privacy and ai: contradiction or symbiosis · 7 huawei confidential anonymization /...

18
[email protected] Cyber Security and Privacy Lab, Huawei Technologies Privacy and AI: Contradiction or Symbiosis Dr. -Ing. Xuebing Zhou March 4 th 2020

Upload: others

Post on 20-Apr-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

[email protected] Security and Privacy Lab, Huawei Technologies

Privacy and AI: Contradiction or SymbiosisDr. -Ing. Xuebing Zhou

March 4th 2020

Page 2: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential2

2

AI is changing our society considerably

EthicsTrustworthy, FairnessTransparencyAccountability,Human valuePrivacyAccuracy SafetyResponsibilityExplainabilityAccuracyAuditabilityAdaptability

Page 3: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential3

3

AI is changing our society considerably

EthicsTrustworthy, FairnessTransparencyAccountability,Human value

PrivacyAccuracy SafetyResponsibilityExplainabilityAccuracyAuditabilityadaptability

Page 4: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential4

AI and Privacy

Megapixels.cc

SMART Devices Spy

Page 5: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential5

Privacy Protection and AI in Practice

Legal basis assessing personal data

• Fulfilling your transaction or service requests• Improving our products and services through

internal audits, data analysis, and researchData life

circleData

minimization

Storage limitation

Access control and monitoring

Anonymization/Pseudo-

nymization

Strong Protection of Personal Data

Inform user and leave the choice to the user

iapp.com

Page 6: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential6

6

Anonymization / Pseudonymization

Personal data

WITHIN the scope of GDPR OUT of the scope of GDPR

Anonymous data

Relating to an identified or identifiable natural person?

Pseudonymous data

yes noYes, with additional info.

High Data Utility

Low Privacy Risk

Page 7: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential7

Anonymization / Pseudonymization Techniques

Data Masking Equivalent class based Anonymization• Basic protection on data,• without consideration on

privacy risk

Masking Truncating Noise Addition

Enumeration Permutation Hashing

OffsetTokenization

IP: Masking(10.168.10.1)=10.168.**.*

MAC: hash(a0a1a2a3a4a5) = 17de9356f8ec

• De-identify data based on quantitative privacy risk assessment• Disadvantages: hard to manage dynamic changes of DB, not scalable

k-Anonymity

l-Diversity

t-Closeness

δ-Presence

Page 8: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential8

Anonymization / Pseudonymization TechniquesDifferential Privacy

Background:

QuerierAverage Salaryof 10 users?

40k

Average Salary of 11 user?

50k

100K

New User A

Observe that User A joining DB and the average salary increased. His salary is 100K

• Existing information can be combined with other background information and new sensitive information can be derived.

* Differential Privacy, C. Dwork, 2008, https://personal.utdallas.edu/~muratk/courses/privacy08f_files/differential-privacy.pdf

Page 9: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential9

Anonymization / Pseudonymization TechniquesDifferential Privacy

In 2006 Cynthia Dwork, et al. proposed differential privacy, a privacy model to measure privacy risk:

𝐷! 𝑎𝑛𝑑𝐷" 𝑑𝑖𝑓𝑓𝑒𝑟𝑠 𝑜𝑛𝑙𝑦 𝑜𝑛𝑒 𝐸𝑛𝑡𝑟𝑦

Random Function K

𝐷!

𝐷"

𝑅𝑎𝑡𝑖𝑜 𝑜𝑓 𝑑𝑖𝑠𝑡𝑟𝑖𝑏𝑢𝑡𝑎𝑡𝑖𝑜𝑛 𝑜𝑓 𝑡ℎ𝑒 𝑜𝑢𝑡𝑝𝑢𝑡 𝑏𝑜𝑢𝑛𝑑𝑒𝑑 𝑏𝑦 𝑒#

A randomized function K gives e-differential privacy if for all data sets D1 and D2 differing on at most one element, and all S ⊆ Range(K),

