An Attack-Defense Game-Based Reinforcement Learning Privacy-Preserving Method Against Inference Attack in Double Auction Market

被引:0
|
作者
Li, Donghe [1 ,2 ]
Hu, Chunlin [1 ]
Yang, Qingyu [3 ,4 ]
Ma, Yuhao [1 ]
Zhang, Feiye [1 ]
An, Dou [1 ,2 ]
机构
[1] Xi An Jiao Tong Univ, Sch Automat Sci & Engn, Xian 710049, Peoples R China
[2] Xi An Jiao Tong Univ, MOE Key Lab Intelligent Networks & Network Secur, Xian 710049, Peoples R China
[3] Xi An Jiao Tong Univ, SKLMSE Lab, Xian 710049, Peoples R China
[4] Xi An Jiao Tong Univ, Sch Automation Sci & Engn, Xian 710049, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy; Protection; Differential privacy; Noise; Games; Reinforcement learning; Cost accounting; Automation; Training; Inference algorithms; Double auction; inference attack; differential privacy; privacy-utility trade-off; reinforcement learning; DIFFERENTIAL PRIVACY; DATA RELEASE; BLOCKCHAIN; ALGORITHM;
D O I
10.1109/TASE.2024.3496869
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Auction mechanism, as a fair and efficient resource allocation method, has been widely used in varieties trading scenarios, such as advertising, crowdsensoring and spectrum. However, in addition to obtaining higher profits and satisfaction, the privacy concerns have attracted researchers' attention. In this paper, we mainly study the privacy preserving issue in the double auction market against the indirect inference attack. Most of the existing works apply differential privacy theory to defend against the inference attack, but there exists two problems. First', indistinguishability' of differential privacy (DP) cannot prevent the disclosure of continuous valuations in the auction market. Second, the privacy-utility trade-off (PUT) in differential privacy deployment has not been resolved. To this end, we proposed an attack-defense game-based reinforcement learning privacy-preserving method to provide practically privacy protection in double auction. First, the auctioneer acts as defender, adds noise to the bidders' valuations, and then acts as adversary to launch inference attack. After that the auctioneer uses the attack results and auction results as a reference to guide the next deployment. The above process can be regarded as a Markov Decision Process (MDP). The state is the valuations of each bidders under the current steps. The action is the noise added to each bidders. The reward is composed of privacy, utility and training speed, in which attack success rate and social welfare are taken as measures of privacy and utility, a delay penalty term is used to reduce the training time. Utilizing the deep deterministic policy gradient (DDPG) algorithm, we establish an actor-critic network to solve the problem of MDP. Finally, we conducted extensive evaluations to verify the performance of our proposed method. The results show that compared with other existing DP-based double auction privacy preserving mechanisms, our method can achieve better results in both privacy and utility. We can reduce the attack success rate from nearly 100% to less than 20%, and the utility deviation is less than 5%. Note to Practitioners-Privacy protection in trading markets, such as advertising, crowdsensing, and spectrum, is crucial. Traditional approaches like differential privacy have been unable to entirely guard sensitive data against inference attacks. To address this, we introduce a novel privacy-preserving mechanism for double auction markets. Our approach employs an attack-defense game model, where noise is added to bidders' valuations and then used to launch an inference attack. This process allows for the evaluation of the noise's effectiveness and iteratively refines the privacy protection method. Transformed into a reinforcement learning model and optimized through a DDPG network, our mechanism reduces computational complexity. It has been shown to significantly diminish the success rate of inference attacks, while maintaining a minimal utility deviation. Practitioners in auction-based markets can leverage our approach to enhance privacy protection without negatively impacting market performance. By integrating our mechanism into their operations, auctioneers can foster a safer and more efficient trading environment.
引用
收藏
页数:15
相关论文
共 31 条
  • [21] Poisoning Attack Mitigation for Privacy-Preserving Federated Learning-based Energy Theft Detection
    Srewa, Mahmoud
    Winfree, Michaela F.
    Ibrahem, Mohamed I.
    Nabil, Mahmoud
    Lu, Rongxing
    Alsharif, Ahmad
    ICC 2024 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2024, : 3962 - 3968
  • [22] Multiple-Model Based Defense for Deep Reinforcement Learning Against Adversarial Attack
    Chan, Patrick P. K.
    Wang, Yaxuan
    Kees, Natasha
    Yeung, Daniel S.
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2021, PT I, 2021, 12891 : 42 - 53
  • [23] Deep reinforcement learning based multi-AUVs cooperative decision-making for attack-defense confrontation missions
    Xu, Jian
    Huang, Fei
    Wu, Di
    Cui, Yunfei
    Yan, Zheping
    Zhang, Kai
    OCEAN ENGINEERING, 2021, 239
  • [24] A Privacy-Aware and Incremental Defense Method Against GAN-Based Poisoning Attack
    Qiao, Feifei
    Li, Zhong
    Kong, Yubo
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2024, 11 (02) : 1708 - 1721
  • [25] A Bio-Inspired Decision-Making Method of UAV Swarm for Attack-Defense Confrontation via Multi-Agent Reinforcement Learning
    Chi, Pei
    Wei, Jiahong
    Wu, Kun
    Di, Bin
    Wang, Yingxun
    BIOMIMETICS, 2023, 8 (02)
  • [26] FedG2L: a privacy-preserving federated learning scheme base on "G2L" against poisoning attack
    Xu, Mengfan
    Li, Xinghua
    CONNECTION SCIENCE, 2023, 35 (01)
  • [28] A deep reinforcement learning-based method applied for solving multi-agent defense and attack problems
    Huang, Liwei
    Fu, Mingsheng
    Qu, Hong
    Wang, Siying
    Hu, Shangqian
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 176
  • [29] A Hybrid Reinforcement Learning-Based Method for Generating Privacy-Preserving Trajectories in Low-Density Traffic Environments
    Zhang, Zhixiang
    Wong, Wai-Choong
    Sikdar, Biplab
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (10) : 14740 - 14757
  • [30] Jamming attack against remote state estimation over multiple wireless channels: A reinforcement learning based game theoretical approach?
    Xue, Lei
    Ma, Bei
    Liu, Jian
    Yu, Yao
    ISA TRANSACTIONS, 2022, 130 : 1 - 9