• About Us
  • Disclaimer
  • Contact Us
  • Privacy Policy
Monday, May 18, 2026
mGrowTech
No Result
View All Result
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions
No Result
View All Result
mGrowTech
No Result
View All Result
Home Al, Analytics and Automation

Meet MemPrivacy: An Edge-Cloud Framework that Uses Local Reversible Pseudonymization to Protect User Data Without Breaking Memory Utility

Josh by Josh
May 18, 2026
in Al, Analytics and Automation
0
Meet MemPrivacy: An Edge-Cloud Framework that Uses Local Reversible Pseudonymization to Protect User Data Without Breaking Memory Utility


As LLM-powered agents move from research to production, one design tension is becoming harder to ignore: the more useful cloud-hosted memory becomes, the more private user data it exposes. Researchers from MemTensor (Shanghai), HONOR Device and Tongji University have introduced MemPrivacy, a framework that attempts to resolve this tension without sacrificing the utility that makes personalized memory worthwhile in the first place.

The Core Problem With Cloud Memory

When you interact with an AI agent, your conversation often contains sensitive details like health conditions, email addresses, financial figures, passwords, and more. In a typical edge-cloud deployment, the user’s device (the edge) handles input, while computation-heavy memory management and reasoning happen in the cloud. This architecture is efficient, but it means raw, unfiltered user data travels to and persists in cloud systems.

The risk is not theoretical. Prior studies show that multi-turn memory attacks can induce privacy violations with success rates up to 69%, and leakage attacks against memory systems can reach 75% success. Indirect prompt injection can even manipulate agents into actively eliciting private information from users. Once sensitive content enters cloud logs, vector databases, or external memory stores, it can remain accessible through subsequent storage, retrieval, and reuse stages well beyond the original interaction.

Prior works have tried to address this with masking — replacing sensitive values with tokens like ***. The problem is that masking destroys semantics. If a user asks an agent to draft a doctor’s email and their blood pressure reading and email address are both replaced with ***, the cloud model cannot complete the task meaningfully. More principled techniques such as differential privacy and cryptographic protection offer stronger guarantees but are difficult to integrate into interactive memory pipelines without degrading response quality.

https://arxiv.org/pdf/2605.09530v2

What MemPrivacy Does Differently

Rather than masking private content, MemPrivacy replaces it with typed placeholders — structured tokens like <Health_Info_1> or <Email_1> — before the input leaves the local device. The cloud model receives semantically intact text and can reason and store memories normally; it just never sees the actual values. When the cloud returns a response containing placeholders, the local device looks up the originals from a secure local database and substitutes them back in. The user sees a fully coherent, personalized response.

This design is called local reversible pseudonymization, and the full pipeline operates in three stages. Stage 1 (Uplink Desensitization): A lightweight on-device model identifies privacy-sensitive spans in the input, classifies each by type and sensitivity level, and replaces them with typed placeholders. The original-to-placeholder mappings are stored locally and persist across sessions so the same value always gets the same placeholder. Stage 2 (Cloud Processing): The sanitized input is sent to the cloud agent or memory system. The typed placeholders preserve enough semantic structure for memory formation and retrieval to function correctly. Stage 3 (Downlink Restoration): The cloud response, which may contain placeholders, is restored locally via lightweight database lookup and string substitution, adding negligible latency.

A Four-Level Privacy Taxonomy

A key contribution by the research team is a four-level privacy taxonomy (PL1–PL4) that defines what gets protected and at what threshold:

  • PL1 covers general preferences, habits, and stylistic choices that do not identify a person and carry low risk. These are not protected by default.
  • PL2 includes identifiable PII — real names, phone numbers, email addresses, detailed addresses, account usernames, and combinations that could identify or trace a specific individual.
  • PL3 covers highly sensitive PII: government document numbers, financial account details, health records, precise location and trajectory data, biometrics, raw communication content, and sensitive identity attributes such as religious beliefs or ethnicity.
  • PL4 is the highest tier — credentials and secrets that are immediately exploitable: passwords, PINs, verification codes, session tokens, API keys, private keys, seed phrases, and undisclosed business materials. Exposure at this level can directly result in account takeover, financial loss, or large-scale data exfiltration.

Users can configure the masking threshold for example, protecting only PL3 and PL4, or applying full protection across PL2–PL4 — giving granular control over the privacy–utility trade-off.

https://arxiv.org/pdf/2605.09530v2

MemPrivacy-Bench and Model Training

To train and evaluate their approach, the research team constructed MemPrivacy-Bench, a dataset covering 200 synthetic user profiles and over 155,000 privacy instances (125,776 training, 29,967 test) across balanced Chinese and English dialogue, spanning 7 high-level scenario categories and 23 fine-grained subcategories. The test set contains 615 question-answer pairs across six memory task types: basic memory, temporal reasoning, adversarial questioning, dynamic updating, implicit inference, and information aggregation. Annotations were first generated by a dual-model pipeline using Gemini-3.1-Pro and GPT-5.2, then verified by six human annotators, achieving a final annotation accuracy of 98.08%.

