An Attack-Defense Game-Based Reinforcement Learning Privacy-Preserving Method Against Inference Attack in Double Auction Market

被引:0
|
作者
Li, Donghe [1 ,2 ]
Hu, Chunlin [1 ]
Yang, Qingyu [3 ,4 ]
Ma, Yuhao [1 ]
Zhang, Feiye [1 ]
An, Dou [1 ,2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Automat Sci & Engn, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, MOE Key Lab Intelligent Networks & Network Secur, Xian 710049, Peoples R China
[3] Xi An Jiao Tong Univ, SKLMSE Lab, Xian 710049, Peoples R China
[4] Xi An Jiao Tong Univ, Sch Automation Sci & Engn, Xian 710049, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy; Protection; Differential privacy; Noise; Games; Reinforcement learning; Cost accounting; Automation; Training; Inference algorithms; Double auction; inference attack; differential privacy; privacy-utility trade-off; reinforcement learning; DIFFERENTIAL PRIVACY; DATA RELEASE; BLOCKCHAIN; ALGORITHM;
D O I
10.1109/TASE.2024.3496869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Auction mechanism, as a fair and efficient resource allocation method, has been widely used in varieties trading scenarios, such as advertising, crowdsensoring and spectrum. However, in addition to obtaining higher profits and satisfaction, the privacy concerns have attracted researchers' attention. In this paper, we mainly study the privacy preserving issue in the double auction market against the indirect inference attack. Most of the existing works apply differential privacy theory to defend against the inference attack, but there exists two problems. First', indistinguishability' of differential privacy (DP) cannot prevent the disclosure of continuous valuations in the auction market. Second, the privacy-utility trade-off (PUT) in differential privacy deployment has not been resolved. To this end, we proposed an attack-defense game-based reinforcement learning privacy-preserving method to provide practically privacy protection in double auction. First, the auctioneer acts as defender, adds noise to the bidders' valuations, and then acts as adversary to launch inference attack. After that the auctioneer uses the attack results and auction results as a reference to guide the next deployment. The above process can be regarded as a Markov Decision Process (MDP). The state is the valuations of each bidders under the current steps. The action is the noise added to each bidders. The reward is composed of privacy, utility and training speed, in which attack success rate and social welfare are taken as measures of privacy and utility, a delay penalty term is used to reduce the training time. Utilizing the deep deterministic policy gradient (DDPG) algorithm, we establish an actor-critic network to solve the problem of MDP. Finally, we conducted extensive evaluations to verify the performance of our proposed method. The results show that compared with other existing DP-based double auction privacy preserving mechanisms, our method can achieve better results in both privacy and utility. We can reduce the attack success rate from nearly 100% to less than 20%, and the utility deviation is less than 5%. Note to Practitioners-Privacy protection in trading markets, such as advertising, crowdsensing, and spectrum, is crucial. Traditional approaches like differential privacy have been unable to entirely guard sensitive data against inference attacks. To address this, we introduce a novel privacy-preserving mechanism for double auction markets. Our approach employs an attack-defense game model, where noise is added to bidders' valuations and then used to launch an inference attack. This process allows for the evaluation of the noise's effectiveness and iteratively refines the privacy protection method. Transformed into a reinforcement learning model and optimized through a DDPG network, our mechanism reduces computational complexity. It has been shown to significantly diminish the success rate of inference attacks, while maintaining a minimal utility deviation. Practitioners in auction-based markets can leverage our approach to enhance privacy protection without negatively impacting market performance. By integrating our mechanism into their operations, auctioneers can foster a safer and more efficient trading environment.
引用
收藏
页数:15
相关论文
共 31 条
  • [11] BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack
    Ren, Yanli
    Hu, Mingqi
    Yang, Zhe
    Feng, Guorui
    Zhang, Xinpeng
    INFORMATION SCIENCES, 2024, 665
  • [12] BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack
    Ren, Yanli
    Hu, Mingqi
    Yang, Zhe
    Feng, Guorui
    Zhang, Xinpeng
    Information Sciences, 2024, 665
  • [13] Cross the Chasm: Scalable Privacy-Preserving Federated Learning against Poisoning Attack
    Li, Yiran
    Hu, Guiqiang
    Liu, Xiaoyuan
    Ying, Zuobin
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [14] Empirical study of privacy inference attack against deep reinforcement learning models
    Zhou, Huaicheng
    Mo, Kanghua
    Huang, Teng
    Li, Yongjin
    CONNECTION SCIENCE, 2023, 35 (01)
  • [15] Cyberspace attack and defense game based on reward randomization reinforcement learning
    Zhang, Lei
    Li, Hongmei
    Pan, Yu
    Zheng, Qibin
    Li, Wei
    Liu, Yi
    ARRAY, 2022, 16
  • [16] RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack
    Miao, Yinbin
    Yan, Xinru
    Li, Xinghua
    Xu, Shujiang
    Liu, Ximeng
    Li, Hongwei
    Deng, Robert H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5814 - 5827
  • [17] Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms
    Mao, Yunlong
    Dang, Ziqin
    Wang, Heng
    Zhang, Yuan
    Zhong, Sheng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4684 - 4698
  • [18] Membership inference attack and defense method in federated learning based on GAN
    Zhang J.
    Zhu C.
    Sun X.
    Chen B.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (05): : 193 - 205
  • [19] Reinforcement-learning-based dynamic defense strategy of multistage game against dynamic load altering attack
    Guo, Youqi
    Wang, Lingfeng
    Liu, Zhaoxi
    Shen, Yitong
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2021, 131 (131)
  • [20] PROFL: A Privacy-Preserving Federated Learning Method with Stringent Defense Against Poisoning Attacks
    Zhong, Yisheng
    Wang, Li-Ping
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 260 - 265