Towards Attack-Resilient Geometric Data Perturbation

被引:0
|
作者
Chen, Keke [1 ]
Sun, Gordon [1 ]
Liu, Ling [1 ]
机构
[1] Georgia Inst Technol, Coll Comp, Atlanta, GA 30332 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data perturbation is a popular technique for privacy-preserving data mining. The major challenge of data perturbation is balancing privacy protection and data quality, which are normally considered as a pair of contradictive factors. We propose that selectively preserving only the task/model specific information in perturbation would improve the balance. Geometric data perturbation, consisting of random rotation perturbation, random translation perturbation, and noise addition, aims at preserving the important geometric properties of a multidimensional dataset, while providing better privacy guarantee for data classification modeling. The preliminary study has shown that random geometric perturbation can well preserve model accuracy for several popular classification models, including kernel methods, linear classifiers, and SVM classifiers, while it also revealed some security concerns to random geometric perturbation. In this paper, we address some potential attacks to random geometric perturbation and design several methods to reduce the threat of these attacks. Experimental study shows that the enhanced geometric perturbation can provide satisfactory privacy guarantee while still well preserving model accuracy for the discussed data classification models.
引用
收藏
页码:78 / +
页数:2
相关论文
共 50 条
  • [1] Design and Implementation of Attack-Resilient Cyberphysical Systems WITH A FOCUS ON ATTACk-RESILIENT STATE ESTIMATORS
    Pajic, Miroslav
    Weimer, James
    Bezzo, Nicola
    Sokolsky, Oleg
    Pappas, George J.
    Lee, Insup
    [J]. IEEE CONTROL SYSTEMS MAGAZINE, 2017, 37 (02): : 66 - 81
  • [2] Attack-resilient Fusion of Sensor Data with Uncertain Delays
    Chen, Yanfeng
    Zhang, Tianyu
    Kong, Fanxin
    Zhang, Lin
    Deng, Qingxu
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2022, 21 (04)
  • [3] Attack-Resilient Sensor Fusion
    Ivanov, Radoslav
    Pajic, Miroslav
    Lee, Insup
    [J]. 2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE), 2014,
  • [4] Gametrics: Towards Attack-Resilient Behavioral Authentication with Simple Cognitive Games
    Mohamed, Manar
    Saxena, Nitesh
    [J]. 32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 277 - 288
  • [5] Recaptured attack-resilient watermarking scheme
    Mehta, Preeti
    Singh, Mahesh K.
    Singha, Nitin
    [J]. JOURNAL OF ELECTRONIC IMAGING, 2022, 31 (04)
  • [6] Attack-Resilient Temperature Sensor Design
    Kajol, Mashrafi Alam
    Yu, Qiaoyan
    [J]. 2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
  • [7] Robustness of Attack-resilient State Estimators
    Pajic, Miroslav
    Weimer, James
    Bezzo, Nicola
    Tabuada, Paulo
    Sokolsky, Oleg
    Lee, Insup
    Pappas, George J.
    [J]. 2014 ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS), 2014, : 163 - 174
  • [8] Attack-Resilient TLS Certificate Transparency
    Khan, Salabat
    Zhu, Liehuang
    Zhang, Zijian
    Rahim, Mussadiq Abdul
    Khan, Khalid
    Li, Meng
    [J]. IEEE ACCESS, 2020, 8 : 98958 - 98973
  • [9] An Attack-Resilient Architecture for the Internet of Things
    Almohri, Hussain M. J.
    Watson, Layne T.
    Evans, David
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 (3940-3954) : 3940 - 3954
  • [10] An attack-resilient Grid auditing infrastructure
    Kunz, Christopher
    Wiebelitz, Jan
    Smith, Matthew
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 635 - 639