Better accuracy with quantified privacy: representations learned via reconstructive adversarial network

01/25/2019 ∙ by Sicong Liu, et al. ∙ Rice University Xidian University 4

The remarkable success of machine learning, especially deep learning, has produced a variety of cloud-based services for mobile users. Such services require an end user to send data to the service provider, which presents a serious challenge to end-user privacy. To address this concern, prior works either add noise to the data or send features extracted from the raw data. They struggle to balance between the utility and privacy because added noise reduces utility and raw data can be reconstructed from extracted features. This work represents a methodical departure from prior works: we balance between a measure of privacy and another of utility by leveraging adversarial learning to find a sweeter tradeoff. We design an encoder that optimizes against the reconstruction error (a measure of privacy), adversarially by a Decoder, and the inference accuracy (a measure of utility) by a Classifier. The result is RAN, a novel deep model with a new training algorithm that automatically extracts features for classification that are both private and useful. It turns out that adversarially forcing the extracted features to only conveys the intended information required by classification leads to an implicit regularization leading to better classification accuracy than the original model which completely ignores privacy. Thus, we achieve better privacy with better utility, a surprising possibility in machine learning! We conducted extensive experiments on five popular datasets over four training schemes, and demonstrate the superiority of RAN compared with existing alternatives.

READ FULL TEXT VIEW PDF
POST COMMENT

Comments

There are no comments yet.

Authors

page 8

This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

1 introduction

Today’s most robust and accurate models are boosted by deep learning techniques, which benefit a lot of mobile intelligent services, such as speech-based assistant (e.g.

Siri), face recognition enabled phone-unlock (

e.g. FaceID). However, the uncontrolled submission of raw sound, image, and human activity data from mobile users to service provider has well-known privacy risks Abadi et al. (2016). black For example, the underlying correlation detection, re-identification and other malicious mining Dwork et al. (2017); Bhatia et al. (2016). Different from pinning hopes on service providers to anonymise data for privacy-preserving, we present to encode each piece of raw data in the end-user side and only send the encoded data to the service provider. And the encoded data must be both private and useful. Privacy can be quantified by the risk of sensitive raw data disclosure given the encoded data. For classification services, utility can be quantified by the inference accuracy, achieved by the service provider using a discriminative model.

Existing solutions addressing the privacy concern struggle to balance between above two seemingly conflicting objectives: privacy vs. utility. An obvious and widely practiced solution to the above problem is to transform the raw data into features and upload the features only, like Google Now GoogleNow (2018); Google Cloud Machine Learning Engine also provides API to preprocess the raw data into engineering features before uploading GoogleCloud (2018). This solution not only alleviates the privacy concern but also reduces the mobile data usage. However, it does not provide any quantifiable privacy guarantee. It is well known that we can reconstruct the raw data from the features Mahendran & Vedaldi (2015). As a result, Ossia et al. (2017) further apply dimensionality reduction and add noise to the features before sending them to the service provider, which unfortunately result in inference accuracy degradation.

Unlike previous work, we aim to systematically derive deep features for a sweeter tradeoff between

privacy and utility

using deep neural networks, by leveraging adversarial training. Our key idea is to judiciously combine generative learning, for maximizing reconstruction error, and discriminative learning, for minimizing discriminative error. Specifically, we present Reconstructive Adversarial Network (RAN), an end-to-end deep model with a new training algorithm. RAN controls two types of descent gradients, i.e., reconstruction error and discriminative error, in back-propagation process to guide the training of a feature extractor or Encoder.

