Information Laundering for Model Privacy

09/13/2020
by   Xinran Wang, et al.
12

In this work, we propose information laundering, a novel framework for enhancing model privacy. Unlike data privacy that concerns the protection of raw data information, model privacy aims to protect an already-learned model that is to be deployed for public use. The private model can be obtained from general learning methods, and its deployment means that it will return a deterministic or random response for a given input query. An information-laundered model consists of probabilistic components that deliberately maneuver the intended input and output for queries to the model, so the model's adversarial acquisition is less likely. Under the proposed framework, we develop an information-theoretic principle to quantify the fundamental tradeoffs between model utility and privacy leakage and derive the optimal design.

READ FULL TEXT

page 19

page 22

page 23

research
08/14/2019

Taking a Lesson from Quantum Particles for Statistical Data Privacy

Privacy is under threat from artificial intelligence revolution fueled b...
research
04/01/2019

Maximal Information Leakage based Privacy Preserving Data Disclosure Mechanisms

It is often necessary to disclose training data to the public domain, wh...
research
09/21/2022

Measuring and Controlling Split Layer Privacy Leakage Using Fisher Information

Split learning and inference propose to run training/inference of a larg...
research
07/22/2019

On the Information Privacy Model: the Group and Composition Privacy

How to query a dataset in the way of preserving the privacy of individua...
research
09/06/2023

Hide and Seek (HaS): A Lightweight Framework for Prompt Privacy Protection

Numerous companies have started offering services based on large languag...
research
12/25/2021

Defending Against Membership Inference Attacks on Beacon Services

Large genomic datasets are now created through numerous activities, incl...
research
08/30/2018

Decentralized Detection with Robust Information Privacy Protection

We consider a decentralized detection network whose aim is to infer a pu...

Please sign up or login with your details

Forgot password? Click here to reset