Achieving Highest Privacy Preservation Using Efficient Machine Learning Technique
Keywords:
Privacy, Privacy Preservation, Data Modification, Machine Learning, Gradient descent, Multi Party PrivacyAbstract
Data privacy has become a paramount concern in big data, prompting the development of encryption algorithms and security strategies to safeguard sensitive information. Centralized machine learning approaches often involve transferring data to a central point to train models, which poses a risk of data exposure because unauthorized persons can disclose our private data publicly. To address this issue, multi-party privacy protection combined with machine learning offers a solution, with machine learning emerging as a way to ensure privacy in multi-party settings. This paper presents EPFML (Efficient Privacy Framework Using Machine Learning) that employs data modification. The algorithm enables joint model training while maintaining multi-party security. We use gradient descent with encrypted data transmission, preventing data exposure during the process. To counter member inference attacks, we employ data modification on the data, ensuring data privacy. Our approach demonstrates applicability across various domains, offering a privacy-protected multi-party machine learning framework. Experimental results indicate the efficiency and accuracy of our method, paving the way for enhanced data security and privacy in multi-party learning environments.
Downloads
References
Ning, Z., Dong, P., Wang, X., Hu, X., Guo, L., Hu, B., Guo, Y., Qiu, T., & Kwok, R. (2020). Mobile edge computing enabled 5g health monitoring for internet of medical things: A decentralized game theoretic approach. IEEE Journal on Selected Areas in Communications, 39, 463–478.
Liao, H., Zhou, Z., Zhao, X., Zhang, L., Mumtaz, S., Jolfaei, A., Ahmed, S. H., & Bashir, A. K. (2020). Learning-based context-aware resource allocation for edge-computing-empowered industrial IoT. IEEE Internet of Things Journal, 7(5), 4260–4277.
Petropoulos, A., Sikeridis, D., & Antonakopoulos, T. (2020). Wearable smart health advisors: An imuenabled posture monitor. IEEE Consumer Electronics Magazine.
Rahmani, A. M., Gia, T. N., Negash, B., Anzanpour, A., Azimi, I., Jiang, M., & Liljeberg, P. (2018). Exploiting smart e-health gateways at the edge of healthcare internet-of-things: A fog computing approach. Future Generation Computer Systems, 78, 641–658.
Tuli, S., Tuli, S., Wander, G., Wander, P., Gill, S. S., Dustdar, S., et al. (2020). Next generation technologies for smart healthcare: challenges, vision, model, trends and future directions. Internet Technology Letters, 3(2), e145.
Ud Din, I., Guizani, M., Hassan, S., Kim, B., Khurram Khan, M., Atiquzzaman, M., & Ahmed, S. H. (2019). The internet of things: A review of enabled technologies and future challenges. IEEE Access, 7, 7606–7640.
Gill, S. S., Xu, M., Ottaviani, C., Patros, P., Bahsoon, R., Shaghaghi, R., et al. (2022). AI for next generation computing: Emerging trends and future directions. Internet of Things, 19, 100514.
Tariq, N., Asim, M., Al-Obeidat, F., Zubair Farooqi, M., Baker, T., Hammoudeh, M., & Ghafr, I. (2019). The security of big data in fog-enabled IoT applications including blockchain: a survey. Sensors, 19(8), 1788.
Moqurrab, S. A., Anjum, A., Manzoor, U., Nefti, S., Ahmad, N., & Ur Rehman Malik, S. (2017). Differential average diversity: An efcient privacy mechanism for electronic health records. Journal of Medical Imaging and Health Informatics, 7(6), 1177–1187.
Li, J., Sun, A., Han, J., & Li, C. (2020). A survey on deep learning for named entity recognition. IEEE Transactions on Knowledge and Data Engineering
Moqurrab, A., Ayub, U., Anjum, A., Asghar, S., & Srivastava, G. (2021). An accurate deep learning model for clinical entity recognition from clinical notes. IEEE Journal of Biomedical and Health Informatics.
Ma, J., Huang, X., Mu, Y., & Deng, R. H. (2020). Authenticated data redaction with accountability and transparency. IEEE Transactions on Dependable and Secure Computing.
Tariq, N., Khan, F. A., & Asim, M. (2021). Security challenges and requirements for smart internet of things applications: A comprehensive analysis. Procedia Computer Science, 191, 425–430.
Tariq, N., Asim, M., Khan, F. A., Baker, T., Khalid, U., & Derhab, A. (2021). A blockchain-based multi-mobile code-driven trust mechanism for detecting internal attacks in internet of things. Sensors, 21(1), 23.
Shukla, S., Thakur, S., Hussain, S., Breslin, J. G., & Jameel, S. M. (2021). Identification and authentication in healthcare internet-of-things using integrated fog computing based blockchain model. Internet of Things, 15, 100422.
Buyya, R. H., Calheiros, R. N., & Dastjerdi, A. V. (2016). Big Data: Principles and Paradigms. Morgan Kaufmann.
Iwendi, C., Moqurrab, S. A., Anjum, A., Khan, S., Mohan, S., & Srivastava, G. (2020). N-sanitization: A semantic privacy-preserving framework for unstructured medical datasets. Computer Communications.
Habibi, M., Weber, L., Neves, M., Wiegandt, D. L., & Leser, U. (2017). Deep learning with word embeddings improves biomedical named entity recognition. Bioinformatics, 33(14), i37–i48.
Unanue, I. J., Borzeshi, E. Z., & Piccardi, M. (2017). Recurrent neural networks with specialized word embeddings for health-domain named-entity recognition. Journal of Biomedical Informatics, 76, 102–109.
Zhu, H., Paschalidis, I. C., & Tahmasebi, A. (2018). Clinical concept extraction with contextual word embedding. arXiv preprint arXiv:1810.10566.
Si, Y., Wang, J., Xu, H., & Roberts, K. (2019). Enhancing clinical concept extraction with contextual embeddings. Journal of the American Medical Informatics Association, 26(11), 1297–1304.
Lee, J., Yoon, W., Kim, S., Kim, D., Kim, S., So, C. H., & Kang, J. (2020). Biobert: A pre-trained biomedical language representation model for biomedical text mining. Bioinformatics, 36(4), 1234–1240.
Batet, M., & Sánchez, D. (2014). Privacy protection of textual medical documents. In: IEEE Network Operations and Management Symposium (NOMS). IEEE, pp. 1–6.
Sanchez, D., & Batet, M. (2017). Toward sensitive document release with privacy guarantees. Engineering Applications of Artificial Intelligence, 59, 23–34.
Batet, M., & Sánchez, D. (2019). Leveraging synonymy and polysemy to improve semantic similarity assessments based on intrinsic information content. Artificial Intelligence Review, 53, 2023–2041.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.