black Defining the exact adversarial attacker and finding the right measurement for privacy is an open problem in itself Mendes & Vilela (2017). In this paper, we quantify Privacy using an intuitive metric, i.e., the difficulty of reconstructing raw data via a generative model, or the reconstruction error. In this case, the adversarial attacker is defined as a data reconstructor. Therefore, as shown in Figure 2, a RAN consists of three parts: a feature extractor (Encoder), a utility discriminator (Classifier), and an adversarial reconstructor (Decoder). The output of the Encoder feeds to the input of the Classifier and the Decoder. We envision the Encoder runs in mobile devices and processes raw data into features. The Classifier runs in an untrusted platform, e.g. the cloud. A malicious party can seek to reconstruct the raw data from the features using the Decoder. There is no theoretic guarantee on end-to-end training the colloborated discriminative model and generative model. Therefore, we present a novel algorithm to train the RAN via an adversarial process, i.e., training the Encoder with a Classifier first to improve intermediate features’ utility for discriminative tasks and confronting the Encoder with an adversary Decoder to enhance the features’ privacy. All three parts, Encoder, Classifier and Decoder, are iteratively trained using gradient descent. From the manifold perspective, the two separate flows across RAN’s Encoder, Decoder and Classifier, i.e., decent gradients of discrimination error and reconstruction error from the end of Classifier and Decoder in back-propagation, guide the exact model parameter updating, which can iteratively derive the privacy-specific and utility-imposed feature manifold.

Using MNIST LeCun (1998), CIFAR-10Krizhevsky et al. (2014)

, ImageNet 

Deng et al. (2009), Ubisound Sicong et al. (2017) and Har UCI (2017) benchmark datasets, we show RAN is effective in training an Encoder for end users to generate deep features that are both private and useful.

Surprisingly, we observe adversarial learned features to remove redundant information, for privacy, even surpass the accuracy of the original model. Removing redundant information enhances the generalization. See  3 and A for more details. This better generalization is as auspicious illustration that in practice, with machine learning, we can gain both utility and privacy at the same time.

In the rest of this paper, we elaborate RAN’s design in 2 and evaluate the performance of RAN in 3. We next review the related work in 4 and conclude this work in 5. We finally present the theoretic interpretation of RAN in  4.

2 Design of RAN

This section first formulates the privacy preserving problem, and then elaborates on RAN’s design.

2.1 Problem Definition of Mobile Data Privacy Preserving

Many services exist today to analyze data from end users. In this work, we do not trust service providers for the privacy of data: they could be malicious or subject to malicious exploits. For example, as shown in Fig 1, an end user takes a picture of a product and send it to a cloud-based service to find a place to purchase it, which is indeed a service Amazon provides. A lot of sensitive information could accidentally come with the picture, such as personal information and user location in the background.

Our key insight is that most services actually do not need the raw data. Therefore, the mobile user can encode raw data into features through a multi-layer Encoder (E) on the client side and only deliver features to the service provider. Such features ideally should have following two properties: Utility: contain enough essential information of raw data so that they are useful for the intended service, e.g., high accuracy for object recognition; Privacy: it is hard to recover the original information of raw data based on perturbed features through a reverse deep model Zhang et al. (2016).

Figure 1: Framework of mobile data privacy preserving. Mobile users leverage the learned Encoder to generate deep features from the raw data (i.e., ”tea bag” picture) before submit it. And the service provider use the learned Classifier based on the received deep features, to recognize the object in the picture and recommend a seller.

2.2 Utility and Privacy Metrics

In this work, we focus on classification services. Therefore, utility is quantified as the inference accuracy of a discriminative model, employed by the service provider. blackSince defining the exact adversarial attacker and finding the right measurement for privacy is an open problem in itself Mendes & Vilela (2017), this paper quantifies privacy by an intuitive metric, i.e., the reconstruction error in a reversed deep model, , employed by a malicious party. The reconstruction error measures the risk of original data disclosure. Since the Encoder is distributed to mobile users, we assume it is available to both service providers and potential attackers. That is, both the service provider and the malicious party can train their models using raw data and their corresponding Encoder output. As such we can restate the desirable properties for the Encoder output as:

(1)

where,

denotes the correct inference probability,

i.e., accuracy, in the classification service with the testing data . and is the inference class and the true label, respectively. is the Euclidean distance, i.e., reconstruction error, between the raw data and the mimic data reconstructed by a malicious party with the Encoder output.

The first objective (Utility) is well-understood for discriminative learning. It can be achieved via a standard optimization process, i.e., minimizing the cross entropy between the predicted label and ground truth in a supervised manner Kruse et al. (2013). The inner part of the second objective, , is also well-understood for generative learning. On the other hand, the outer part is the opposite, i.e., maximizing the reconstruction error. Therefore, the Encoder and the reverse deep model employed by the malicious party () are adversarial to each other in their optimization objectives.

