Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
144 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis (2311.15460v1)

Published 27 Nov 2023 in cs.CR, cs.AI, and cs.LG

Abstract: Big Data empowers the farming community with the information needed to optimize resource usage, increase productivity, and enhance the sustainability of agricultural practices. The use of Big Data in farming requires the collection and analysis of data from various sources such as sensors, satellites, and farmer surveys. While Big Data can provide the farming community with valuable insights and improve efficiency, there is significant concern regarding the security of this data as well as the privacy of the participants. Privacy regulations, such as the EU GDPR, the EU Code of Conduct on agricultural data sharing by contractual agreement, and the proposed EU AI law, have been created to address the issue of data privacy and provide specific guidelines on when and how data can be shared between organizations. To make confidential agricultural data widely available for Big Data analysis without violating the privacy of the data subjects, we consider privacy-preserving methods of data sharing in agriculture. Deep learning-based synthetic data generation has been proposed for privacy-preserving data sharing. However, there is a lack of compliance with documented data privacy policies in such privacy-preserving efforts. In this study, we propose a novel framework for enforcing privacy policy rules in privacy-preserving data generation algorithms. We explore several available agricultural codes of conduct, extract knowledge related to the privacy constraints in data, and use the extracted knowledge to define privacy bounds in a privacy-preserving generative model. We use our framework to generate synthetic agricultural data and present experimental results that demonstrate the utility of the synthetic dataset in downstream tasks. We also show that our framework can evade potential threats and secure data based on applicable regulatory policy rules.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (48)
  1. H.-L. E. Forum, “How to feed the world in 2050,” 2009.
  2. “Regulation (eu) 2016/679 of the european parliament and of the council of 27 april 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/ec (general data protection regulation) (text with eea relevance).”
  3. “Eu code of conduct on agricultural data sharing by contractual agreement,” 2020.
  4. EUCommision, “Laying down harmonised rules on artificial intelligence (artificial intelligence act) and amending certain union legislative acts,” 2021.
  5. R. Torkzadehmahani, P. Kairouz, and B. Paten, “Dp-cgan: Differentially private synthetic data and label generation,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2019, pp. 0–0.
  6. J. Xu, X. Ren, J. Lin, and X. Sun, “Dp-gan: diversity-promoting generative adversarial network for generating informative and diversified text,” arXiv preprint arXiv:1802.01345, 2018.
  7. J. Jordon, J. Yoon, and M. Van Der Schaar, “Pate-gan: Generating synthetic data with differential privacy guarantees,” in International conference on learning representations, 2018.
  8. A. Kotal, A. Piplai, S. S. L. Chukkapalli, and A. Joshi, “Privetab: Secure and privacy-preserving sharing of tabular data,” in Proceedings of the 2022 ACM on International Workshop on Security and Privacy Analytics, 2022, pp. 35–45.
  9. “Ceja two new partners sign up to the eu code of conduct on agricultural data sharing, https://www.ceja.eu/two-new-partners-signeu-code-conduct-agricultural-data-sharing/.”
  10. C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in Theory of cryptography conference.   Springer, 2006, pp. 265–284.
  11. K. El Emam and F. K. Dankar, “Protecting privacy using k-anonymity,” Journal of the American Medical Informatics Association, vol. 15, no. 5, pp. 627–637, 2008.
  12. A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, “l-diversity: Privacy beyond k-anonymity,” ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 1, no. 1, pp. 3–es, 2007.
  13. N. Li, T. Li, and S. Venkatasubramanian, “t-closeness: Privacy beyond k-anonymity and l-diversity,” in 2007 IEEE 23rd International Conference on Data Engineering.   IEEE, 2007, pp. 106–115.
  14. A. Brock, J. Donahue, and K. Simonyan, “Large scale gan training for high fidelity natural image synthesis,” arXiv preprint arXiv:1809.11096, 2018.
  15. P. Isola, J.-Y. Zhu, T. Zhou, and A. A. Efros, “Image-to-image translation with conditional adversarial networks,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2017, pp. 1125–1134.
  16. H. Zhang, T. Xu, H. Li, S. Zhang, X. Wang, X. Huang, and D. N. Metaxas, “Stackgan: Text to photo-realistic image synthesis with stacked generative adversarial networks,” in Proceedings of the IEEE international conference on computer vision, 2017, pp. 5907–5915.
  17. T.-C. Wang, M.-Y. Liu, J.-Y. Zhu, A. Tao, J. Kautz, and B. Catanzaro, “High-resolution image synthesis and semantic manipulation with conditional gans,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2018, pp. 8798–8807.
  18. M. Mirza and S. Osindero, “Conditional generative adversarial nets,” arXiv preprint arXiv:1411.1784, 2014.
  19. “Modal logic, http://plato.stanford.edu/entries/logic-modal/.”
  20. L. Elluri, S. S. L. Chukkapalli, K. P. Joshi, T. Finin, and A. Joshi, “A bert based approach to measure web services policies compliance with gdpr,” IEEE Access, vol. 9, pp. 148 004–148 016, 2021.
