Skip to main content

Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning

  • Conference paper
  • First Online:
Information Security (ISC 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14411))

Included in the following conference series:

  • 323 Accesses

Abstract

The preservation of privacy during the learning phase of machine learning is challenging. There are two methods to achieve privacy-preserving machine learning: adding noise to machine-learning model parameters, which is often selected for its higher accuracy; and executing learning using noisy data, which is preferred for privacy. Recently, a Scalable Unified Privacy-preserving Machine learning framework (\(\mathsf SUPM\)) has been proposed, which controls the balance between privacy and accuracy by harmonizing the privacy mechanisms used in dimension reduction, training and testing phases. This paper proposes a novel method that allocates privacy budgets according to their effectiveness that improves the accuracy without sacrificing the number of available attributes. Our privacy budget allocation algorithm can be applied into \(\mathsf SUPM\) and improve the accuracy while keeping the privacy. We evaluate its performance using logistic regression and support vector machines as machine learning algorithms. \(\mathsf SUPM\) using our privacy budget allocation algorithm is effective in terms of accuracy and the number of available attributes. We also clarify the conditions under which our method is more effective for a given dataset.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Duchi, J.C., Jordan, E.: Local privacy and statistical minimax rates. In: 54th Annual Symposium on Foundations of Computer Science, pp. 429–438. IEEE (2013)

    Google Scholar 

  2. Feng, J., Yang, L.T., Nie, X., Gati, N.J.: Edge-cloud-aided differentially private tucker decomposition for cyber-physical-social systems. IEEE Internet Things J. 9(11), 8387–8396 (2020)

    Article  Google Scholar 

  3. Hu, H., Salcic, Z., Sun, L., Dobbie, E.: Membership inference attacks on machine learning: a survey. ACM Comput. Surv. (CSUR) 54, 1–37 (2021)

    Google Scholar 

  4. Kairouz, P., Oh, S., Viswanath, P.: Extremal mechanisms for local differential privacy. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N., Weinberger, K. (eds.) Advances in Neural Information Processing Systems, vol. 27. Curran Associates, Inc. (2014)

    Google Scholar 

  5. Miyaji, A., Takahashi, T., Wang, P., Yamatsuki, T., Mimoto, T.: Privacy-preserving data analysis without trusted third party. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, pp. 710–717. IEEE (2022)

    Google Scholar 

  6. Miyaji, A., Yamatsuki, T., He, B., Yamashita, S., Mimoto, T.: Re-visited privacy-preserving machine learning. In: International Conference on Privacy, Security & Trust, PST 2023. IEEE (2023)

    Google Scholar 

  7. Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12(85), 2825–2830 (2011). http://jmlr.org/papers/v12/pedregosa11a.html

  8. Sigillito, V., Wing, S., Hutton, L., Baker, K.: Ionosphere. UCI Machine Learning Repository (1989). https://doi.org/10.24432/C5W01B

  9. Wang, D., Xu, J.: Principal component analysis in the local differential privacy model. In: Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI 2019, pp. 4795–4801. International Joint Conferences on Artificial Intelligence Organization (2019). https://doi.org/10.24963/ijcai.2019/666

  10. Wei, K., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454–3469 (2020)

    Article  Google Scholar 

  11. Wolberg, W., Mangasarian, O., Street, N., Street, W.: Breast Cancer Wisconsin (Diagnostic). UCI Machine Learning Repository (1995). https://doi.org/10.24432/C5DW2B

Download references

Acknowledgements

This work is partially supported by JSPS KAKENHI Grant Number JP21H03443 and SECOM Science and Technology Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bingchang He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

He, B., Miyaji, A. (2023). Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning. In: Athanasopoulos, E., Mennink, B. (eds) Information Security. ISC 2023. Lecture Notes in Computer Science, vol 14411. Springer, Cham. https://doi.org/10.1007/978-3-031-49187-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-49187-0_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-49186-3

  • Online ISBN: 978-3-031-49187-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics