Securing User Privacy in Cloud-Based Whiteboard Services Against Health Attribute Inference Attacks

被引:0
|
作者
Shahid A.R. [1 ]
Imteaj A. [1 ]
机构
[1] School of Computing, Southern Illinois University Carbondale, IL
来源
关键词
Artificial intelligence; Cloud computing; Cloud-based whiteboard services; Collaboration; Collaborative platforms privacy; Differential privacy; Health attribute inference attacks; Local differential privacy; Machine Learning; Privacy; Real-time systems; Shape;
D O I
10.1109/TAI.2024.3352529
中图分类号
学科分类号
摘要
Cloud-based whiteboard services have gained immense popularity, facilitating seamless collaboration and communication. However, the open-ended and persistent nature of whiteboard data exposes privacy vulnerabilities. In this paper, we investigate potential health attribute inference attacks that leverage drawings to infer sensitive user information without consent. We develop a local differentially private algorithm that perturbs drawings by spatially deforming them, providing provable privacy guarantees. Our algorithm is implemented in a software tool called DP-WhiteBoard. Extensive experiments demonstrate the algorithm&#x2019;s ability to significantly reduce the accuracy of health attribute inference attacks while maintaining utility for benign recognition tasks. This work represents the first comprehensive study of emerging privacy threats in cloud-based whiteboards, proposing an scalable and adaptable solution with provable privacy guarantee. A demonstration of our work can be found at <uri>https://youtu.be/5gD1Te1Fgnw</uri>. IEEE
引用
下载
收藏
页码:1 / 13
页数:12
相关论文
共 50 条
  • [31] Designing cloud-based electronic health record system with attribute-based encryption
    Xhafa, Fatos
    Li, Jingwei
    Zhao, Gansen
    Li, Jin
    Chen, Xiaofeng
    Wong, Duncan S.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (10) : 3441 - 3458
  • [32] Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks
    Arevalo, Caridad Arroyo
    Noorbakhsh, Sayedeh Leila
    Dong, Yun
    Hong, Yuan
    Wang, Binghui
    THIRTY-EIGHTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 38 NO 10, 2024, : 10909 - 10917
  • [33] TPP: Trajectory Privacy Preservation Against Tensor Voting Based Inference Attacks
    Zhang, Xinyue
    Wang, Jingyi
    Shu, Minglei
    Wang, Yinglong
    Pan, Miao
    Han, Zhu
    IEEE ACCESS, 2018, 6 : 77975 - 77985
  • [34] Preserving Location Privacy in Location Based Services against Sybil Attacks
    Tyagi, Amit Kumar
    Sreenath, N.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 189 - 209
  • [35] A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services
    Kumar, Surendra
    Dwivedi, Mridula
    Kumar, Mohit
    Gill, Sukhpal Singh
    COMPUTER SCIENCE REVIEW, 2024, 53
  • [36] Access management and Data path prediction for securing cloud-based services and enhancing cybersecurity solutions
    Abdulkader, Omar
    Bamhdi, Alwi M.
    Thayananthan, Vijey
    Jambi, Kamal
    Al-Rami, Bandar
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (10): : 11 - 18
  • [37] An Elliptic Curve Cryptography based Encryption Scheme for Securing the Cloud against Eavesdropping Attacks
    Chhabra, Anshuman
    Arora, Shivam
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 243 - 246
  • [38] User-Level Differential Privacy against Attribute Inference Attack of Speech Emotion Recognition in Federated Learning
    Feng, Tiantian
    Peri, Raghuveer
    Narayanan, Shrikanth
    INTERSPEECH 2022, 2022, : 5055 - 5059
  • [39] Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System
    Zhang, Yudi
    Guo, Fuchun
    Susilo, Willy
    Yang, Guomin
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2420 - 2430
  • [40] Addressing Health Information Privacy with a novel Cloud-Based PHR System Architecture
    Van Gorp, Pieter
    Comuzzi, Marco
    Fialho, Andre
    Kaymak, Uzay
    PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 1841 - 1846