Achieving Highest Privacy Preservation Using Efficient Machine Learning Technique

Authors

  • Pinkal Jain, Vikas Thada, Shailesh Kumar Vyas

Keywords:

Privacy, Privacy Preservation, Data Modification, Machine Learning, Gradient descent, Multi Party Privacy

Abstract

Data privacy has become a paramount concern in big data, prompting the development of encryption algorithms and security strategies to safeguard sensitive information. Centralized machine learning approaches often involve transferring data to a central point to train models, which poses a risk of data exposure because unauthorized persons can disclose our private data publicly. To address this issue, multi-party privacy protection combined with machine learning offers a solution, with machine learning emerging as a way to ensure privacy in multi-party settings. This paper presents EPFML (Efficient Privacy Framework Using Machine Learning) that employs data modification. The algorithm enables joint model training while maintaining multi-party security. We use gradient descent with encrypted data transmission, preventing data exposure during the process. To counter member inference attacks, we employ data modification on the data, ensuring data privacy. Our approach demonstrates applicability across various domains, offering a privacy-protected multi-party machine learning framework. Experimental results indicate the efficiency and accuracy of our method, paving the way for enhanced data security and privacy in multi-party learning environments.

Downloads

Download data is not yet available.

References

Ning, Z., Dong, P., Wang, X., Hu, X., Guo, L., Hu, B., Guo, Y., Qiu, T., & Kwok, R. (2020). Mobile edge computing enabled 5g health monitoring for internet of medical things: A decentralized game theoretic approach. IEEE Journal on Selected Areas in Communications, 39, 463–478.

Liao, H., Zhou, Z., Zhao, X., Zhang, L., Mumtaz, S., Jolfaei, A., Ahmed, S. H., & Bashir, A. K. (2020). Learning-based context-aware resource allocation for edge-computing-empowered industrial IoT. IEEE Internet of Things Journal, 7(5), 4260–4277.

Petropoulos, A., Sikeridis, D., & Antonakopoulos, T. (2020). Wearable smart health advisors: An imuenabled posture monitor. IEEE Consumer Electronics Magazine.

Rahmani, A. M., Gia, T. N., Negash, B., Anzanpour, A., Azimi, I., Jiang, M., & Liljeberg, P. (2018). Exploiting smart e-health gateways at the edge of healthcare internet-of-things: A fog computing approach. Future Generation Computer Systems, 78, 641–658.

Tuli, S., Tuli, S., Wander, G., Wander, P., Gill, S. S., Dustdar, S., et al. (2020). Next generation technologies for smart healthcare: challenges, vision, model, trends and future directions. Internet Technology Letters, 3(2), e145.

Ud Din, I., Guizani, M., Hassan, S., Kim, B., Khurram Khan, M., Atiquzzaman, M., & Ahmed, S. H. (2019). The internet of things: A review of enabled technologies and future challenges. IEEE Access, 7, 7606–7640.

Gill, S. S., Xu, M., Ottaviani, C., Patros, P., Bahsoon, R., Shaghaghi, R., et al. (2022). AI for next generation computing: Emerging trends and future directions. Internet of Things, 19, 100514.

Tariq, N., Asim, M., Al-Obeidat, F., Zubair Farooqi, M., Baker, T., Hammoudeh, M., & Ghafr, I. (2019). The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors, 19(8), 1788.

Moqurrab, S. A., Anjum, A., Manzoor, U., Nefti, S., Ahmad, N., & Ur Rehman Malik, S. (2017). Differential average diversity: An efcient privacy mechanism for electronic health records. Journal of Medical Imaging and Health Informatics, 7(6), 1177–1187.

Li, J., Sun, A., Han, J., & Li, C. (2020). A survey on deep learning for named entity recognition. IEEE Transactions on Knowledge and Data Engineering

Moqurrab, A., Ayub, U., Anjum, A., Asghar, S., & Srivastava, G. (2021). An accurate deep learning model for clinical entity recognition from clinical notes. IEEE Journal of Biomedical and Health Informatics.

Ma, J., Huang, X., Mu, Y., & Deng, R. H. (2020). Authenticated data redaction with accountability and transparency. IEEE Transactions on Dependable and Secure Computing.

Tariq, N., Khan, F. A., & Asim, M. (2021). Security challenges and requirements for smart internet of things applications: A comprehensive analysis. Procedia Computer Science, 191, 425–430.

Tariq, N., Asim, M., Khan, F. A., Baker, T., Khalid, U., & Derhab, A. (2021). A blockchain-based multi-mobile code-driven trust mechanism for detecting internal attacks in internet of things. Sensors, 21(1), 23.

Shukla, S., Thakur, S., Hussain, S., Breslin, J. G., & Jameel, S. M. (2021). Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model. Internet of Things, 15, 100422.

Buyya, R. H., Calheiros, R. N., & Dastjerdi, A. V. (2016). Big Data: Principles and Paradigms. Morgan Kaufmann.

Iwendi, C., Moqurrab, S. A., Anjum, A., Khan, S., Mohan, S., & Srivastava, G. (2020). N-sanitization: A semantic privacy-preserving framework for unstructured medical datasets. Computer Communications.

Habibi, M., Weber, L., Neves, M., Wiegandt, D. L., & Leser, U. (2017). Deep learning with word embeddings improves biomedical named entity recognition. Bioinformatics, 33(14), i37–i48.

Unanue, I. J., Borzeshi, E. Z., & Piccardi, M. (2017). Recurrent neural networks with specialized word embeddings for health-domain named-entity recognition. Journal of Biomedical Informatics, 76, 102–109.

Zhu, H., Paschalidis, I. C., & Tahmasebi, A. (2018). Clinical concept extraction with contextual word embedding. arXiv preprint arXiv:1810.10566.

Si, Y., Wang, J., Xu, H., & Roberts, K. (2019). Enhancing clinical concept extraction with contextual embeddings. Journal of the American Medical Informatics Association, 26(11), 1297–1304.

Lee, J., Yoon, W., Kim, S., Kim, D., Kim, S., So, C. H., & Kang, J. (2020). Biobert: A pre-trained biomedical language representation model for biomedical text mining. Bioinformatics, 36(4), 1234–1240.

Batet, M., & Sánchez, D. (2014). Privacy protection of textual medical documents. In: IEEE Network Operations and Management Symposium (NOMS). IEEE, pp. 1–6.

Sanchez, D., & Batet, M. (2017). Toward sensitive document release with privacy guarantees. Engineering Applications of Artificial Intelligence, 59, 23–34.

Batet, M., & Sánchez, D. (2019). Leveraging synonymy and polysemy to improve semantic similarity assessments based on intrinsic information content. Artificial Intelligence Review, 53, 2023–2041.

Downloads

Published

16.03.2024

How to Cite

Vikas Thada, Shailesh Kumar Vyas, P. J. (2024). Achieving Highest Privacy Preservation Using Efficient Machine Learning Technique. International Journal of Intelligent Systems and Applications in Engineering, 12(3), 1272–1280. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5434

Issue

Section

Research Article