Achieving above two objectives at the same time is challenging, since utility, i.e., maximized accuracy, and privacy, i.e., maximized reconstruction error, are conflicting objectives to the feature extractor, i.e., Encoder. When improving Utility, the Encoder must extract features to represent the relevant essence of data; when improving Privacy, the Encoder can discard the utility-relevant essence of the data. If not done properly, the Encoder output optimized for Utility leads to effective data reconstruction by a reverse model and therefore poor Privacy Rifai et al. (2011).

2.3 Architecture of RAN

To tackle above challenges, we present RAN to train a feature extractor, i.e., Encoder, with good trade-offs between privacy and utility. As shown in Fig 2, RAN employ two additional neural network modules, Decoder () and Classifier (), to train the Encoder (). The Classifier simulates the intended classification service; when RAN is trained by the service provider, the Classifier can be the same discriminative model eventually used. The Decoder simulates a malicious attacker that attempts to reconstruct the raw data from the Encoder output. All the three modules are end-to-end trained to establish the Encoder (E) for end-users to extract deep features from raw data . The training is an iterative process that will be elaborated in §2.4. Below we first introduce RAN’s neural network architecture, along with some empirically gained design insights.

Figure 2: Architecture of reconstructive adversarial network (RAN).
  • [leftmargin=*]

  • The Encoder (E)

    consists of an input layer, multiple convolutional layers, pooling layers, and batch-normalization layers. We note that the clever usage of pooling layers and batch-normalization layers contribute to deep feature’s utility and privacy. The batch-normalization layer helps the features’ utility because it normalize the activation to avoid being too high or too low thus has an regularization affect 

    Ioffe & Szegedy (2015)

    . It contributes to features’ privacy as well since it is hard for Decoder to recover detail information from normalized features. And then, the max-pooling layer is helpful to enhance feature’s privacy, because none of un-pooling techniques can recover fine details from size-reduced features through shifting small parts to precisely arrange them into a larger meaningful structure 

    Milletari et al. (2016).

  • The Decoder (D) is a usual Encoder turned upside down, composed of multiple un-pooling layers Mahendran & Vedaldi (2015) and deconvolutional layers Zeiler et al. (2010). We note that the use of Decoder in training Encoder is to simulate a malicious party. After obtaining a (binary) version of the Encoder, a malicious party is free to explore any neural architectures to reconstruct the raw data. blackIn this paper, we choose a worst possible Decoder, i.e., an exactly layer-to-layer reversed architecture to mirror the Encoder. That is, we assume a powerful adversarial Decoder that knows the Encoder’s operations and connections in training. We also note that the architecture and training algorithm of RAN can easily incorporate other architectures as the Decoder.

  • the Classifier (C)

    builds a multi-layer perceptron (MLP) to process deep features and output inference results with several full-connected layers 

    Kruse et al. (2013). As we noted for the Decoder above, a service provider can explore any neural architectures for its discriminative model, given the Encoder. The reason we choose this specific architecture to train the Encoder is because some of the most successful CNN architectures, e.g. VGG and AlexNet, which can be viewed as as the Encoder plus the Classifier of our choice.

2.4 Training Algorithm of RAN

Input: Dataset
Output: RAN’s Weights
1 Initialize , , ;
2 for epochs do
3       Sample mini-batch of samples from ;
4       for  steps do
5             Update and by gradient ascent with learning rate : minimize ;
6             Update by gradient ascent with learning rate : minimize ;
7            
8       end for
9      Update and by gradient ascent with learning rate : minimize ;
10      
11 end for
black*Note: and are two important hyper-parameters
Algorithm 1 Mini-batch stochastic training of reconstructive adversarial network (RAN)

Our goal with RAN is to train an Encoder that can produce output that is both useful, i.e., leading to high inference accuracy when used for classification tasks, and private, i.e., leading to high reconstructive error when reverse engineered by an attacker. As we noted in §2.1, these two objectives can be competing when taken naively. The key idea of RAN’s training algorithm is to train the Encoder along with the Classifier and the Decoder, which simulate the service provider and a malicious attacker, respectively. Given a training dataset of pairs of I, the raw data, and Y, the true label, we train a RAN through an iterative process with three stages:

  1. Discriminative training maximizes the accuracy in Classifier; mathematically, it minimizes the cross entropy between predicted class and true label :

    (2)
  2. Generative training minimizes the reconstructive error by the Decoder:

    (3)
  3. Adversarial training finds a tradeoff point between utility and privacy:

    (4)

    It is essentially a Lagrangian function of the objectives of the first two stages. is the Lagrange multiplier that can be used to balance between utility and privacy.

