-
OptimShare: A Unified Framework for Privacy Preserving Data Sharing -- Towards the Practical Utility of Data with Privacy
Authors:
M. A. P. Chamikara,
Seung Ick Jang,
Ian Oppermann,
Dongxi Liu,
Musotto Roberto,
Sushmita Ruj,
Arindam Pal,
Meisam Mohammady,
Seyit Camtepe,
Sylvia Young,
Chris Dorrian,
Nasir David
Abstract:
Tabular data sharing serves as a common method for data exchange. However, sharing sensitive information without adequate privacy protection can compromise individual privacy. Thus, ensuring privacy-preserving data sharing is crucial. Differential privacy (DP) is regarded as the gold standard in data privacy. Despite this, current DP methods tend to generate privacy-preserving tabular datasets tha…
▽ More
Tabular data sharing serves as a common method for data exchange. However, sharing sensitive information without adequate privacy protection can compromise individual privacy. Thus, ensuring privacy-preserving data sharing is crucial. Differential privacy (DP) is regarded as the gold standard in data privacy. Despite this, current DP methods tend to generate privacy-preserving tabular datasets that often suffer from limited practical utility due to heavy perturbation and disregard for the tables' utility dynamics. Besides, there has not been much research on selective attribute release, particularly in the context of controlled partially perturbed data sharing. This has significant implications for scenarios such as cross-agency data sharing in real-world situations. We introduce OptimShare: a utility-focused, multi-criteria solution designed to perturb input datasets selectively optimized for specific real-world applications. OptimShare combines the principles of differential privacy, fuzzy logic, and probability theory to establish an integrated tool for privacy-preserving data sharing. Empirical assessments confirm that OptimShare successfully strikes a balance between better data utility and robust privacy, effectively serving various real-world problem scenarios.
△ Less
Submitted 5 June, 2023;
originally announced June 2023.
-
White Paper on 6G Drivers and the UN SDGs
Authors:
Marja Matinmikko-Blue,
Sirpa Aalto,
Muhammad Imran Asghar,
Hendrik Berndt,
Yan Chen,
Sudhir Dixit,
Risto Jurva,
Pasi Karppinen,
Markku Kekkonen,
Marianne Kinnula,
Panagiotis Kostakos,
Johanna Lindberg,
Edward Mutafungwa,
Kirsi Ojutkangas,
Elina Rossi,
Seppo Yrjola,
Anssi Oorni,
Petri Ahokangas,
Muhammad-Zeeshan Asghar,
Fan Chen,
Netta Iivari,
Marcos Katz,
Atte Kinnula,
Josef Noll,
Harri Oinas-Kukkonen
, et al. (7 additional authors not shown)
Abstract:
The commercial launch of 6G communications systems and United Nations Sustainable Development Goals, UN SDGs, are both targeted for 2030. 6G communications is expected to boost global growth and productivity, create new business models and transform many aspects of society. The UN SDGs are a way of framing opportunities and challenges of a desirable future world and cover topics as broad as ending…
▽ More
The commercial launch of 6G communications systems and United Nations Sustainable Development Goals, UN SDGs, are both targeted for 2030. 6G communications is expected to boost global growth and productivity, create new business models and transform many aspects of society. The UN SDGs are a way of framing opportunities and challenges of a desirable future world and cover topics as broad as ending poverty, gender equality, climate change and smart cities. The relationship between these potentially mutually reinforcing forces is currently under-defined. Building on the vision for 6G, a review of megatrends, on-going activities on the relation of mobile communications to the UN SDGs and existing indicators, a novel linkage between 6G and the UN SDGs is proposed via indicators. The white paper has also launched the work of deriving new 6G related indicators to guide the research of 6G systems. The novel linkage is built on the envisaged three-fold role of 6G as a provider of services to help steer and support communities and countries towards reaching the UN SDGs, as an enabler of measuring tool for data collection to help reporting of indicators with hyperlocal granularity, and as a reinforcer of new ecosystems based on 6G technology enablers and 6G network of networks to be developed in line with the UN SDGs that incorporates future mobile communication technologies available in 2030. Related challenges are also identified. An action plan is presented along with prioritized focus areas within the mobile communication sector technology and industry evolution to best support the achievement of the UN SDGs.
