Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

Privacy Adversarial Network: Representation Learning for Mobile Data Privacy

Published: 14 September 2020 Publication History

Abstract

The remarkable success of machine learning has fostered a growing number of cloud-based intelligent services for mobile users. Such a service requires a user to send data, e.g. image, voice and video, to the provider, which presents a serious challenge to user privacy. To address this, prior works either obfuscate the data, e.g. add noise and remove identity information, or send representations extracted from the data, e.g. anonymized features. They struggle to balance between the service utility and data privacy because obfuscated data reduces utility and extracted representation may still reveal sensitive information.
This work departs from prior works in methodology: we leverage adversarial learning to better balance between privacy and utility. We design a representation encoder that generates the feature representations to optimize against the privacy disclosure risk of sensitive information (a measure of privacy) by the privacy adversaries, and concurrently optimize with the task inference accuracy (a measure of utility) by the utility discriminator. The result is the privacy adversarial network (PAN), a novel deep model with the new training algorithm, that can automatically learn representations from the raw data. And the trained encoder can be deployed on the user side to generate representations that satisfy the task-defined utility requirements and the user-specified/agnostic privacy budgets.
Intuitively, PAN adversarially forces the extracted representations to only convey information required by the target task. Surprisingly, this constitutes an implicit regularization that actually improves task accuracy. As a result, PAN achieves better utility and better privacy at the same time! We report extensive experiments on six popular datasets, and demonstrate the superiority of PAN compared with alternative methods reported in prior work.