Algorithm 1 summarizes the three-stage training algorithm. And we leverage mini-batch techniques to balance the training robustness and efficiency (line 3) Li et al. (2014). Within each epoch, we first perform the discrminative and generative stages (line 5, 6) to initialize model weights. And then, we perform the adversarial stage (line 8) to seek a balance between utility and privacy. We note that in line 4 is a hyper-parameter of first two stages. These steps followed by a single iteration of the third stage is trying to synchronize the convergence speed of these three training stages well, borrowing existing techniques in generative adversarial network Goodfellow et al. (2014). Our implementation uses an overall optimized value, , blackthrough comparing several discrete options. And we leverage the AdamOptimizer Kingma & Ba (2014) with an adaptive learning rate for all three stages (line 5, 6 and 8).

3 Evaluation

In this section, we first compare RAN’s performance on privacy-utility tradeoff with three baselines and then visualize the utility and privacy of resulting Encoder output.

Evaluation tasks and models. We evaluate RAN, especially the resulting Encoder, with five popular classification services. Specifically, RAN is evaluated for hand-written digit recognition (: MNIST  LeCun (1998)), image classification (: CIFAR-10 Krizhevsky et al. (2014), : ImageNet Deng et al. (2009)), acoustic event sensing (: UbiSound Sicong et al. (2017)), and the accelerometer and gyroscope data based human activity recognition (: Har UCI (2017)). blackAccording to the sample size, the LeNet is selected as the neural architectures of RAN’s Encoder plus Classifier for , and , while AlexNet and VGG-16 are chosen for and , respectively. To assume a powerful adversary that knows the Encoder in the training, the RAN’s Decoder exactly mirrors its Encoder for each task in the training.

3.1 Utility vs. Privacy Tradeoffs

This experiment illustrates the superiority of RAN compared with three state-of-the-art data privacy preserving baselines. It does so with five tasks (). However, due to space limit we do not show the results for CIFAR-10 because they are similar to those for ImageNet.

  • [leftmargin=*]

  • Noisy Data (Noisy) method blackperturbs the raw data, through adding random Laplace noise to the raw data and then submit the noisy data to the service provider. This is a typical local differential privacy method He & Cai (2017); Dwork et al. (2010). The utility of noisy data is the inference accuracy in a standard deep model, and its privacy is evaluated by the information loss metric, i.e., .

  • DNN method blackencodes the raw data into deep features, using a DNN based encoder (e.g. the convolutional and pooling layers of LeNet, AlexNet, VGG), and only deliver deep features to the service provider GoogleCloud (2018); GoogleNow (2018). Its privacy is tested by the reconstruction error in a Deconvolutional model (mirrors of the encoder), and the the accuracy evaluates the utility in a DNN based classifier (e.g. the fully-connected layers of LeNet, AlexNet, VGG).

  • DNN(resized)

    method further perturbs above deep features through principal components analysis and Laplace noise injection, and then deliver the perturbed deep features to the service provider 

    Ossia et al. (2017). Its privacy and utility are also tested by the deep model based decoder and classifier, same with that in the DNN baseline.

  • RAN blackautomatically transform the raw data into features, i.e., Encoder output, and then deliver them to the service provider. The privacy of RAN’s Encoder output is tested by the reconstruction error in a separately trained decoder, which is taught based on the binary version (input and output) of the trained RAN’s Encoder, to simulate a malicious attacker. And its utility is tested by the inference accuracy in RAN’s Classifier.

black The DNN method provides a high utility standard, and the Noisy and DNN(resized) methods set a strict benchmark for RAN.

