Privacy Leakage in GAN Enabled Load Profile Synthesis

被引:1
|
作者
Huang, Jiaqi
Wu, Chenye [1 ]
机构
[1] Chinese Univ Hong Kong, Sch Sci & Engn, Shenzhen 518172, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy; Data Synthesis; GAN; Differential Privacy; Load Profiling;
D O I
10.1109/iSPEC54162.2022.10033029
中图分类号
TE [石油、天然气工业]; TK [能源与动力工程];
学科分类号
0807 ; 0820 ;
摘要
Load profile synthesis is a commonly used technique for preserving smart meter data privacy. Recent efforts have successfully integrated advanced generative models, such as the Generative Adversarial Networks (GAN), to synthesize highquality load profiles. Such methods are becoming increasingly popular for conducting privacy-preserving load data analytics. It is commonly believed that performing analyses on synthetic data can ensure certain privacy. In this paper, we examine this common belief. Specifically, we reveal the privacy leakage issue in load profile synthesis enabled by GAN. We first point out that the synthesis process cannot provide any provable privacy guarantee, highlighting that directly conducting load data analytics based on such data is extremely dangerous. The sample re-appearance risk is then presented under different volumes of training data, which indicates that the original load data could be directly leaked by GAN without any intentional effort from adversaries. Furthermore, we discuss potential approaches that might address this privacy leakage issue.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] InGaN/GaN microdisks enabled by nanoporous GaN cladding
    Yuan, Ge
    Zhang, Cheng
    Xiong, Kanglin
    Han, Jung
    OPTICS LETTERS, 2018, 43 (22) : 5567 - 5570
  • [22] On Privacy Leakage through Silence Suppression
    Zhu, Ye
    INFORMATION SECURITY, 2011, 6531 : 276 - 282
  • [23] PRIVACY LEAKAGE IN HEALTH SOCIAL NETWORKS
    Al Faresi, Ahmed
    Alazzawe, Ahmed
    Alazzawe, Anis
    COMPUTATIONAL INTELLIGENCE, 2014, 30 (03) : 514 - 534
  • [24] Privacy leakage on the Web: Diffusion and countermeasures
    Malandrino, Delfina
    Scarano, Vittorio
    COMPUTER NETWORKS, 2013, 57 (14) : 2833 - 2855
  • [25] Privacy Leakage Avoidance with Switching Ensembles
    Izmailov, Rauf
    Lin, Peter
    Mesterharm, Chris
    Basu, Samyadeep
    2021 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2021), 2021,
  • [26] Quantifying Privacy Leakage in Graph Embedding
    Duddu, Vasisht
    Boutet, Antoine
    Shejwalkar, Virat
    PROCEEDINGS OF THE 17TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2020), 2021, : 76 - 85
  • [27] Broadcast Channels With Privacy Leakage Constraints
    Goldfeld, Ziv
    Kramer, Gerhard
    Permuter, Haim H.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (08) : 5138 - 5161
  • [28] PDroid: Detecting Privacy Leakage on Android
    Zhang, Pu-han
    Li, Jing-zhe
    Shao, Shuai
    Wang, Peng
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 2658 - 2662
  • [29] Survey: Leakage and Privacy at Inference Time
    Jegorova, Marija
    Kaul, Chaitanya
    Mayor, Charlie
    O'Neil, Alison Q.
    Weir, Alexander
    Murray-Smith, Roderick
    Tsaftaris, Sotirios A.
    IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 45 (07) : 9090 - 9108
  • [30] Privacy Leakage in Biometric Secrecy Systems
    Ignatenko, Tanya
    Willems, Frans M. J.
    2008 46TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, VOLS 1-3, 2008, : 850 - 857