An Attack-Defense Game-Based Reinforcement Learning Privacy-Preserving Method Against Inference Attack in Double Auction Market

被引:0
|
作者
Li, Donghe [1 ,2 ]
Hu, Chunlin [1 ]
Yang, Qingyu [3 ,4 ]
Ma, Yuhao [1 ]
Zhang, Feiye [1 ]
An, Dou [1 ,2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Automat Sci & Engn, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, MOE Key Lab Intelligent Networks & Network Secur, Xian 710049, Peoples R China
[3] Xi An Jiao Tong Univ, SKLMSE Lab, Xian 710049, Peoples R China
[4] Xi An Jiao Tong Univ, Sch Automation Sci & Engn, Xian 710049, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy; Protection; Differential privacy; Noise; Games; Reinforcement learning; Cost accounting; Automation; Training; Inference algorithms; Double auction; inference attack; differential privacy; privacy-utility trade-off; reinforcement learning; DIFFERENTIAL PRIVACY; DATA RELEASE; BLOCKCHAIN; ALGORITHM;
D O I
10.1109/TASE.2024.3496869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Auction mechanism, as a fair and efficient resource allocation method, has been widely used in varieties trading scenarios, such as advertising, crowdsensoring and spectrum. However, in addition to obtaining higher profits and satisfaction, the privacy concerns have attracted researchers' attention. In this paper, we mainly study the privacy preserving issue in the double auction market against the indirect inference attack. Most of the existing works apply differential privacy theory to defend against the inference attack, but there exists two problems. First', indistinguishability' of differential privacy (DP) cannot prevent the disclosure of continuous valuations in the auction market. Second, the privacy-utility trade-off (PUT) in differential privacy deployment has not been resolved. To this end, we proposed an attack-defense game-based reinforcement learning privacy-preserving method to provide practically privacy protection in double auction. First, the auctioneer acts as defender, adds noise to the bidders' valuations, and then acts as adversary to launch inference attack. After that the auctioneer uses the attack results and auction results as a reference to guide the next deployment. The above process can be regarded as a Markov Decision Process (MDP). The state is the valuations of each bidders under the current steps. The action is the noise added to each bidders. The reward is composed of privacy, utility and training speed, in which attack success rate and social welfare are taken as measures of privacy and utility, a delay penalty term is used to reduce the training time. Utilizing the deep deterministic policy gradient (DDPG) algorithm, we establish an actor-critic network to solve the problem of MDP. Finally, we conducted extensive evaluations to verify the performance of our proposed method. The results show that compared with other existing DP-based double auction privacy preserving mechanisms, our method can achieve better results in both privacy and utility. We can reduce the attack success rate from nearly 100% to less than 20%, and the utility deviation is less than 5%. Note to Practitioners-Privacy protection in trading markets, such as advertising, crowdsensing, and spectrum, is crucial. Traditional approaches like differential privacy have been unable to entirely guard sensitive data against inference attacks. To address this, we introduce a novel privacy-preserving mechanism for double auction markets. Our approach employs an attack-defense game model, where noise is added to bidders' valuations and then used to launch an inference attack. This process allows for the evaluation of the noise's effectiveness and iteratively refines the privacy protection method. Transformed into a reinforcement learning model and optimized through a DDPG network, our mechanism reduces computational complexity. It has been shown to significantly diminish the success rate of inference attacks, while maintaining a minimal utility deviation. Practitioners in auction-based markets can leverage our approach to enhance privacy protection without negatively impacting market performance. By integrating our mechanism into their operations, auctioneers can foster a safer and more efficient trading environment.
引用
收藏
页数:15
相关论文
共 31 条
  • [1] Double Perturbation-Based Privacy-Preserving Federated Learning against Inference Attack
    Jiang, Yongqi
    Shi, Yanhang
    Chen, Siguang
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 5451 - 5456
  • [2] Cyber Attack-Defense Game Strategy Solving Based on Reinforcement Learning and Self-play Cyber Attack-Defense Game Solver
    Zhang, Jie
    Luo, Yunfeng
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 135 - 141
  • [3] Adversarial Privacy-Preserving Graph Embedding Against Inference Attack
    Li, Kaiyang
    Luo, Guangchun
    Ye, Yang
    Li, Wei
    Ji, Shihao
    Cai, Zhipeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08) : 6904 - 6915
  • [4] Bayesian-Based Inference Attack Method and Individual Differential Privacy-Based Auction Mechanism for Double Auction Market
    Li, Donghe
    Yang, Qingyu
    Li, Chen
    An, Dou
    Shi, Yi
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2023, 20 (02) : 950 - 968
  • [5] Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing
    Ma, Xindi
    Ma, Jianfeng
    Kumari, Saru
    Wei, Fushan
    Shojafar, Mohammad
    Alazab, Mamoun
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (02)
  • [6] Analysis Method based on Rough Attack-defense Bayes Game Model
    Zhang, Kai
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 109 - 118
  • [7] PPNNI: Privacy-Preserving Neural Network Inference Against Adversarial Example Attack
    He, Guanghui
    Ren, Yanli
    He, Gang
    Feng, Guorui
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 4083 - 4096
  • [8] A Road Truncation-Based Location Privacy-Preserving Method against Side-Weight Inference Attack
    Li, Qingyuan
    Wu, Hao
    Wu, Xiang
    Zhao, Ning
    Dong, Lan
    APPLIED SCIENCES-BASEL, 2022, 12 (03):
  • [9] A method of network attack-defense game and collaborative defense decision-making based on hierarchical multi-agent reinforcement learning
    Tang, Yunlong
    Sun, Jing
    Wang, Huan
    Deng, Junyi
    Tong, Liang
    Xu, Wenhong
    COMPUTERS & SECURITY, 2024, 142
  • [10] Equilibrium of Frequency Control Ancillary Service Market Based on Attack-defense Game
    Chen C.
    Liu Y.
    Zhang K.
    Ren B.
    Wang Y.
    Dai X.
    Dianwang Jishu/Power System Technology, 2024, 48 (02): : 679 - 687