  21. “Itm4impact farmer survey - datasets - ilri datasets portal,” https://data.ilri.org/portal/dataset/itm4impact-farmer-survey, (Accessed on 08/30/2023).
  22. A. F. B. Federation, “Privacy and security issues for farm data, centennial,” 2019.
  23. “New zealand’s farm data code of practice,” 2019.
  24. A. Kotal, K. P. Joshi, and A. Joshi, “Vicloud: Measuring vagueness in cloud service privacy policies and terms of services,” in 2020 IEEE 13th International Conference on Cloud Computing (CLOUD).   IEEE, 2020, pp. 71–79.
  25. L. Elluri, K. P. Joshi, and A. Kotal, “Measuring semantic similarity across eu gdpr regulation and cloud privacy policies,” in 2020 IEEE International Conference on Big Data (Big Data).   IEEE, 2020, pp. 3963–3978.
  26. A. Kotal, A. Joshi, and K. P. Joshi, “The effect of text ambiguity on creating policy knowledge graphs,” in 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom).   IEEE, 2021, pp. 1491–1500.
  27. L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, “A policy-driven approach to secure extraction of covid-19 data from research papers,” Frontiers in big Data, vol. 4, p. 701966, 2021.
  28. K. Echenim, L. Elluri, and K. Joshi, “Ensuring privacy policy compliance of wearables with iot regulations,” UMBC Center for Accelerated Real Time Analysis, 2023.
  29. J. Domingo-Ferrer and J. Soria-Comas, “From t-closeness to differential privacy and vice versa in data anonymization,” Knowledge-Based Systems, vol. 74, pp. 151–158, 2015.
  30. M. Arjovsky, S. Chintala, and L. Bottou, “Wasserstein generative adversarial networks,” in International conference on machine learning.   PMLR, 2017, pp. 214–223.
  31. L. Xu and K. Veeramachaneni, “Synthesizing tabular data using generative adversarial networks,” arXiv preprint arXiv:1811.11264, 2018.
  32. L. Xu, M. Skoularidou, A. Cuesta-Infante, and K. Veeramachaneni, “Modeling tabular data using conditional gan,” arXiv preprint arXiv:1907.00503, 2019.
  33. N. Das, A. Kotal, D. Roseberry, and A. Joshi, “Change management using generative modeling on digital twins,” in 2023 IEEE International Conference on Intelligence and Security Informatics (ISI).   IEEE, 2023, pp. 1–6.
  34. A. Piplai, A. Kotal, S. Mohseni, M. Gaur, S. Mittal, and A. Joshi, “Knowledge-enhanced neurosymbolic artificial intelligence for cybersecurity and privacy,” IEEE Internet Computing, vol. 27, no. 5, pp. 43–48, 2023.
  35. L. Elluri, A. Nagar, and K. P. Joshi, “An integrated knowledge graph to automate gdpr and pci dss compliance,” in 2018 IEEE International Conference on Big Data (Big Data).   IEEE, 2018, pp. 1266–1271.
  36. L. Elluri and K. P. Joshi, “A knowledge representation of cloud data controls for eu gdpr compliance,” in 2018 IEEE World Congress on Services (SERVICES).   IEEE, 2018, pp. 45–46.
  37. M. Gupta, M. Abdelsalam, S. Khorsandroo, and S. Mittal, “Security and privacy in smart farming: Challenges and opportunities,” IEEE access, vol. 8, pp. 34 564–34 584, 2020.
  38. I. Makhdoom, I. Zhou, M. Abolhasan, J. Lipman, and W. Ni, “Privysharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities,” Computers & Security, vol. 88, p. 101653, 2020.
  39. J. West, “A prediction model framework for cyber-attacks to precision agriculture technologies,” Journal of Agricultural & Food Information, vol. 19, no. 4, pp. 307–330, 2018.
  40. K. H. Coble, A. K. Mishra, S. Ferrell, and T. Griffin, “Big data in agriculture: A challenge for the future,” Applied Economic Perspectives and Policy, vol. 40, no. 1, pp. 79–96, 2018.
  41. R. Kumar, P. Kumar, R. Tripathi, G. P. Gupta, T. R. Gadekallu, and G. Srivastava, “Sp2f: A secured privacy-preserving framework for smart agricultural unmanned aerial vehicles,” Computer Networks, vol. 187, p. 107819, 2021.
  42. D. Gupta, S. Bhatt, M. Gupta, O. Kayode, and A. S. Tosun, “Access control model for google cloud iot,” in 2020 IEEE 6th Intl conference on big data security on cloud (BigDataSecurity), IEEE Intl conference on high performance and smart computing,(HPSC) and IEEE Intl conference on intelligent data and security (IDS).   IEEE, 2020, pp. 198–208.
  43. D. Gupta, S. Bhatt, M. Gupta, and A. S. Tosun, “Future smart connected communities to fight covid-19 outbreak,” Internet of Things, vol. 13, p. 100342, 2021.
  44. Ö. Aslan, M. Ozkan-Okay, and D. Gupta, “Intelligent behavior-based malware detection system on cloud computing environment,” IEEE Access, vol. 9, pp. 83 252–83 271, 2021.
  45. M. Ozkan-Okay, R. Samet, Ö. Aslan, and D. Gupta, “A comprehensive systematic literature review on intrusion detection systems,” IEEE Access, vol. 9, pp. 157 727–157 760, 2021.
  46. D. Gupta, M. Gupta, S. Bhatt, and A. S. Tosun, “Detecting anomalous user behavior in remote patient monitoring,” in 2021 IEEE 22nd International Conference on Information Reuse and Integration for Data Science (IRI).   IEEE, 2021, pp. 33–40.
  47. D. Gupta, O. Kayode, S. Bhatt, M. Gupta, and A. S. Tosun, “Hierarchical federated learning based anomaly detection using digital twins for smart healthcare,” in 2021 IEEE 7th International Conference on Collaboration and Internet Computing (CIC).   IEEE, 2021, pp. 16–25.
  48. D. Gupta, S. Bhatt, P. Bhatt, M. Gupta, and A. S. Tosun, “Game theory based privacy preserving approach for collaborative deep learning in iot,” in Deep Learning for Security and Privacy Preservation in IoT.   Springer, 2022, pp. 127–149.
Citations (2)

Summary

We haven't generated a summary for this paper yet.