Abstract
The preservation of privacy during the learning phase of machine learning is challenging. There are two methods to achieve privacy-preserving machine learning: adding noise to machine-learning model parameters, which is often selected for its higher accuracy; and executing learning using noisy data, which is preferred for privacy. Recently, a Scalable Unified Privacy-preserving Machine learning framework (\(\mathsf SUPM\)) has been proposed, which controls the balance between privacy and accuracy by harmonizing the privacy mechanisms used in dimension reduction, training and testing phases. This paper proposes a novel method that allocates privacy budgets according to their effectiveness that improves the accuracy without sacrificing the number of available attributes. Our privacy budget allocation algorithm can be applied into \(\mathsf SUPM\) and improve the accuracy while keeping the privacy. We evaluate its performance using logistic regression and support vector machines as machine learning algorithms. \(\mathsf SUPM\) using our privacy budget allocation algorithm is effective in terms of accuracy and the number of available attributes. We also clarify the conditions under which our method is more effective for a given dataset.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Duchi, J.C., Jordan, E.: Local privacy and statistical minimax rates. In: 54th Annual Symposium on Foundations of Computer Science, pp. 429–438. IEEE (2013)
Feng, J., Yang, L.T., Nie, X., Gati, N.J.: Edge-cloud-aided differentially private tucker decomposition for cyber-physical-social systems. IEEE Internet Things J. 9(11), 8387–8396 (2020)
Hu, H., Salcic, Z., Sun, L., Dobbie, E.: Membership inference attacks on machine learning: a survey. ACM Comput. Surv. (CSUR) 54, 1–37 (2021)
Kairouz, P., Oh, S., Viswanath, P.: Extremal mechanisms for local differential privacy. In: Ghahramani, Z., Welling, M., Cortes, C., Lawrence, N., Weinberger, K. (eds.) Advances in Neural Information Processing Systems, vol. 27. Curran Associates, Inc. (2014)
Miyaji, A., Takahashi, T., Wang, P., Yamatsuki, T., Mimoto, T.: Privacy-preserving data analysis without trusted third party. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, pp. 710–717. IEEE (2022)
Miyaji, A., Yamatsuki, T., He, B., Yamashita, S., Mimoto, T.: Re-visited privacy-preserving machine learning. In: International Conference on Privacy, Security & Trust, PST 2023. IEEE (2023)
Pedregosa, F., et al.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12(85), 2825–2830 (2011). http://jmlr.org/papers/v12/pedregosa11a.html
Sigillito, V., Wing, S., Hutton, L., Baker, K.: Ionosphere. UCI Machine Learning Repository (1989). https://doi.org/10.24432/C5W01B
Wang, D., Xu, J.: Principal component analysis in the local differential privacy model. In: Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI 2019, pp. 4795–4801. International Joint Conferences on Artificial Intelligence Organization (2019). https://doi.org/10.24963/ijcai.2019/666
Wei, K., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454–3469 (2020)
Wolberg, W., Mangasarian, O., Street, N., Street, W.: Breast Cancer Wisconsin (Diagnostic). UCI Machine Learning Repository (1995). https://doi.org/10.24432/C5DW2B
Acknowledgements
This work is partially supported by JSPS KAKENHI Grant Number JP21H03443 and SECOM Science and Technology Foundation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
He, B., Miyaji, A. (2023). Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning. In: Athanasopoulos, E., Mennink, B. (eds) Information Security. ISC 2023. Lecture Notes in Computer Science, vol 14411. Springer, Cham. https://doi.org/10.1007/978-3-031-49187-0_3
Download citation
DOI: https://doi.org/10.1007/978-3-031-49187-0_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-49186-3
Online ISBN: 978-3-031-49187-0
eBook Packages: Computer ScienceComputer Science (R0)