Abstract
In contemporary data management practices, the adoption of Differential Privacy has emerged as a prevailing trend, offering an effective means to thwart an escalating array of query attacks. However, the implementation of Differential Privacy (DP) poses a nuanced challenge in determining the optimal privacy budget denoted by \(\epsilon \). A small \(\epsilon \) imparts formidable privacy fortification to the dataset, albeit rendering it scarcely utilizable and thus prone to abandonment due to severely compromised data utility. Conversely, an excessively large \(\epsilon \) renders the dataset amenable for use, albeit at the cost of heightened susceptibility to privacy breaches via rudimentary attacks. Against this backdrop, the pivotal task becomes the judicious selection of an appropriate privacy budget value, one that harmonizes the imperatives of robust privacy protection and substantive data utility. This study endeavors to leverage the stochastic gradient descent (SGD) algorithm as a strategic approach to navigate this problem, aspiring to yield optimal resolutions to the presented challenge. A case study on real-world CPS testbed SWaT is conducted to demonstrate the feasibility of DP-enabled data privacy in time series data in a Historian server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ahmed, C.M., Murguia, C., Ruths, J.: Model-based attack detection scheme for smart water distribution networks. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS 2017, pp. 101–113. Association for Computing Machinery, New York (2017)
Ahmed, C.M., Kandasamy, N.K.: A comprehensive dataset from a smart grid testbed for machine learning based CPS security research. In: Abie, H., et al. (eds.) CPS4CIP 2020. LNCS, vol. 12618, pp. 123–135. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-69781-5_9
Greer, C., Burns, M., Wollman, D., Griffor, E.: Cyber-physical systems and Internet of Things (2019)
Lee, E.: The past, present and future of cyber-physical systems: a focus on models. Sensors (Basel, Switzerland) 15, 4837–4869 (2015)
Ahmed, C.M., Zhou, J.: Challenges and opportunities in cyberphysical systems security: a physics-based perspective. IEEE Secur. Privacy 18(6), 14–22 (2020)
Ahmed, C.M., Gauthama Raman, M.R., Mathur, A.P.: Challenges in machine learning based approaches for real-time anomaly detection in industrial control systems. In: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, CPSS 2020, pp. 23–29. Association for Computing Machinery, New York (2020)
Shah, R., Ahmed, C.M., Nagaraja, S.: Can you still see me?: identifying robot operations over end-to-end encrypted channels. In: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2022, pp. 298–300. Association for Computing Machinery, New York (2022)
Bhattacharjee, A., Badsha, S., Hossain, Md.T., Konstantinou, C., Liang, X.: Vulnerability characterization and privacy quantification for cyber-physical systems. In: 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), pp. 217–223 (2021)
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1
Vujovic, Z.: Classification model evaluation metrics. Int. J. Adv. Comput. Sci. Appl. 12(599–606), 07 (2021)
Liu, J., Hu, Y., Guo, X., Liang, T., Jin, W.: Differential privacy performance evaluation under the condition of non-uniform noise distribution. J. Inf. Secur. Appl. 71, 103366 (2022)
Zhu, T., Li, G., Zhou, W., Yu, P.S.: Preliminary of differential privacy. In: Zhu, T., Li, G., Zhou, W., Yu, P.S. (eds.) Differential Privacy and Applications. AIS, vol. 69, pp. 7–16. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-62004-6_2
Beimel, A., Nissim, K., Stemmer, U.: Private learning and sanitization: pure vs. approximate differential privacy. In: Raghavendra, P., Raskhodnikova, S., Jansen, K., Rolim, J.D.P. (eds.) APPROX/RANDOM 2013. LNCS, vol. 8096, pp. 363–378. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40328-6_26
Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. In: 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton), p. 1592 (2013)
Erlingsson, Ú., Pihur, V., Korolova, A.: Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 1054–1067. Association for Computing Machinery, New York (2014)
Bebensee, B.: Local differential privacy: a tutorial (2019)
Bernau, D., Robl, J., Grassal, P.W., Schneider, S., Kerschbaum, F.: Comparing local and central differential privacy using membership inference attacks. In: Barker, K., Ghazinour, K. (eds.) DBSec 2021. LNCS, vol. 12840, pp. 22–42. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-81242-3_2
Naseri, M., Hayes, J., De Cristofaro, E.: Local and central differential privacy for robustness and privacy in federated learning (2022)
Krall, A., Finke, D., Yang, H.: Gradient mechanism to preserve differential privacy and deter against model inversion attacks in healthcare analytics. In: 2020 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC), pp. 5714–5717 (2020)
Song, S., Chaudhuri, K., Sarwate, A.D.: Stochastic gradient descent with differentially private updates. In: 2013 IEEE Global Conference on Signal and Information Processing, pp. 245–248 (2013)
Lee, J., Clifton, C.: How much is enough? Choosing \(\epsilon \) for differential privacy. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 325–340. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24861-0_22
Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)
Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 308–318. Association for Computing Machinery, New York (2016)
Wagner, I., Eckhoff, D.: Technical privacy metrics: a systematic survey. ACM Comput. Surv. 51(3) (2018)
Lan, Y., Liu, S.-P., Lin, L., Ma, Y.-Y.: Effectiveness evaluation on cyberspace security defense system. In: 2015 International Conference on Network and Information Systems for Computers, pp. 576–579 (2015)
Ahmed, C.M., et al.: Noiseprint: attack detection using sensor and process noise fingerprint in cyber physical systems. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, ASIACCS 2018, pp. 483–497. Association for Computing Machinery, New York (2018)
Rosenblatt, L., Allen, J., Stoyanovich, J.: Spending privacy budget fairly and wisely (2022)
Shen, X., Fu, X., Zhou, C.: A combined algorithm for cleaning abnormal data of wind turbine power curve based on change point grouping algorithm and quartile algorithm. IEEE Trans. Sustain. Energy 10, 46–54 (2018)
Ahmed, C.M., Palleti, V.R., Mathur, A.P.: Wadi: a water distribution testbed for research in the design of secure cyber physical systems. In: Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, CySWATER 2017, pp. 25–28. Association for Computing Machinery, New York (2017)
Zhao, Y., et al.: Local differential privacy-based federated learning for Internet of Things. IEEE Internet Things J. 8(11), 8836–8853 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, R., Ahmed, C.M. (2024). Differential Privacy with Selected Privacy Budget \(\epsilon \) in a Cyber Physical System Using Machine Learning. In: Andreoni, M. (eds) Applied Cryptography and Network Security Workshops. ACNS 2024. Lecture Notes in Computer Science, vol 14587. Springer, Cham. https://doi.org/10.1007/978-3-031-61489-7_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-61489-7_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-61488-0
Online ISBN: 978-3-031-61489-7
eBook Packages: Computer ScienceComputer Science (R0)