Cost-Sensitive Learning for Confidential Access Control
نویسندگان
چکیده
It is common to control access to critical information based on the need-to-know principle; The requests for access are authorized only if the content of the requested information is relevant to the requester’s project. We formulate such a dichotomous decision in a machine learning framework. Although the cost for misclassifying examples should be differentiated according to their importance, the best-performing errorminimizing classifiers do not have ways of incorporating the cost information into their learning processes. In order to handle the cost effectively, we apply two cost-sensitive learning methods to the problem of the confidential access control and compare their usefulness with those of error-minimizing classifiers. We devise a new metric for assigning cost to any datasets. From the comparison of the cost-sensitive classifiers with error-minimizing classifiers, we find that costing demonstrates the best performance in that it minimizes the cost for misclassifying the examples and the false positive using a relatively small amount of training data.
منابع مشابه
Cost-Sensitive Access Control for Illegitimate Confidential Access by Insiders
In many organizations, it is common to control access to confidential information based on the need-to-know principle; The requests for access are authorized only if the content of the requested information is relevant to the requester’s current information analysis project. We formulate such content-based authorization, i.e. whether to accept or reject access requests as a binary classificatio...
متن کاملA New Formulation for Cost-Sensitive Two Group Support Vector Machine with Multiple Error Rate
Support vector machine (SVM) is a popular classification technique which classifies data using a max-margin separator hyperplane. The normal vector and bias of the mentioned hyperplane is determined by solving a quadratic model implies that SVM training confronts by an optimization problem. Among of the extensions of SVM, cost-sensitive scheme refers to a model with multiple costs which conside...
متن کاملAccess Control to Information in Pervasive Computing Environments
Pervasive computing envisions a world in which our environment is full of embedded devices that gather and share vast amounts of information about people, such as their location, activity, or even their feelings. Some of this information is confidential and should not be released to just anyone. In this thesis, I show how existing solutions for controlling access to information are not sufficie...
متن کاملStealing Machine Learning Models via Prediction APIs
Machine learning (ML) models may be deemed confidential due to their sensitive training data, commercial value, or use in security applications. Increasingly often, confidential ML models are being deployed with publicly accessible query interfaces. ML-as-a-service (“predictive analytics”) systems are an example: Some allow users to train models on potentially sensitive data and charge others f...
متن کاملPRECIP: Towards Practical and Retrofittable Confidential Information Protection
A grand challenge in information protection is how to preserve the confidentiality of sensitive information under spyware surveillance. This problem has not been well addressed by the existing access-control mechanisms which cannot prevent the spyware already in a system from monitoring an authorized party’s interactions with sensitive data. Our answer to this challenge is PRECIP, a new securit...
متن کامل