References

[1]
Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep learning with differential privacy. In Proceedings of SIGSAC. 308--318.
[2]
Jaspreet Bhatia, Travis D Breaux, Liora Friedberg, Hanan Hibshi, and Daniel Smullen. 2016. Privacy risk in cybersecurity data sharing. In Proceedings of ACM Workshop on ISCS. ACM, 57--64.
[3]
Jiawei Chen, Janusz Konrad, and Prakash Ishwar. 2018. Vgan-based image representation learning for privacy-preserving facial expression recognition. In Proceedings of CVPR Workshops. 1570--1579.
[4]
Jen-Tzung Chien and Ching-Huai Chen. 2016. Deep discriminative manifold learning. In Proceeding of ICASSP. 2672--2676.
[5]
Andrew Collette. 2018. HDF5 for Python. http://www.h5py.org/.
[6]
Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009. Imagenet: A large-scale hierarchical image database. In Proceedings of CVPR.
[7]
Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy N Rothblum. 2010. Differential privacy under continual observation. In Proceedings of STC. ACM, 715--724.
[8]
Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Journal of Foundations and Trends in Theoretical Computer Science (2014), 211--407.
[9]
Cynthia Dwork, Adam Smith, Thomas Steinke, and Jonathan Ullman. 2017. Exposed! a survey of attacks on private data. Annual Review of Statistics and Its Application 4 (2017), 61--84.
[10]
Harrison Edwards and Amos Storkey. 2015. Censoring representations with an adversary. arXiv preprint arXiv.1511.05897 (2015).
[11]
Murat A Erdogdu, Nadia Fawaz, and Andrea Montanari. 2015. Privacy-utility trade-off for time-series with application to smart-meter data. In Proceedings of Workshops at AAAI.
[12]
Alessandro Giusti, Dan C Ciresan, Jonathan Masci, Luca M Gambardella, and Jurgen Schmidhuber. 2013. Fast image scanning with deep max-pooling convolutional neural networks. In Proceedings of ICIP. 4034--4038.
[13]
Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. 2014. Generative adversarial nets. In Advances in Neural Information Processing Systems. 2672--2680.
[14]
Google. 2018. android.util.LruCache. https://developer.android.com/reference/android/util/LruCache.html.
[15]
Google. 2018. TensorFlow Mobile. https://www.tensorflow.org/mobile/.
[16]
GoogleCloud. 2018. Data Preparation. https://cloud.google.com/ml-engine/docs/tensorflow/data-prep.
[17]
GoogleNow. 2018. Google Now Launcher. https://en.wikipedia.org/wiki/Google_Now.
[18]
Jianping He and Lin Cai. 2017. Differential private noise adding mechanism: Basic conditions and its application. In American Control Conference (ACC), 2017. IEEE, 1673--1678.
[19]
Chong Huang, Peter Kairouz, Xiao Chen, Lalitha Sankar, and Ram Rajagopal. 2017. Context-aware generative adversarial privacy. Entropy (2017).
[20]
Sergey Ioffe and Christian Szegedy. 2015. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167 (2015).
[21]
Kaggle. 2019. State Farm Distracted Driver Detection. https://www.kaggle.com/c/state-farm-distracted-driver-detection.
[22]
Diederik P Kingma and Jimmy Ba. 2014. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014).
[23]
Alex Krizhevsky, Nair Vinod, and Hinton Geoffrey. 2014. The CIFAR-10 dataset. https://goo.gl/hXmru5.
[24]
Rudolf Kruse, Christian Borgelt, Frank Klawonn, Christian Moewes, Matthias Steinbrecher, and Pascal Held. 2013. Multi-layer perceptrons. Springer, 47--81.
[25]
Yann LeCun. 1998. The MNIST database of handwritten digits. https://goo.gl/t6gTEy.
[26]
Mu Li, Tong Zhang, Yuqiang Chen, and Alexander J Smola. 2014. Efficient mini-batch training for stochastic optimization. In Proceedings of SIGKDD. ACM, 661--670.
[27]
Sicong Liu, Yingyan Lin, Zimu Zhou, Kaiming Nan, Hui Liu, and Junzhao Du. 2018. On-demand deep model compression for mobile devices: a usage-driven model selection framework. In Proceedings of ACM MobiSys.
[28]
Aravindh Mahendran and Andrea Vedaldi. 2015. Understanding deep image representations by inverting them., 5188--5196 pages.
[29]
Mohammad Malekzadeh, Richard G Clegg, and Hamed Haddadi. 2018. Replacement autoencoder: A privacy-preserving algorithm for sensory data analysis. In Proceedings of IEEE IoTDI. 165--176.
[30]
Ricardo Mendes and João P Vilela. 2017. Privacy-preserving data mining: methods, metrics, and applications. IEEE Access 5 (2017), 10562--10582.
[31]
Fausto Milletari, Nassir Navab, and Seyed-Ahmad Ahmadi. 2016. V-net: Fully convolutional neural networks for volumetric medical image segmentation. In Proceedings of 3DV. 565--571.
[32]
Seong Joon Oh, Mario Fritz, and Bernt Schiele. 2017. Adversarial image perturbation for privacy protection a game theory perspective. In Proceedings of ICCV. 1491--1500.
[33]
Seyed Ali Ossia, Ali Shahin Shamsabadi, Ali Taheri, Hamid R Rabiee, Nic Lane, and Hamed Haddadi. 2017. A hybrid deep learning architecture for privacy-preserving mobile analytics. arXiv preprint arXiv:1703.02952 (2017).
[34]
Nicolas Papernot, Shuang Song, Ilya Mironov, Ananth Raghunathan, Kunal Talwar, and Úlfar Erlingsson. 2018. Scalable private learning with pate. Proceddings of ICLR (2018).
[35]
Alec Radford, Luke Metz, and Soumith Chintala. 2015. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015).
[36]
Nisarg Raval, Ashwin Machanavajjhala, and Jerry Pan. 2019. Olympus: sensor privacy through utility aware obfuscation. Proceedings of PET (2019).
[37]
Liu Sicong, Zhou Zimu, Du Junzhao, Shangguan Longfei, Jun Han, and Xin Wang. 2017. UbiEar: Bringing Location-independent Sound Awareness to the Hard-of-hearing People with Smartphones. Journal of IMWUT (2017).
[38]
Google Brain team. 2018. TensorFlow. https://www.tensorflow.org/tutorials/.
[39]
Stacey Truex, Nathalie Baracaldo, Ali Anwar, Thomas Steinke, Heiko Ludwig, and Rui Zhang. 2018. A hybrid approach to privacy-preserving federated learning. arXiv preprint arXiv:1812.03224 (2018).
[40]
UCI. 2017. Har: Dataset for Human Activity Recognition. https://goo.gl/m5bRo1.
[41]
Zhenyu Wu, Zhangyang Wang, Zhaowen Wang, and Hailin Jin. 2018. Towards privacy-preserving visual recognition via adversarial training: A pilot study. In Proceedings of ECCV.
[42]
Matthew D Zeiler, Dilip Krishnan, Graham W Taylor, and Rob Fergus. 2010. Deconvolutional networks. In Proceedings of CVPR.
[43]
Guoqiang Zhong, Li-Na Wang, Xiao Ling, and Junyu Dong. 2016. An overview on data representation learning: From traditional feature learning to recent deep learning. Journal of Finance and Data Science (2016), 265--278.