△ Less
Submitted 30 April, 2020;
originally announced April 2020.
-
6G White paper: Research challenges for Trust, Security and Privacy
Authors:
Mika Ylianttila,
Raimo Kantola,
Andrei Gurtov,
Lozenzo Mucchi,
Ian Oppermann,
Zheng Yan,
Tri Hong Nguyen,
Fei Liu,
Tharaka Hewa,
Madhusanka Liyanage,
Ahmad Ijaz,
Juha Partala,
Robert Abbas,
Artur Hecker,
Sara Jayousi,
Alessio Martinelli,
Stefano Caputo,
Jonathan Bechtold,
Ivan Morales,
Andrei Stoica,
Giuseppe Abreu,
Shahriar Shahabuddin,
Erdal Panayirci,
Harald Haas,
Tanesh Kumar
, et al. (2 additional authors not shown)
Abstract:
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust: Under the current "open internet" regulation, the…
▽ More
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust: Under the current "open internet" regulation, the telco cloud can be used for trust services only equally for all users. 6G network must support embedded trust for increased level of information security in 6G. Trust modeling, trust policies and trust mechanisms need to be defined. 6G interlinks physical and digital worlds making safety dependent on information security. Therefore, we need trustworthy 6G. Security: In 6G era, the dependence of the economy and societies on IT and the networks will deepen. The role of IT and the networks in national security keeps rising - a continuation of what we see in 5G. The development towards cloud and edge native infrastructures is expected to continue in 6G networks, and we need holistic 6G network security architecture planning. Security automation opens new questions: machine learning can be used to make safer systems, but also more dangerous attacks. Physical layer security techniques can also represent efficient solutions for securing less investigated network segments as first line of defense. Privacy: There is currently no way to unambiguously determine when linked, deidentified datasets cross the threshold to become personally identifiable. Courts in different parts of the world are making decisions about whether privacy is being infringed, while companies are seeking new ways to exploit private data to create new business revenues. As solution alternatives, we may consider blockchain, distributed ledger technologies and differential privacy approaches.
△ Less
Submitted 30 April, 2020; v1 submitted 24 April, 2020;
originally announced April 2020.
-
Realistic Image Generation using Region-phrase Attention
Authors:
Wanming Huang,
Yida Xu,
Ian Oppermann
Abstract:
The Generative Adversarial Network (GAN) has recently been applied to generate synthetic images from text. Despite significant advances, most current state-of-the-art algorithms are regular-grid region based; when attention is used, it is mainly applied between individual regular-grid regions and a word. These approaches are sufficient to generate images that contain a single object in its foregro…
▽ More
The Generative Adversarial Network (GAN) has recently been applied to generate synthetic images from text. Despite significant advances, most current state-of-the-art algorithms are regular-grid region based; when attention is used, it is mainly applied between individual regular-grid regions and a word. These approaches are sufficient to generate images that contain a single object in its foreground, such as a "bird" or "flower". However, natural languages often involve complex foreground objects and the background may also constitute a variable portion of the generated image. Therefore, the regular-grid based image attention weights may not necessarily concentrate on the intended foreground region(s), which in turn, results in an unnatural looking image. Additionally, individual words such as "a", "blue" and "shirt" do not necessarily provide a full visual context unless they are applied together. For this reason, in our paper, we proposed a novel method in which we introduced an additional set of attentions between true-grid regions and word phrases. The true-grid region is derived using a set of auxiliary bounding boxes. These auxiliary bounding boxes serve as superior location indicators to where the alignment and attention should be drawn with the word phrases. Word phrases are derived from analysing Part-of-Speech (POS) results. We perform experiments on this novel network architecture using the Microsoft Common Objects in Context (MSCOCO) dataset and the model generates $256 \times 256$ conditioned on a short sentence description. Our proposed approach is capable of generating more realistic images compared with the current state-of-the-art algorithms.
△ Less
Submitted 4 February, 2019;
originally announced February 2019.