ripon K.
    Doss, Robin
    Ryan, Mike J.
    IEEE ACCESS, 2021, 9 : 153276 - 153304
  • [25] Precursor of privacy leakage detection for individual user
    Li, Xuefeng
    Zhao, Chensu
    Hu, Yi
    Xie, Honglin
    Wang, Yuhang
    Zhao, Jingyang
    COMPUTERS & SECURITY, 2024, 142
  • [26] Mosaic: Quantifying Privacy Leakage in Mobile Networks
    Xia, Ning
    Song, Han Hee
    Liao, Yong
    Iliofotou, Marios
    Nucci, Antonio
    Zhang, Zhi-Li
    Kuzmanovic, Aleksandar
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) : 279 - 290
  • [27] Analysing Privacy Leakage of Life Events on Twitter
    Kekulluoglu, Dilara
    Magdy, Walid
    Vaniea, Kami
    PROCEEDINGS OF THE 12TH ACM CONFERENCE ON WEB SCIENCE, WEBSCI 2020, 2020, : 287 - 294
  • [28] A Systematic Method on PDF Privacy Leakage Issues
    Feng, Yun
    Liu, Baoxu
    Cui, Xiang
    Liu, Chaoge
    Kang, Xuebin
    Su, Junwei
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1020 - 1029
  • [29] Plasma treatment for leakage reduction in AlGaN/GaN and GaN Schottky contacts
    Chu, Rongming
    Shen, Likun
    Fichtenbaum, Nicholas
    Brown, David
    Keller, Stacia
    Mishra, Umesh K.
    IEEE ELECTRON DEVICE LETTERS, 2008, 29 (04) : 297 - 299
  • [30] VeriDIP: Verifying Ownership of Deep Neural Networks Through Privacy Leakage Fingerprints
    Hu, Aoting
    Lu, Zhigang
    Xie, Renjie
    Xue, Minhui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 2568 - 2584