论文标题

删除推理,重建和机器(UN)学习的合规性

Deletion Inference, Reconstruction, and Compliance in Machine (Un)Learning

论文作者

Gao, Ji, Garg, Sanjam, Mahmoody, Mohammad, Vasudevan, Prashant Nalini

论文摘要

对机器学习模型的隐私攻击旨在确定用于训练此类模型的数据。传统上,此类攻击是在经过训练的静态模型上研究的,并且可以被对手访问。有动力满足新的法律要求,最近扩展了许多机器学习方法以支持机器学习,即更新模型,好像从其培训集中删除了某些示例,并满足新的法律要求。但是,在这种新环境中,隐私攻击可能会变得更具破坏性,因为攻击者现在可以在删除之前访问原始模型和删除后的新模型。实际上,删除的行为可能会使被删除的记录更容易受到隐私攻击的影响。 受到密码定义和差异隐私框架的启发,我们正式研究了机器学习的隐私含义。我们将(各种形式的)删除推理和删除重建攻击形式化,对手的目的是确定已删除的记录或重建已删除的记录(也许是一部分)。然后,我们为各种机器学习模型以及分类,回归和语言模型等成功的删除推理和重建攻击。最后,我们表明,如果该计划满足删除合规性(GARG,Goldwasser和Eurocrypt'20)的删除(GARG,Goldwasser和Vasudevan),则将被证明被证明是被排除在外的。

Privacy attacks on machine learning models aim to identify the data that is used to train such models. Such attacks, traditionally, are studied on static models that are trained once and are accessible by the adversary. Motivated to meet new legal requirements, many machine learning methods are recently extended to support machine unlearning, i.e., updating models as if certain examples are removed from their training sets, and meet new legal requirements. However, privacy attacks could potentially become more devastating in this new setting, since an attacker could now access both the original model before deletion and the new model after the deletion. In fact, the very act of deletion might make the deleted record more vulnerable to privacy attacks. Inspired by cryptographic definitions and the differential privacy framework, we formally study privacy implications of machine unlearning. We formalize (various forms of) deletion inference and deletion reconstruction attacks, in which the adversary aims to either identify which record is deleted or to reconstruct (perhaps part of) the deleted records. We then present successful deletion inference and reconstruction attacks for a variety of machine learning models and tasks such as classification, regression, and language models. Finally, we show that our attacks would provably be precluded if the schemes satisfy (variants of) Deletion Compliance (Garg, Goldwasser, and Vasudevan, Eurocrypt' 20).

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源