Variational approach for privacy funnel optimization on continuous data
Autor: | Dacheng Tao, Lihao Nan |
---|---|
Rok vydání: | 2020 |
Předmět: |
Theoretical computer science
Computer Networks and Communications Computer science business.industry Inference 020206 networking & telecommunications 02 engineering and technology Mutual information Adversary Inference attack Encryption Theoretical Computer Science Constraint (information theory) Artificial Intelligence Hardware and Architecture 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing business Feature learning Private information retrieval Software |
Zdroj: | Journal of Parallel and Distributed Computing. 137:17-25 |
ISSN: | 0743-7315 |
DOI: | 10.1016/j.jpdc.2019.09.010 |
Popis: | Here we consider a common data encryption problem encountered by users who want to disclose some data to gain utility but preserve their private information. Specifically, we consider the inference attack, in which an adversary conducts inference on the disclosed data to gain information about users’ private data. Following privacy funnel (Makhdoumi et al., 2014), assuming that the original data X is transformed into Z before disclosing and the log loss is used for both privacy and utility metrics, then the problem can be modeled as finding a mapping X → Z that maximizes mutual information between X and Z subject to a constraint that the mutual information between Z and private data S is smaller than a predefined threshold ϵ . In contrast to the original study (Makhdoumi et al., 2014), which only focused on discrete data, we consider the more general and practical setting of continuous and high-dimensional disclosed data (e.g., image data). Most previous work on privacy-preserving representation learning is based on adversarial learning or generative adversarial networks, which has been shown to suffer from the vanishing gradient problem, and it is experimentally difficult to eliminate the relationship with private data Y when Z is constrained to retain more information about X . Here we propose a simple but effective variational approach that does not rely on adversarial training. Our experimental results show that our approach is stable and outperforms previous methods in terms of both downstream task accuracy and mutual information estimation. |
Databáze: | OpenAIRE |
Externí odkaz: |