AutoGAN-based Dimension Reduction for Privacy Preservation

Exploiting data and concurrently protecting sensitive information to whom data belongs is an emerging research area in data mining. Several methods have been introduced to protect individual privacy and at the same time maximize data utility. Unfortunately, existing techniques such as differential privacy are not effectively protecting data owner privacy in the scenarios using visualizable data (e.g., images, videos). Furthermore, such techniques usually result in low performance with a high number of queries. To address these problems, we propose a dimension reduction-based method for privacy preservation. This method generates dimensionally-reduced data for performing machine learning tasks and prevents a strong adversary from reconstructing the original data. In this paper, we first introduce a theoretical tool to evaluate dimension reduction-based privacy preserving mechanisms, then propose a non-linear dimension reduction framework using state-of-the-art neural network structures for privacy preservation. In the experiments, we test our method on popular face image datasets and show that our method can retain data utility and resist data reconstruction, thus protecting privacy.

[1]  Pierre Baldi,et al.  Autoencoders, Unsupervised Learning, and Deep Architectures , 2011, ICML Unsupervised and Transfer Learning.

[2]  Xiaogang Wang,et al.  Deep Learning Face Attributes in the Wild , 2014, 2015 IEEE International Conference on Computer Vision (ICCV).

[3]  Ian Goodfellow,et al.  Generative adversarial networks , 2020, Commun. ACM.

[4]  Shafi Goldwasser,et al.  Machine Learning Classification over Encrypted Data , 2015, NDSS.

[5]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[6]  Shiming He,et al.  An efficient privacy-preserving compressive data gathering scheme in WSNs , 2015, Inf. Sci..

[7]  A. Yao,et al.  Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.

[8]  Yucel Saygin,et al.  Secret charing vs. encryption-based techniques for privacy preserving data mining , 2007 .

[9]  Raja Giryes,et al.  Autoencoders , 2020, ArXiv.

[10]  Tianqing Zhu,et al.  Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture , 2018, IEEE Access.

[11]  Ram Rajagopal,et al.  Understanding Compressive Adversarial Privacy , 2018, 2018 IEEE Conference on Decision and Control (CDC).

[12]  S. Y. Kung,et al.  A Compressive Privacy approach to Generalized Information Bottleneck and Privacy Funnel problems , 2017, J. Frankl. Inst..

[13]  David J. Kriegman,et al.  From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[14]  Y. Saygin,et al.  Secret Sharing vs . Encryption-based Techniques For Privacy Preserving Data Mining 1 , 2008 .

[15]  Zhenyu Wu,et al.  Towards Privacy-Preserving Visual Recognition via Adversarial Training: A Pilot Study , 2018, ECCV.

[16]  Tsuyoshi Murata,et al.  {m , 1934, ACML.

[17]  Dejing Dou,et al.  Differential Privacy Preservation for Deep Auto-Encoders: an Application of Human Behavior Prediction , 2016, AAAI.

[18]  Divyakant Agrawal,et al.  Privacy preserving decision tree learning over multiple parties , 2007, Data Knowl. Eng..

[19]  Hassan Takabi,et al.  CryptoDL: Deep Neural Networks over Encrypted Data , 2017, ArXiv.

[20]  S.Y. Kung,et al.  Compressive Privacy: From Information\/Estimation Theory to Machine Learning [Lecture Notes] , 2017, IEEE Signal Processing Magazine.

[21]  Giuseppe Ateniese,et al.  Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning , 2017, CCS.

[22]  Larry A. Wasserman,et al.  Differential privacy with compression , 2009, 2009 IEEE International Symposium on Information Theory.

[23]  Sun-Yuan Kung,et al.  Privacy-preserving PCA on horizontally-partitioned data , 2017, 2017 IEEE Conference on Dependable and Secure Computing.

[24]  Andy Harter,et al.  Parameterisation of a stochastic model for human face identification , 1994, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision.

[25]  Kamalika Chaudhuri,et al.  Privacy-preserving logistic regression , 2008, NIPS.

[26]  Andrew Zisserman,et al.  Very Deep Convolutional Networks for Large-Scale Image Recognition , 2014, ICLR.

[27]  Sen Wang,et al.  FRiPAL: Face recognition in privacy abstraction layer , 2017, 2017 IEEE Conference on Dependable and Secure Computing.

[28]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[29]  Yuval Tassa,et al.  Continuous control with deep reinforcement learning , 2015, ICLR.

[30]  Johannes Blömer How to Share a Secret , 2011, Algorithms Unplugged.

[31]  Xiaoqian Jiang,et al.  Differential-Private Data Publishing Through Component Analysis , 2013, Trans. Data Priv..

[32]  Heng Tao Shen,et al.  Principal Component Analysis , 2009, Encyclopedia of Biometrics.

[33]  Ian Goodfellow,et al.  Deep Learning with Differential Privacy , 2016, CCS.

[34]  Yin Yang,et al.  Functional Mechanism: Regression Analysis under Differential Privacy , 2012, Proc. VLDB Endow..

[35]  J. F. A. de O. Pantoja Algorithms for constrained optimization , 1984 .