Cited By

View all
  • (2024)Roulette: A Semantic Privacy-Preserving Device-Edge Collaborative Inference Framework for Deep Learning Classification TasksIEEE Transactions on Mobile Computing10.1109/TMC.2023.331230423:5(5494-5510)Online publication date: May-2024
  • (2024)Context-Aware Hybrid Encoding for Privacy-Preserving Computation in IoT DevicesIEEE Internet of Things Journal10.1109/JIOT.2023.328852311:1(1054-1064)Online publication date: 1-Jan-2024
  • (2024)X-Stream: A Flexible, Adaptive Video Transformer for Privacy-Preserving Video Stream AnalyticsIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621341(1-10)Online publication date: 20-May-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 3, Issue 4
December 2019
873 pages
EISSN:2474-9567
DOI:10.1145/3375704
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 September 2020
Published in IMWUT Volume 3, Issue 4

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • Shaanxi Fund
  • NSF
  • NSFC
  • National Key R$\&$D Program of China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)249
  • Downloads (Last 6 weeks)24
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Roulette: A Semantic Privacy-Preserving Device-Edge Collaborative Inference Framework for Deep Learning Classification TasksIEEE Transactions on Mobile Computing10.1109/TMC.2023.331230423:5(5494-5510)Online publication date: May-2024
  • (2024)Context-Aware Hybrid Encoding for Privacy-Preserving Computation in IoT DevicesIEEE Internet of Things Journal10.1109/JIOT.2023.328852311:1(1054-1064)Online publication date: 1-Jan-2024
  • (2024)X-Stream: A Flexible, Adaptive Video Transformer for Privacy-Preserving Video Stream AnalyticsIEEE INFOCOM 2024 - IEEE Conference on Computer Communications10.1109/INFOCOM52122.2024.10621341(1-10)Online publication date: 20-May-2024
  • (2024)Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its MitigationComputer Security – ESORICS 202410.1007/978-3-031-70903-6_14(271-290)Online publication date: 16-Sep-2024
  • (2023)VAXProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36109077:3(1-24)Online publication date: 27-Sep-2023
  • (2023)APter: Privacy Enhancement in Deep Learning Services following Principle of Least PrivilegeProceedings of the ACM Turing Award Celebration Conference - China 202310.1145/3603165.3607453(152-153)Online publication date: 28-Jul-2023
  • (2023)Enhanced Embedded AutoEncoders: An Attribute-Preserving Face De-Identification FrameworkIEEE Internet of Things Journal10.1109/JIOT.2023.323572510:11(9438-9452)Online publication date: 1-Jun-2023
  • (2023)GAPter: Gray-Box Data Protector for Deep Learning Inference Services at User SideICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)10.1109/ICASSP49357.2023.10096286(1-5)Online publication date: 4-Jun-2023
  • (2022)Practical Privacy-Preserving Behaviour-Based Authentication on the EdgeAdjunct Proceedings of the 2022 ACM International Joint Conference on Pervasive and Ubiquitous Computing and the 2022 ACM International Symposium on Wearable Computers10.1145/3544793.3560356(65-66)Online publication date: 11-Sep-2022
  • (2022)Privacy-Aware Human Mobility Prediction via Adversarial Networks2022 2nd International Workshop on Cyber-Physical-Human System Design and Implementation (CPHS)10.1109/CPHS56133.2022.9804533(7-12)Online publication date: May-2022
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media