2018 IEEE/ACM Symposium on Edge Computing (SEC) 2018
DOI: 10.1109/sec.2018.00049
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Partition: A Privacy-Preserving Framework for Deep Neural Networks in Edge Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 23 publications
(10 citation statements)
references
References 10 publications
0
10
0
Order By: Relevance
“…In this approach, data or devices that include information are partitioned into various layers where different privacy preserving techniques can be applied effectively. Chi et al [161] introduced a novel technique called privacy partitioning which composed a trusted local partition and untrusted remote partition. The proposed method targets privacy preservation of deep learning classification tasks employed in mobile offloading processes.…”
Section: Privacy Preserving Solutions 1) Task Offloading Based Solutionsmentioning
confidence: 99%
See 2 more Smart Citations
“…In this approach, data or devices that include information are partitioned into various layers where different privacy preserving techniques can be applied effectively. Chi et al [161] introduced a novel technique called privacy partitioning which composed a trusted local partition and untrusted remote partition. The proposed method targets privacy preservation of deep learning classification tasks employed in mobile offloading processes.…”
Section: Privacy Preserving Solutions 1) Task Offloading Based Solutionsmentioning
confidence: 99%
“…Under these novel regulations, any web or hosting service intended to acquire data from any individual should draw their consent before initialization. Unauthorized CMDP based scheduling algorithm is proposed for task offloading process that ensures location and usage pattern privacy with optimum power consumption [160] A deep Post-Decision State (PDS) learning method for suggesting an optimal offloading strategy to the IoT device that preserve the location privacy of the UE from cyber-eavesdropping [161] Privacy partitioning method for deep learning classifications employing bipartite topology H-IoT and Big Data [162] Employed OPP and OJP methods for aggregating Laplacian random noise to the data for mis-informing the adversary. Privacy leakage probability is minimized Service Migration [158] Chaff service based approach for confusing the eavesdropper that preserves privacy of subscribers Authentication [163] AAKA protocol for preserving user privacy from identity protection IoT data aggregation [164] Three layer privacy preserving model for IoT enabled MEC deployments that employ a crypto system with homomorphic properties Mobility [165] MEC incorporated MSS model for preserving location privacy that demonstrate operational cost efficiency Smart Grid [166] Blockchain based edge computing model for Smart Grid Networks that guarantee user identity privacy GDPR [167] GDPR initiative handling and capturing of data is considered an offence.…”
Section: ) Gdpr Legislationmentioning
confidence: 99%
See 1 more Smart Citation
“…(2) Privacy Partition. A practical method named privacy partition for privacy preservation in ML is presented in [65,66]. Privacy partition is a privacy-preservation framework for deep neural networks, and the basic structure of the framework is made up of a bipartite topology network and an interactive adversarial network [65].…”
Section: Data Obfuscationmentioning
confidence: 99%
“…e output of the last transformation in a trusted local computing context will be processed by a learning module. After that, the processed information will be the input of the first transformation layer in remote computing context [65]. Under the architecture of the edge network, privacy partition provides an optional choice to some centralized deep learning frameworks.…”
Section: Data Obfuscationmentioning
confidence: 99%