(a) Digit(MNIST)
(b) Image(ImageNet)
(c) Sound(UbiSound)
(d) Activity (Har)
Figure 3: Performance comparison of RAN with three baselines on four datasets (MNIST, ImageNet, UbiSound and Har). Y-axis is the test reconstruction error, normalized by operation. And X-axis represents the utility (accuracy).

black Figure 3 summarises the Pareto front of the testing privacy-utility tradeoff by using three baselines and RAN. In this thread of experiments, we inject various noise factor into each piece of testing data to test the trained Noisy and DNN(resized) baselines, which are both noise related methods. And we test RAN models which are trained under several settings of the Lagrange multiplier in Eq.4, to recover its tradeoff trends. First, we see RAN’s Encoder output achieves the most stable privacy-utility tradeoff with a constrictive range, compared to those encoded by other three baselines. Second, RAN’s Encoder output achieves the best overall utility than other three baselines. Specifically, RAN’s output privacy (utility) is on MNIST, Ubisound and Har, on ImageNet, and on CIFAR-10, with the proper setups, which is even larger than that of the original deep model (see DNN baseline). While the accuracy in Noisy and DNN(resized) baselines is unstable, ranging from to . Third, RAN’s output can attain the higher privacy than usual deep features in a traditional DNN, and guarantee competitive privacy compared to others. Moreover, the RAN’s privacy quantified by RAN’s Decoder (the green dashed line in Figure 3) is averagely larger than that measured by a third-party Decoder (green triangles in Figure 3) which is trained given the binary version of RAN’s Encoder.

Summary. black Overall, RAN outperforms other three baselines to attain a better privacy-utility tradeoff over five recognition tasks. Second, the features derived by the proposed learning algorithm to remove redundant (sensitive) information, for privacy, even surpass the accuracy of the original model. We refer readers to  4 for how and why it works from a theoretical perspective. We also note that the regularization parameter

in RAN can be further systematically fine-tuned, e.g., exponentially varied using reinforcement learning, so that discovers a better privacy-utility tradeoff.

Figure 4: 3D visualization of the highly separable features learned by standard DNN and RAN’s Encoder output in the feature space. Different color in each figure standards for one class.
Figure 5: Zoom in on two categories, i.e., sailboat and car in the feature space.
Figure 6: From left to right: raw image from ImageNet (Raw), image with Laplace noise (Noisy), images reconstructed from DNN’s features, resized DNN’s features, and RAN’s Encoder output.

3.2 Utility Visualization of RAN’s Encoder output

black To illustrate the utility of RAN’s Encoder output, we visualize how the distribution of RAN’s Encoder output varies from traditional Depp features. First, as shown in Figure 4, RAN’s Encoder output are highly separable, in the feature space, similar to the deep features from traditional DNN. It reflects the utility for subsequent classification. Second, to zoom in on two categories of images for more details in Figure 5, we see that RAN pushes the features towards the constrictive space dominant dominated by the data without redundant information, i.e., ”sailboat without water” and ”car without road”. While the traditional DNN may capture the background ”water” and ”road” information to help the classification of ”sailboat” and ”car”.

Summary. blackFirst, RAN’s Encoder output is highly separable in feature space as standard DNN do, which indicates the high utility for the subsequent classification tasks. Second, the learning algorithm on RAN pushes features towards essential information and away from redundant background (sensitive) information (see more interpretations in   4).

3.3 Visualizing of RAN’s Privacy

In this experiment, we visualize the privacy of RAN’s Encoder output, i.e. private features, in comparison to other approaches, using two example images from ImageNet. Figure 6 illustrates the pixel image of the raw data, the noisy data, the mimic data reconstructed from DNN’s deep feature, and mimic data reconstructed from RAN’s private features from two ”bus” images from ImageNet datasets. We can find that the image reconstructed by RAN’s Decoder are dramatically corrupted and hard to distinguish the exact information of raw images. As mentioned in 3.1, the RAN’s Decoder is more potent than a separately trained Decoder on reconstructing RAN’s hidden features.

Summary. First, the corrupted reconstructed images by RAN certify the improved privacy of RAN’s Encoder output. Second, the reconstructed images from DNN’s features recover both object (bus) and background (road) information, while RAN’s Encoder tries to contain object information and remove background information. And then RAN leads better privacy and utility (generalization) to its hidden features. More interpretation is in  4.

4 Manifold Based Interpretation

We resort to the manifold perspective of the deep model. It is common in literature to assume that the high-dimensional raw data lies on a lower dimensional manifold, refers to latent variables Chien & Chen (2016). A DNN can also be viewed as a parametric manifold learner utilizing the nonlinear mapping with multi-layer architecture and connection weights.

