GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy

被引:126
|
作者
Xu, Chugui [1 ]
Ren, Ju [1 ]
Zhang, Deyu [1 ]
Zhang, Yaoxue [1 ]
Qin, Zhan [2 ]
Ren, Kui [2 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Zhejiang Univ, Inst Cyberspace Res, Hangzhou 310058, Zhejiang, Peoples R China
基金
美国国家科学基金会;
关键词
Information leakage; generative adversarial network; deep learning; differential privacy; NOISE;
D O I
10.1109/TIFS.2019.2897874
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
By learning generative models of semantic-rich data distributions from samples, generative adversarial network (GAN) has recently attracted intensive research interests due to its excellent empirical performance as a generative model. The model is used to estimate the underlying distribution of a dataset and randomly generate realistic samples according to their estimated distribution. However, GANs can easily remember training samples due to the high model complexity of deep networks. When GANs are applied to private or sensitive data, the concentration of distribution may divulge some critical information. It consequently requires new technological advances to mitigate the information leakage under GANs. To address this issue, we propose GANobfuscator, a differentially private GAN, which can achieve differential privacy under GANs by adding carefully designed noise to gradients during the learning procedure. With GANobfuscator, analysts are able to generate an unlimited amount of synthetic data for arbitrary analysis tasks without disclosing the privacy of training data. Moreover, we theoretically prove that GANobfuscator can provide strict privacy guarantee with differential privacy. In addition, we develop a gradient-pruning strategy for GANobfuscator to improve the scalability and stability of data training. Through extensive experimental evaluation on benchmark datasets, we demonstrate that GANobfuscator can produce high-quality generated data and retain desirable utility under practical privacy budgets.
引用
收藏
页码:2358 / 2371
页数:14
相关论文
共 50 条
  • [21] Pricing GAN-based data generators under R?nyi differential privacy
    Jiang, Xikun
    Niu, Chaoyue
    Ying, Chenhao
    Wu, Fan
    Luo, Yuan
    INFORMATION SCIENCES, 2022, 602 : 57 - 74
  • [22] Robust Control Under Uncertainty via Bounded Rationality and Differential Privacy
    Pacelli, Vincent
    Majumdar, Anirudha
    2022 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA 2022), 2022, : 3467 - 3474
  • [23] Estimating Sparse Covariance Matrix Under Differential Privacy via Thresholding
    Wang, Di
    Xu, Jinhui
    He, Yang
    2019 53RD ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2019,
  • [24] Quantifying and Mitigating Cache Side Channel Leakage with Differential Set
    Ma, Cong
    Wu, Dinghao
    Tan, Gang
    Kandemir, Mahmut Taylan
    Zhang, Danfeng
    PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (OOPSLA):
  • [25] Mitigating Information Leakage in Image Representations: A Maximum Entropy Approach
    Roy, Proteek Chandan
    Boddeti, Vishnu Naresh
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 2581 - 2589
  • [26] Information Leakage Metrics for Adversaries with Incomplete Information: Binary Privacy Mechanism
    Sakib, Shahnewaz Karim
    Amariucai, George T.
    Guan, Yong
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [27] Privacy Preserving Machine Learning with Limited Information Leakage
    Tang, Wenyi
    Qin, Bo
    Zhao, Suyun
    Zhao, Boning
    Xue, Yunzhi
    Chen, Hong
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 352 - 370
  • [28] Fisher Information as a Utility Metric for Frequency Estimation under Local Differential Privacy
    Lopuhaa-Zwakenberg, Milan
    Skoric, Boris
    Li, Ninghui
    PROCEEDINGS OF THE 21ST WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY, WPES 2022, 2022, : 41 - 53
  • [29] Privacy Preserving BIRCH Algorithm under Differential Privacy
    Zhang, Yao
    Li, Shuyu
    2017 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2017), 2017, : 48 - 53
  • [30] Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning
    So, Jinhyun
    Ali, Ramy E.
    Guler, Basak
    Jiao, Jiantao
    Avestimehr, A. Salman
    THIRTY-SEVENTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 37 NO 8, 2023, : 9864 - 9873