Differential Privacy with Selected Privacy Budget $$\epsilon $$ in a Cyber Physical System Using Machine Learning | SpringerLink
Skip to main content

Differential Privacy with Selected Privacy Budget \(\epsilon \) in a Cyber Physical System Using Machine Learning

  • Conference paper
  • First Online:
Applied Cryptography and Network Security Workshops (ACNS 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14587))

Included in the following conference series:

  • 270 Accesses

Abstract

In contemporary data management practices, the adoption of Differential Privacy has emerged as a prevailing trend, offering an effective means to thwart an escalating array of query attacks. However, the implementation of Differential Privacy (DP) poses a nuanced challenge in determining the optimal privacy budget denoted by \(\epsilon \). A small \(\epsilon \) imparts formidable privacy fortification to the dataset, albeit rendering it scarcely utilizable and thus prone to abandonment due to severely compromised data utility. Conversely, an excessively large \(\epsilon \) renders the dataset amenable for use, albeit at the cost of heightened susceptibility to privacy breaches via rudimentary attacks. Against this backdrop, the pivotal task becomes the judicious selection of an appropriate privacy budget value, one that harmonizes the imperatives of robust privacy protection and substantive data utility. This study endeavors to leverage the stochastic gradient descent (SGD) algorithm as a strategic approach to navigate this problem, aspiring to yield optimal resolutions to the presented challenge. A case study on real-world CPS testbed SWaT is conducted to demonstrate the feasibility of DP-enabled data privacy in time series data in a Historian server.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 7549
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 9437
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Ahmed, C.M., Murguia, C., Ruths, J.: Model-based attack detection scheme for smart water distribution networks. In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ASIA CCS 2017, pp. 101–113. Association for Computing Machinery, New York (2017)

    Google Scholar 

  2. Ahmed, C.M., Kandasamy, N.K.: A comprehensive dataset from a smart grid testbed for machine learning based CPS security research. In: Abie, H., et al. (eds.) CPS4CIP 2020. LNCS, vol. 12618, pp. 123–135. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-69781-5_9

    Chapter  Google Scholar 

  3. Greer, C., Burns, M., Wollman, D., Griffor, E.: Cyber-physical systems and Internet of Things (2019)

    Google Scholar 

  4. Lee, E.: The past, present and future of cyber-physical systems: a focus on models. Sensors (Basel, Switzerland) 15, 4837–4869 (2015)

    Article  Google Scholar 

  5. Ahmed, C.M., Zhou, J.: Challenges and opportunities in cyberphysical systems security: a physics-based perspective. IEEE Secur. Privacy 18(6), 14–22 (2020)

    Article  Google Scholar 

  6. Ahmed, C.M., Gauthama Raman, M.R., Mathur, A.P.: Challenges in machine learning based approaches for real-time anomaly detection in industrial control systems. In: Proceedings of the 6th ACM on Cyber-Physical System Security Workshop, CPSS 2020, pp. 23–29. Association for Computing Machinery, New York (2020)

    Google Scholar 

  7. Shah, R., Ahmed, C.M., Nagaraja, S.: Can you still see me?: identifying robot operations over end-to-end encrypted channels. In: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2022, pp. 298–300. Association for Computing Machinery, New York (2022)

    Google Scholar 

  8. Bhattacharjee, A., Badsha, S., Hossain, Md.T., Konstantinou, C., Liang, X.: Vulnerability characterization and privacy quantification for cyber-physical systems. In: 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), pp. 217–223 (2021)

    Google Scholar 

  9. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1

    Chapter  Google Scholar 

  10. Vujovic, Z.: Classification model evaluation metrics. Int. J. Adv. Comput. Sci. Appl. 12(599–606), 07 (2021)

    Google Scholar 

  11. Liu, J., Hu, Y., Guo, X., Liang, T., Jin, W.: Differential privacy performance evaluation under the condition of non-uniform noise distribution. J. Inf. Secur. Appl. 71, 103366 (2022)

    Google Scholar 

  12. Zhu, T., Li, G., Zhou, W., Yu, P.S.: Preliminary of differential privacy. In: Zhu, T., Li, G., Zhou, W., Yu, P.S. (eds.) Differential Privacy and Applications. AIS, vol. 69, pp. 7–16. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-62004-6_2