We decompose the input data into two orthogonal lower dimensional manifolds:

(5)

Here, the component is the ideal manifold component that is both necessary and sufficient for object detection. Thus, ideally, we want our training algorithm to rely on this information for object detection solely. Formally, for the discriminative classifier, this implies that . And the other manifold component , orthogonal to , may or may not contain information for the object class, but it is dispensable for object detection. In practice, the real data does have redundant correlations. Thus may be learned for object detection, but unnecessary. However, revealing is likely to contain sensitive information thus hurt the privacy. If we assume that there does exist a sweet-spot trade-off between utility and privacy, that we hope to find, then it must be the case that is not sensitive (as it is necessary and sufficient).

The features learned by standard deep learning algorithms to minimize the training error based on information from , will mostly likely overlap (non-zero projection) with both and . And the overlap with compromises the privacy (as evident from our experiments). Apart from privacy, the redundant correlation in is also likely only be spurious in training data. Thus, merely minimizing training loss can lead to over-fitting.

This is where we can shoot two stones via an adversarial process. In RAN, the Encoder is trained by utility-specified discriminative learning objective (Eq.(2)) and privacy-imposed adversarial learning objective (Eq.(4)), to find features as shown in Figure 7. The manifold formulated by parametric Encoder is forced by discriminative learning objective (Eq.(2)), just like the traditional approach, to contain information from both as well as . However, the adversarial training objective (Eq(4)) will push features away (or orthogonal) from . In this way, we get privacy as well, since as a function of which has two manifolds, being orthogonal to forces it to only depend on .

Figure 7: A new manifold pushed by RAN to form the feature extractor, i.e., Encoder, for utility and privacy. The utility-specified discriminative learning objective (Eq.(2)) push it to contain and , and the privacy-imposed adversarial training objective (Eq(4)) pushes it away from sensitive component .

Meanwhile, from a generalization perspective, in the training data, the spurious information from that might over-fit the training data is iteratively removed by the adversarial training objective (Eq.(4)) automatically leading to enhanced generalization. For example, as shown in Figure 6, if we want to discriminate between ”bus” and ”sailboat”, the ”road” in the picture can help, but it is obviously a bad way of classifying and may not generalize if the test image contains ”bus” without the ”road”. However, ”road” maybe most of the background and retain some information to ease image reconstruction, which is unintended. Adding noise will obfuscate both ”road” and ”bus”, compromising object detection at the cost of privacy. The RAN, instead, will only obfuscate ”road”, making reconstruction impossible without compromising the utility. In fact, RAN will get increased utility due to better generalization.

This is an auspicious illustration that in machine learning we can gain both utility and privacy in practice. A rigorous formalism and study of this phenomena could be an independent field in itself.

5 Related Work

Our work is closely related to the following categories of research.

Privacy Preserving for Mobile Data:   Unlike the typical privacy preserving techniques which are adopted by data collectors (service providers) to release data for public data mining, RAN keeps the raw data under end-user’s control, i.e., the the user submits private features only, rather than raw data, to service providers. For example, randomized noise addition He & Cai (2017) and Differential privacy Dwork et al. (2014); Abadi et al. (2016) techniques have been widely used by service providers to anonymize/remove personally identifiable information or only releases statistical information to publicly release datasets. RAN outperforms Noisy data (a differential privacy method) with better classification utility and competitive privacy ( 3.1), because RAN’s Encoder is end-to-end trained with collaborative utility-specified deep learning and privacy-imposed adversarial learning for a good trade-off between features’ utility and privacy.

Privacy Preserving with Deep Learning:   Generally, prior works adopt two classes of approaches to protect end-user’s raw data: the end user modifies raw data before delivering them to service providers Ossia et al. (2017) or multiple end users cooperate to learn a global data mining results, without revealing their individual raw data Li et al. (2017). However, these segmented systematic methods inevitably incur utility drops in subsequent recognition tasks. We has compared RAN with resized noisy deep features according to Ossia et al. (2017) (§3.1), and concluded RAN achieves a better utility against altering raw data into resized deep features. This is because RAN’s Encoder is also trained along with a accuracy discriminator (Classifier) to guarantee utility.

