Privacy Preservation in IoT: Machine Learning Approaches by Youyang Qu & Longxiang Gao & Shui Yu & Yong Xiang
Author:Youyang Qu & Longxiang Gao & Shui Yu & Yong Xiang
Language: eng
Format: epub
ISBN: 9789811917974
Publisher: Springer Nature Singapore
Youyang Qu
Email: [email protected]
The cyber-physical social system (CPSS), as an extension of Internet of Things (IoT), maps human social interaction from cyberspace to the physical world by data sharing and posting, such as publishing spatial-temporal data, images, videos, etc. The published data contains individualâs sensitive information, and thereby leads to continues attacks on it. Nowadays, most existing research assumes that the privacy protection should be uniform that all parties share a same privacy protection level. This impractical assumption results in data degradation due to over-protection or privacy leakage due to under-protection. Therefore, we carry out a personalized privacy protection model by using generative adversarial nets (GAN) to enhance differential privacy (P-GAN), especially the protection on sensitive spatial-temporal data. In GAN-DP, we add a Differential Privacy Identifier to the classic GAN, in which there are only a Generator and a Discriminator. P-GAN is able to generate synthetic data can can best mimic the raw data while ensuring a satisfying privacy protection level. It can be told that P-GAN can optimize the trade-off between personalized privacy protection and improved data utility. At the same time, the learning process can achieve fast convergence. Moreover, the GAN-driven differentially private noise generation process decouples the correlation of the injected noise. In this way, collusion attacks, which is a leading attack in privacy-preserving domain, can be eliminated. We evaluate with experiments on real-world datasets, which show the upgradation of optimized trade-off and improved efficiency of P-GAN over existing research. The theories and experiments testify the effectiveness of P-GAN in IoT scenarios. This chapter is mainly based on our recent research on GAN-enhanced differential privacy [1â7].
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25294)
Hello! Python by Anthony Briggs(24339)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23434)
Kotlin in Action by Dmitry Jemerov(22512)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21976)
Dependency Injection in .NET by Mark Seemann(21849)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20715)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19523)
Grails in Action by Glen Smith Peter Ledbrook(18609)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17034)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15843)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13696)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11857)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10627)
Hit Refresh by Satya Nadella(9202)
The Kubernetes Operator Framework Book by Michael Dame(8570)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8414)
Robo-Advisor with Python by Aki Ranin(8361)