TY - CHAP
T1 - Machine Learning Meets Data Modification
T2 - The Potential of Pre-processing for Privacy Enchancement
AU - Garofalo, Giuseppe
AU - Slokom, Manel
AU - Preuveneers, Davy
AU - Joosen, Wouter
AU - Larson, Martha
PY - 2022
Y1 - 2022
N2 - We explore how data modification can enhance privacy by examining the connection between data modification and machine learning. Specifically, machine learning “meets” data modification in two ways. First, data modification can protect the data that is used to train machine learning models focusing it on the intended use and inhibiting unwanted inference. Second, machine learning can provide new ways of creating modified data. In this chapter, we discuss data modification approaches, applied during data pre-processing, that are suited for online data sharing scenarios. Specifically, we define two scenarios “User data sharing” and “Data set sharing” and describe the threat models associated with each scenario and related privacy threats. We then survey the landscape of privacy-enhancing data modification techniques that can be used to counter these threats. The picture that emerges is that data modification approaches hold promise to enhance privacy, and can be used alongside of conventional cryptographic approaches. We close with an outlook on future directions focusing on new types of data, the relationship among privacy, and the importance of taking an interdisciplinary approach to data modification for privacy enhancement.
AB - We explore how data modification can enhance privacy by examining the connection between data modification and machine learning. Specifically, machine learning “meets” data modification in two ways. First, data modification can protect the data that is used to train machine learning models focusing it on the intended use and inhibiting unwanted inference. Second, machine learning can provide new ways of creating modified data. In this chapter, we discuss data modification approaches, applied during data pre-processing, that are suited for online data sharing scenarios. Specifically, we define two scenarios “User data sharing” and “Data set sharing” and describe the threat models associated with each scenario and related privacy threats. We then survey the landscape of privacy-enhancing data modification techniques that can be used to counter these threats. The picture that emerges is that data modification approaches hold promise to enhance privacy, and can be used alongside of conventional cryptographic approaches. We close with an outlook on future directions focusing on new types of data, the relationship among privacy, and the importance of taking an interdisciplinary approach to data modification for privacy enhancement.
UR - http://www.scopus.com/inward/record.url?scp=85128011409&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-98795-4_7
DO - 10.1007/978-3-030-98795-4_7
M3 - Chapter
SN - 9783030987947
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 130
EP - 155
BT - Security and Artificial Intelligence
A2 - Batina, Lejla
A2 - Bäck, Thomas
A2 - Buhan, Ileana
A2 - Picek, Stjepan
PB - Springer Science and Business Media Deutschland GmbH
ER -