Deep Feature Learning Techniques:   In order to generate special features to facilitate the subsequent classification utility and protect raw data’s sensitive information from recovering by generative models, RAN is the first to present an end-to-end deep architecture to sidestep the black-box of collaborative discriminative and generative learning via an end-to-end adversarial process. Today’s extensions of discriminative models, generative models, or both, have been studied to seek latent feature variables, which contributes to inference accuracy but incurs easy data reconstruction by reverse techniques Radford et al. (2015); Zhong et al. (2016)

. And some components used in existing generative models, such as sensitivity penalty in contractive autoencoder 

Rifai et al. (2011)

, data probability distribution in generative adversarial network 

Goodfellow et al. (2014) and KL divergence in variational autoencoder Doersch (2016), can be further integrated into RAN’s framework to define and enhance application-based privacy.

6 Conclusion

This paper presents to establish a deep model for mobile data contributor, i.e., mobile users, to encode the raw data into perturbed features before delivering it to the data collector or miner, i.e., service provider. To realize it, we present RAN, a novel deep model for private and useful feature transforming. RAN is the first to not only maximize feature’s classification accuracy but also maximize its reconstruction error via an end-to-end adversarial training process. In particular, RAN consists an Encoder for feature extracting, a Decoder for data reconstruction error (privacy) quantification from Encoder output and a Classifier for accuracy (utility) discrimination. The proposed training algorithm upon RAN’s contains three phase: discriminative learning function on Encoder and Classifier to boost their discriminative abilities, a generative stage on Decoder to improve its data generative capacity which stand in the position of Encoder’s adversary, and an adversarial stage on Encoder, Classifier and Decoder to achieve our design objectives. Evaluations on five widely used datasets show that RAN’s Encoder output attains a notable privacy-utility tradeoff. In the future, we plan to investigate finer-grained manifold learning techniques on RAN for feature generalization and privacy improvements.

A few aspects of RAN do invite further research. blackFirst, the RAN framework and the training algorithm can accommodate different choices of privacy quantification, especially application-specific ones. For example, we could measure the privacy by the hidden failure, i.e., the ratio between the background patterns that were discovered based on RAN’s Encoder output, and the sensitive patterns founded from the raw data, in an object recognition task. Second, the training of two adversaries in RAN’s, i.e., Encoder and Decoder, must be synchronized well to avoid model degradation. It is because of the convergence diversity of Encoder and Decoder. Therefore, some more efforts are needed in RAN, e.g. setting proper iteration steps and learning rate.

References

  • Abadi et al. (2016) Martin Abadi, Andy Chu, Ian Goodfellow, H Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. Deep learning with differential privacy. In Proceedings of SIGSAC, pp. 308–318. 2016.
  • Bhatia et al. (2016) Jaspreet Bhatia, Travis D Breaux, Liora Friedberg, Hanan Hibshi, and Daniel Smullen. Privacy risk in cybersecurity data sharing. In Workshop on ISCS, pp. 57–64. ACM, 2016.
  • Chien & Chen (2016) Jen-Tzung Chien and Ching-Huai Chen. Deep discriminative manifold learning. In Proceeding of ICASSP, pp. 2672–2676. 2016.
  • Deng et al. (2009) Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet: A large-scale hierarchical image database. In Proceedings of CVPR. 2009.
  • Doersch (2016) Carl Doersch. Tutorial on variational autoencoders. arXiv preprint arXiv:1606.05908, 2016.
  • Dwork et al. (2010) Cynthia Dwork, Moni Naor, Toniann Pitassi, and Guy N Rothblum. Differential privacy under continual observation. In Proceedings of STC, pp. 715–724. ACM, 2010.
  • Dwork et al. (2014) Cynthia Dwork, Aaron Roth, et al. The algorithmic foundations of differential privacy. Journal of Foundations and Trends in Theoretical Computer Science, pp. 211–407, 2014.
  • Dwork et al. (2017) Cynthia Dwork, Adam Smith, Thomas Steinke, and Jonathan Ullman. Exposed! a survey of attacks on private data. Annual Review of Statistics and Its Application, 4:61–84, 2017.
  • Goodfellow et al. (2014) Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In Advances in neural information processing systems, pp. 2672–2680. 2014.
  • GoogleCloud (2018) GoogleCloud. Data preparation. https://cloud.google.com/ml-engine/docs/tensorflow/data-prep, 2018.
  • GoogleNow (2018) GoogleNow. Google now launcher. https://en.wikipedia.org/wiki/Google_Now, 2018.
  • He & Cai (2017) Jianping He and Lin Cai. Differential private noise adding mechanism: Basic conditions and its application. In American Control Conference (ACC), 2017, pp. 1673–1678. IEEE, 2017.
  • Ioffe & Szegedy (2015) Sergey Ioffe and Christian Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167, 2015.
  • Kingma & Ba (2014) Diederik P Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014.
  • Krizhevsky et al. (2014) Alex Krizhevsky, Nair Vinod, and Hinton Geoffrey. The cifar-10 dataset. https://goo.gl/hXmru5, 2014.
  • Kruse et al. (2013) Rudolf Kruse, Christian Borgelt, Frank Klawonn, Christian Moewes, Matthias Steinbrecher, and Pascal Held. Multi-layer perceptrons. pp. 47–81. Springer, 2013.
  • LeCun (1998) Yann LeCun.

