GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy

被引:126
|
作者
Xu, Chugui [1 ]
Ren, Ju [1 ]
Zhang, Deyu [1 ]
Zhang, Yaoxue [1 ]
Qin, Zhan [2 ]
Ren, Kui [2 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Zhejiang Univ, Inst Cyberspace Res, Hangzhou 310058, Zhejiang, Peoples R China
基金
美国国家科学基金会;
关键词
Information leakage; generative adversarial network; deep learning; differential privacy; NOISE;
D O I
10.1109/TIFS.2019.2897874
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
By learning generative models of semantic-rich data distributions from samples, generative adversarial network (GAN) has recently attracted intensive research interests due to its excellent empirical performance as a generative model. The model is used to estimate the underlying distribution of a dataset and randomly generate realistic samples according to their estimated distribution. However, GANs can easily remember training samples due to the high model complexity of deep networks. When GANs are applied to private or sensitive data, the concentration of distribution may divulge some critical information. It consequently requires new technological advances to mitigate the information leakage under GANs. To address this issue, we propose GANobfuscator, a differentially private GAN, which can achieve differential privacy under GANs by adding carefully designed noise to gradients during the learning procedure. With GANobfuscator, analysts are able to generate an unlimited amount of synthetic data for arbitrary analysis tasks without disclosing the privacy of training data. Moreover, we theoretically prove that GANobfuscator can provide strict privacy guarantee with differential privacy. In addition, we develop a gradient-pruning strategy for GANobfuscator to improve the scalability and stability of data training. Through extensive experimental evaluation on benchmark datasets, we demonstrate that GANobfuscator can produce high-quality generated data and retain desirable utility under practical privacy budgets.
引用
收藏
页码:2358 / 2371
页数:14
相关论文
共 50 条
  • [41] Mitigating information leakage during critical communication using S*FSM
    Borowczak, Mike
    Vemuri, Ranga
    IET COMPUTERS AND DIGITAL TECHNIQUES, 2019, 13 (04): : 292 - 301
  • [42] Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation
    Milburn, Alyssa
    van der Kouwe, Erik
    Giuffrida, Cristiano
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 1049 - 1065
  • [43] An Analysis Framework for Information Loss and Privacy Leakage on Android Applications
    Yeh, Kuo-Hui
    Lo, Nai-Wei
    Fan, Chuan-Yen
    2014 IEEE 3RD GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), 2014, : 216 - 218
  • [44] Granular data representation under privacy protection: Tradeoff between data utility and privacy via information granularity
    Zhang, Ge
    Zhu, Xiubin
    Yin, Li
    Pedrycz, Witold
    Li, Zhiwu
    APPLIED SOFT COMPUTING, 2022, 131
  • [45] Differential Privacy under Continual Observation
    Liang W.-J.
    Chen H.
    Wu Y.-C.
    Zhao D.
    Li C.-P.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (06): : 1761 - 1785
  • [46] Adversarial Classification Under Differential Privacy
    Giraldo, Jairo
    Cardenas, Alvaro A.
    Kantarcioglu, Murat
    Katz, Jonathan
    27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020), 2020,
  • [47] Detecting Communities under Differential Privacy
    Nguyen, Hiep H.
    Mine, Abdessamad
    Rusinowitch, Michael
    PROCEEDINGS OF THE 2016 ACM WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY (WPES'16), 2016, : 83 - 93
  • [48] CASCADING BANDIT UNDER DIFFERENTIAL PRIVACY
    Wang, Kun
    Dong, Jing
    Wang, Baoxiang
    Li, Shuai
    2022 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2022, : 4418 - 4422
  • [49] Query Evaluation under Differential Privacy
    Dong, Wei
    Yi, Ke
    SIGMOD RECORD, 2023, 52 (03) : 6 - 17
  • [50] Differential Privacy under Incalculable Sensitivity
    Mimoto, Tomoaki
    Hashimoto, Masayuki
    Yokoyama, Hiroyuki
    Nakamura, Toru
    Isohara, Takamasa
    Kojima, Ryosuke
    Hasegawa, Aki
    Okuno, Yasushi
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 27 - 31