3.8 Proceedings Paper

Prediction of Mobile App Privacy Preferences with User Profiles via Federated Learning

Publisher

ASSOC COMPUTING MACHINERY
DOI: 10.1145/3508398.3511526

Keywords

Privacy; mobile devices; automated prediction; federated learning

Funding

  1. European Union [825618]
  2. European Regional Development Fund (FEDER), through the Regional Operational Programme of Centre (CENTRO 2020) of the Portugal [045929 (CENTRO-01-0247-FEDER-045929)]
  3. FCT under the MIT Portugal Program
  4. FCT - Foundation for Science and Technology [SFRH/BD/128599/2017]

Ask authors/readers for more resources

Permission managers in mobile devices allow users to control permissions requests, but existing managers are ineffective at protecting and warning users about privacy risks. Recent research proposes privacy protection mechanisms through user profiles to automate privacy decisions, considering personal privacy preferences.
Permission managers in mobile devices allow users to control permissions requests, by granting of denying application's access to data and sensors. However, existing managers are ineffective at both protecting and warning users of the privacy risks of their permissions' decisions. Recent research proposes privacy protection mechanisms through user profiles to automate privacy decisions, taking personal privacy preferences into consideration. While promising, these proposals usually resort to a centralized server towards training the automation model, thus requiring users to trust this central entity. In this paper we propose a methodology to build privacy profiles and train neural networks for prediction of privacy decisions, while guaranteeing user privacy, even against a centralized server. Specifically, we resort to privacy-preserving clustering techniques towards building the privacy profiles, that is, the server computes the centroids (profiles) without access to the underlying data. Then, using federated learning, the model to predict permission decisions is learnt in a distributed fashion while all data remains locally in the users' devices. Experiments following our methodology show the feasibility of building a personalized and automated permission manager guaranteeing user privacy, while also reaching a performance comparable to the centralized state of the art, with an F1-score of 0.9.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available