    The mnist database of handwritten digits.

    https://goo.gl/t6gTEy, 1998.
  • Li et al. (2014) Mu Li, Tong Zhang, Yuqiang Chen, and Alexander J Smola. Efficient mini-batch training for stochastic optimization. In Proceedings of SIGKDD, pp. 661–670. ACM, 2014.
  • Li et al. (2017) Ping Li, Jin Li, Zhengan Huang, Tong Li, Chong-Zhi Gao, Siu-Ming Yiu, and Kai Chen. Multi-key privacy-preserving deep learning in cloud computing. Future Generation Computer Systems, pp. 76–85, 2017.
  • Mahendran & Vedaldi (2015) Aravindh Mahendran and Andrea Vedaldi. Understanding deep image representations by inverting them. In Proceedings of CVPR, pp. 5188–5196. 2015.
  • Mendes & Vilela (2017) Ricardo Mendes and João P Vilela. Privacy-preserving data mining: methods, metrics, and applications. IEEE Access, 5:10562–10582, 2017.
  • Milletari et al. (2016) Fausto Milletari, Nassir Navab, and Seyed-Ahmad Ahmadi.

    V-net: Fully convolutional neural networks for volumetric medical image segmentation.

    In Proceedings of 3DV, pp. 565–571. 2016.
  • Ossia et al. (2017) Seyed Ali Ossia, Ali Shahin Shamsabadi, Ali Taheri, Hamid R Rabiee, Nic Lane, and Hamed Haddadi. A hybrid deep learning architecture for privacy-preserving mobile analytics. arXiv preprint arXiv:1703.02952, 2017.
  • Radford et al. (2015) Alec Radford, Luke Metz, and Soumith Chintala. Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434, 2015.
  • Rifai et al. (2011) Salah Rifai, Pascal Vincent, Xavier Muller, Xavier Glorot, and Yoshua Bengio. Contractive auto-encoders: Explicit invariance during feature extraction. In Proceedings ICML, pp. 833–840. 2011.
  • Sicong et al. (2017) Liu Sicong, Zhou Zimu, Du Junzhao, Shangguan Longfei, Jun Han, and Xin Wang. Ubiear: Bringing location-independent sound awareness to the hard-of-hearing people with smartphones. Journal of IMWUT, 2017.
  • UCI (2017) UCI. Har: Dataset for human activity recognition. https://goo.gl/m5bRo1, 2017.
  • Zeiler et al. (2010) Matthew D Zeiler, Dilip Krishnan, Graham W Taylor, and Rob Fergus. Deconvolutional networks. 2010.
  • Zhang et al. (2016) Qingchen Zhang, Laurence T Yang, and Zhikui Chen. Privacy preserving deep computation model on cloud for big data feature learning. IEEE Transactions on Computers, 65(5), 2016.
  • Zhong et al. (2016) Guoqiang Zhong, Li-Na Wang, Xiao Ling, and Junyu Dong. An overview on data representation learning: From traditional feature learning to recent deep learning.

    Journal of Finance and Data Science

    , pp. 265–278, 2016.