    Chapter  Google Scholar 

  13. Beimel, A., Nissim, K., Stemmer, U.: Private learning and sanitization: pure vs. approximate differential privacy. In: Raghavendra, P., Raskhodnikova, S., Jansen, K., Rolim, J.D.P. (eds.) APPROX/RANDOM 2013. LNCS, vol. 8096, pp. 363–378. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40328-6_26

    Chapter  Google Scholar 

  14. Duchi, J.C., Jordan, M.I., Wainwright, M.J.: Local privacy and statistical minimax rates. In: 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton), p. 1592 (2013)

    Google Scholar 

  15. Erlingsson, Ú., Pihur, V., Korolova, A.: Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 1054–1067. Association for Computing Machinery, New York (2014)

    Google Scholar 

  16. Bebensee, B.: Local differential privacy: a tutorial (2019)

    Google Scholar 

  17. Bernau, D., Robl, J., Grassal, P.W., Schneider, S., Kerschbaum, F.: Comparing local and central differential privacy using membership inference attacks. In: Barker, K., Ghazinour, K. (eds.) DBSec 2021. LNCS, vol. 12840, pp. 22–42. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-81242-3_2

    Chapter  Google Scholar 

  18. Naseri, M., Hayes, J., De Cristofaro, E.: Local and central differential privacy for robustness and privacy in federated learning (2022)

    Google Scholar 

  19. Krall, A., Finke, D., Yang, H.: Gradient mechanism to preserve differential privacy and deter against model inversion attacks in healthcare analytics. In: 2020 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC), pp. 5714–5717 (2020)

    Google Scholar 

  20. Song, S., Chaudhuri, K., Sarwate, A.D.: Stochastic gradient descent with differentially private updates. In: 2013 IEEE Global Conference on Signal and Information Processing, pp. 245–248 (2013)

    Google Scholar 

  21. Lee, J., Clifton, C.: How much is enough? Choosing \(\epsilon \) for differential privacy. In: Lai, X., Zhou, J., Li, H. (eds.) ISC 2011. LNCS, vol. 7001, pp. 325–340. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24861-0_22

    Chapter  Google Scholar 

  22. Kingma, D.P., Ba, J.: Adam: a method for stochastic optimization. arXiv preprint arXiv:1412.6980 (2014)

  23. Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 308–318. Association for Computing Machinery, New York (2016)

    Google Scholar 

  24. Wagner, I., Eckhoff, D.: Technical privacy metrics: a systematic survey. ACM Comput. Surv. 51(3) (2018)

    Google Scholar 

  25. Lan, Y., Liu, S.-P., Lin, L., Ma, Y.-Y.: Effectiveness evaluation on cyberspace security defense system. In: 2015 International Conference on Network and Information Systems for Computers, pp. 576–579 (2015)

    Google Scholar 

  26. Ahmed, C.M., et al.: Noiseprint: attack detection using sensor and process noise fingerprint in cyber physical systems. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, ASIACCS 2018, pp. 483–497. Association for Computing Machinery, New York (2018)

    Google Scholar 

  27. Rosenblatt, L., Allen, J., Stoyanovich, J.: Spending privacy budget fairly and wisely (2022)

    Google Scholar 

  28. Shen, X., Fu, X., Zhou, C.: A combined algorithm for cleaning abnormal data of wind turbine power curve based on change point grouping algorithm and quartile algorithm. IEEE Trans. Sustain. Energy 10, 46–54 (2018)

    Article  Google Scholar 

  29. Ahmed, C.M., Palleti, V.R., Mathur, A.P.: Wadi: a water distribution testbed for research in the design of secure cyber physical systems. In: Proceedings of the 3rd International Workshop on Cyber-Physical Systems for Smart Water Networks, CySWATER 2017, pp. 25–28. Association for Computing Machinery, New York (2017)

    Google Scholar 

  30. Zhao, Y., et al.: Local differential privacy-based federated learning for Internet of Things. IEEE Internet Things J. 8(11), 8836–8853 (2021)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ruilin Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, R., Ahmed, C.M. (2024). Differential Privacy with Selected Privacy Budget \(\epsilon \) in a Cyber Physical System Using Machine Learning. In: Andreoni, M. (eds) Applied Cryptography and Network Security Workshops. ACNS 2024. Lecture Notes in Computer Science, vol 14587. Springer, Cham. https://doi.org/10.1007/978-3-031-61489-7_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-61489-7_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-61488-0

  • Online ISBN: 978-3-031-61489-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics