Optimization of Privacy-Utility Trade-Off for Efficient Feature Selection of Secure Internet of Things

被引:1
|
作者
Kil, Ye-Seul [1 ]
Lee, Yeon-Ji [2 ]
Jeon, So-Eun [1 ]
Oh, Ye-Sol [1 ]
Lee, Il-Gu [1 ,2 ]
机构
[1] Sungshin Womens Univ, Dept Future Convergence Technol Engn, Seoul 02844, South Korea
[2] Sungshin Womens Univ, Dept Convergence Secur Engn, Seoul 02844, South Korea
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Availability; data privacy; feature extraction; machine learning; BIG DATA;
D O I
10.1109/ACCESS.2024.3467049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
5G wireless network technology is widely used, and data protection is becoming more important as data transmitted and received over the network increases. As the number of Internet of Things devices rapidly increases, data leakage attacks targeting lightweight devices are increasing. Machine learning models have limitations in being applied to lightweight devices because of their large computational complexity and latency in the learning process. Improving utility while protecting data using existing data privacy protection techniques is difficult. Guaranteeing privacy and data utility is difficult because processing large amounts of data with low-capacity memory is complicated. Therefore, a memory-efficient mechanism is needed while ensuring privacy and data utility in data transmission conditions. We propose an optimal feature selection mechanism that maximizes privacy and utility by optimizing the privacy-utility trade-off for resource-constrained lightweight device environments. The proposed mechanism extracts privacy-sensitive features by selecting features requiring privacy protection, removing privacy-sensitive features, making it difficult for attackers to identify data even if they intercept them during data transmission. It demonstrated improved accuracy and memory usage compared to conventional models and improved the accuracy of legitimate nodes by 17.6% compared to models with differential privacy, reduced the accuracy of attackers by 15.45% compared to models without privacy protection techniques, and memory usage by 18.26% under 100% data sampling ratio conditions. Thus, it has been proven to be a secure and efficient model for data transmission environments by effectively improving data utility, privacy, and memory usage.
引用
收藏
页码:142582 / 142591
页数:10
相关论文
共 50 条
  • [1] Privacy-utility trade-off under continual observation
    Erdogdu, Murat A.
    Fawaz, Nadia
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 1801 - 1805
  • [2] Optimal Privacy-Utility Trade-off under a Rate Constraint
    Sreekumar, Sreejith
    Gunduz, Deniz
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 2159 - 2163
  • [3] Privacy-Utility Trade-off with the Stratonovich's Value of Information
    Kamatsuka, Akira
    Yoshida, Takahiro
    Matsushima, Toshiyasu
    2021 IEEE INFORMATION THEORY WORKSHOP (ITW), 2021,
  • [4] Towards Optimization of Privacy-Utility Trade-Off Using Similarity and Diversity Based Clustering
    Majeed, Abdul
    Khan, Safiullah
    Hwang, Seong Oun
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2024, 12 (01) : 368 - 385
  • [5] ACTIVE PRIVACY-UTILITY TRADE-OFF AGAINST A HYPOTHESIS TESTING ADVERSARY
    Erdemir, Ecenaz
    Dragotti, Pier Luigi
    Gunduz, Deniz
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 2660 - 2664
  • [6] On the Privacy-Utility Trade-Off in Differentially Private Hierarchical Text Classification
    Wunderlich, Dominik
    Bernau, Daniel
    Alda, Francesco
    Parra-Arnau, Javier
    Strufe, Thorsten
    APPLIED SCIENCES-BASEL, 2022, 12 (21):
  • [7] On the Privacy-Utility Trade-Off With and Without Direct Access to the Private Data
    Zamani, Amirreza
    Oechtering, Tobias J.
    Skoglund, Mikael
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (03) : 2177 - 2200
  • [8] Privacy-Utility Trade-off of k-subset Mechanism<bold> </bold>
    Zhou, Yihui
    Song, Guangchen
    Liu, Hai
    Lu, Laifeng
    2018 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2018, : 212 - 217
  • [9] A Survey on Privacy Preserving Synthetic Data Generation and a Discussion on a Privacy-Utility Trade-off Problem
    Ghatak, Debolina
    Sakurai, Kouichi
    SCIENCE OF CYBER SECURITY, SCISEC 2022 WORKSHOPS, 2022, 1680 : 167 - 180
  • [10] Communicating the Privacy-Utility Trade-off: Supporting Informed Data Donation with Privacy Decision Interfaces for Differential Privacy
    Franzen, Daniel
    Müller-Birn, Claudia
    Wegwarth, Odette
    Proceedings of the ACM on Human-Computer Interaction, 2024, 8 (CSCW1)