Pr 𝐾 𝐷! ∈ 𝑆 ≤ 𝑥 + 𝑎 " = 𝑒#×Pr{𝐾(𝐷$) ∈ 𝑆}

𝑷𝒓 𝑲 𝑫𝟏 ∈ 𝑺𝑷𝒓{𝑲(𝑫𝟐) ∈ 𝑺}

𝑆

Page 10: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential10

10

Gender Age App1 App2 App3 …

Male <30 Wechat Mail Youtube …

Female 30~60 Mail Wechat Twitter …

Male >60 WhatsApp Twitter Youtube …

… … … … … …

𝒛

Differentially-Private Gradient Descent

Gender Age App1 App2 App3 …

Femail 30~60 Mail Twitter Wechat …

Female <30 Wechat Mail Youtube …

Male <30 Twitter WhatsApp Youtube …

… … … … … …

Real Data Synthetic DataDP training of Generative

Autoencoder

Decoder

Random Latent Feature

Gaussian Distribution

⑤①

Main Steps:

①Train the generative autoencoder with real data

② Apply differential privacy during model training

③ Extract the decoder from the trained autoencoder

④ Sample random latent feature from Gaussian distribution

⑤ Feed latent features into the decoder to generate synthetic data

Dataset CategoricalDimensionality*

Domain Size

Number of Classes Accuracyreal Accuracygenerate

Accuracy Reduction

Binary10 11 258 2 95.96% 95.93% 0.03%

Binary20 21 2114 2 93.85% 93.48% 0.37%

Mushroom 23 252 2 96.51% 94.47% 2.04%

Chess 37 239 2 95.13% 91.89% 3.24%

Soybean 36 255 19 90.87% 85.76% 5.11%

Audio 70 282 24 82.30% 75.62% 6.68%

Anonymization / Pseudonymization TechniquesDifferential Privacy

ϵ =5

Page 11: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential11

Other Privacy Attacks on AI

• a person’s name or unique identifier, and wishes to produce an image of the person associated with that label (i.e., the victim). 1

• Shokri. Et. built an attack model and used Google/Amazon ML service as a blackbox. They show that machine learning models leak information about the individual data records on which they were trained. It can be a serious attack if model trained on sensitive data e.g. health data.2

Model Inversion/Reconstruction Attack Membership Attack

1Matt Fredrikson, Somesh Jha, and Thomas Ristenpart. Model inversion attacks that exploit confidence information and basic countermeasures.2R. Shokri, M. Stronati, C. Song and V. Shmatikov, "Membership Inference Attacks Against Machine Learning Models," 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, 20173https://xkcd.com/2169/

3

Page 12: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential12

Advanced Privacy Protection for AI

Training Data

Training Inference

✔✘

Page 13: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential13

Advanced Privacy Protection for AI

Training Data

Training Inference

✔✘

If both training and inference on cloud, user can expose sensitive information to the service provider

….

Page 14: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential14

Advanced Privacy Protection for AI

On the device intelligence• Inference on the device, no interaction with the service

provider, perfect privacy protection• High requirements on local processing, power

consumption, storage of large AI model• Applied model need be well trained

Inference

✔ ✘✘

Page 15: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential15

Advanced Privacy Protection for AI

Inference

Training

… …

Federated Learning• Model trained locally, only

model updates are sent to the server. Server aggregates the model updates and distributed to the clients.

• Privacy is better protected without sharing raw data with server

Reconstruction attack on model update

Page 16: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential16

Advanced Privacy Protection for AI

Inference

Training

… …

Federated Learning+ Differential Privacy• Add differentially private

noise in local training or on the model update

• Prevent that model update reveal information about the local training data

• However, it reduces the accuracy of trained model. Currently it is hard to achieve high privacy for deep learning modelDP

Page 17: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Huawei Confidential17

Privacy and AI: Contradiction or Symbiosis• We cannot gain trust on AI from user without privacy. As an organization, privacy

protection need be regulated from management, engineering and technology level.

• Privacy enhancing technologies can solve contradiction between privacy protection and AI• Pseudonymization/anonymization techniques provide essential privacy protection in

data driven business• On-device intelligence, federated learning and differential privacy together can build

a comprehensive privacy preserving solution for AI• Differential privacy is a very powerful technique and will be standard protection

mechanism for AI. However better utility with reasonable privacy protection is needed.

Page 18: Privacy and AI: Contradiction or Symbiosis · 7 Huawei Confidential Anonymization / PseudonymizationTechniques Data Masking Equivalent class based Anonymization •Basic protection

Copyright©2018 Huawei Technologies Co., Ltd.All Rights Reserved.

The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.

Bring digital to every person, home and organization for a fully connected, intelligent world.Thank you.