论文标题

关于侧面信息对智能电表隐私保护方法的影响

On the Impact of Side Information on Smart Meter Privacy-Preserving Methods

论文作者

Shateri, Mohammadhadi, Messina, Francisco, Piantanida, Pablo, Labeau, Fabrice

论文摘要

智能电表(SMS)可能会对消费者构成隐私威胁,这一问题近年来受到了极大的关注。本文研究了侧信息(SI)对SMS基于基于失真的实时隐私算法的性能的影响。特别是,我们考虑了一个深层的对抗学习框架,其中所需的版本(经常性神经网络)通过与对手网络作斗争直到融合而受到训练。为了定义损失函数,考虑了两种不同的方法:因果对抗学习(CAL)和有向信息(DI)学习。这些方法之间的主要区别在于如何在培训过程中测量隐私项。一方面,通过从私人变量的实际值获得监督和对手性能的反馈,试图最大程度地减少对手logikelihienhienhieny,从而使cal方法中的发行器进行了监督。另一方面,DI方法中的发行器完全依赖于从对手那里收到的反馈,并进行了优化以最大化其不确定性。考虑到具有访问SI的攻击者(例如,一周的一天)试图从发布的SMS数据中推断出占用状态的攻击者,使用现实世界中的SMS数据进行经验评估这两种算法的性能。结果表明,尽管当攻击者不利用SI时,它们的性能类似,但通常,Cal方法对包含Si的敏感性不太敏感。但是,在这两种情况下,隐私水平都受到显着影响,尤其是在包括多个SI来源的情况下。

Smart meters (SMs) can pose privacy threats for consumers, an issue that has received significant attention in recent years. This paper studies the impact of Side Information (SI) on the performance of distortion-based real-time privacy-preserving algorithms for SMs. In particular, we consider a deep adversarial learning framework, in which the desired releaser (a recurrent neural network) is trained by fighting against an adversary network until convergence. To define the loss functions, two different approaches are considered: the Causal Adversarial Learning (CAL) and the Directed Information (DI)-based learning. The main difference between these approaches is in how the privacy term is measured during the training process. On the one hand, the releaser in the CAL method, by getting supervision from the actual values of the private variables and feedback from the adversary performance, tries to minimize the adversary log-likelihood. On the other hand, the releaser in the DI approach completely relies on the feedback received from the adversary and is optimized to maximize its uncertainty. The performance of these two algorithms is evaluated empirically using real-world SMs data, considering an attacker with access to SI (e.g., the day of the week) that tries to infer the occupancy status from the released SMs data. The results show that, although they perform similarly when the attacker does not exploit the SI, in general, the CAL method is less sensitive to the inclusion of SI. However, in both cases, privacy levels are significantly affected, particularly when multiple sources of SI are included.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源