The MemPrivacy extraction models are fine-tuned from Qwen3 base models at 0.6B, 1.7B, and 4B parameter scales using supervised fine-tuning (SFT) followed by reinforcement learning with Group Relative Policy Optimization (GRPO). GRPO estimates advantages based on relative rewards across multiple sampled outputs per input, using F1 score as the reward signal, avoiding the computational overhead of a separately trained critic. Training used 160 users for the training split and 40 users for the test split.

Experimental Results

On MemPrivacy-Bench, the best-performing model — MemPrivacy-4B-RL — achieves an F1 score of 85.97%, compared to 78.41% for Gemini-3.1-Pro, the strongest general-purpose model tested. Even the smallest model, MemPrivacy-0.6B-SFT, reaches 83.09% F1, outperforming all general-purpose models evaluated. On the out-of-distribution PersonaMem-v2 benchmark, MemPrivacy-4B-RL achieves 94.48% F1, compared to 92.18% for DeepSeek-V3.2-Think, the best general model on that set.

OpenAI’s recently released Privacy-Filter, a bidirectional token-classification model for PII detection open-sourced. It achieves 35.50% F1 on MemPrivacy-Bench, a gap of over 50 percentage points behind the best MemPrivacy model, though it operates at significantly lower latency (0.34s versus roughly 2s for MemPrivacy models on MemPrivacy-Bench).

On downstream memory utility, MemPrivacy was tested across three widely used memory systems: LangMem, Mem0, and Memobase. When protecting all PL2–PL4 content, accuracy drops on MemPrivacy-Bench are contained to 0.73%–1.30% and 0.71%–1.60% on PersonaMem-v2, relative to no-protection baselines. By contrast, irreversible masking causes accuracy drops of 16.99%–41.87% on MemPrivacy-Bench, while untyped placeholder masking causes drops of 4.72%–6.67% on MemPrivacy-Bench and 2.67%–8.71% on PersonaMem-v2.

Key Takeaways

  • MemPrivacy replaces sensitive user data with semantically typed placeholders (e.g., <Health_Info_1>) on-device before cloud transmission, so the cloud memory system never receives raw private values.
  • The framework introduces a four-level privacy taxonomy (PL1–PL4) ranging from general preferences to immediately exploitable credentials, with user-configurable masking thresholds.
  • MemPrivacy-4B-RL achieves 85.97% F1 on MemPrivacy-Bench and 94.48% on PersonaMem-v2, outperforming GPT-5.2 (68.99%) and Gemini-3.1-Pro (78.41%) on privacy span extraction.
  • Across LangMem, Mem0, and Memobase, applying MemPrivacy at the PL2–PL4 level limits memory utility loss to within 1.6%, compared to accuracy drops of up to 41.87% with irreversible masking.
  • Models range from 0.6B to 4B parameters, with per-message inference under two seconds, making the framework suitable for on-device deployment without noticeable latency.

Marktechpost’s Visual Explainer

01 / 07  —  Overview

What is MemPrivacy?

MemPrivacy is a privacy-preserving personalized memory management framework for edge-cloud LLM agents, developed by MemTensor, HONOR, and Tongji University.

In a standard edge-cloud agent, your raw input — including sensitive data like health info, emails, and passwords — gets sent directly to the cloud for memory processing. MemPrivacy stops that.


User Input
Raw text with private values

→

On-Device
Detect & replace with typed placeholders

→

Cloud
Sees only placeholders, reasons normally

→

Restore
Original values reinserted locally

Key Idea

Privacy protection is decoupled from semantic destruction. The cloud gets enough structure to reason — but never the actual private values.

READ ALSO

Implementing Statistical Guardrails for Non-Deterministic Agents

A Coding Implementation to Compress and Benchmark Instruction-Tuned LLMs with FP8, GPTQ, and SmoothQuant Quantization using llmcompressor

02 / 07  —  The Problem

Why existing approaches fall short

Most cloud memory systems receive your raw input in plaintext. Once that data enters cloud logs or vector databases, it can persist indefinitely and be retrieved later.


  • !
    Multi-turn memory attacks can extract user data with up to 69% success rate according to published research.
  • !
    Memory leakage attacks against cloud memory systems reach up to 75% success in documented studies.
  • !
    Full masking (replacing values with ***) protects privacy but destroys the semantic cues the model needs to complete tasks.
  • !
    Differential privacy & cryptography offer strong guarantees but are hard to integrate into interactive memory pipelines without major utility loss.
MemPrivacy’s answer

Use semantically-typed placeholders — not blank masks — so the cloud can still reason about the type and role of information without seeing the actual value.

03 / 07  —  Privacy Levels

The Four-Level Privacy Taxonomy (PL1—PL4)

MemPrivacy classifies every detected span into one of four levels. You can configure which levels get masked — e.g. mask only PL3+PL4, or all of PL2—PL4.

PL1  Low
PL2  Identifiable
PL3  Highly Sensitive
PL4  Critical

Level What it covers Examples
PL1 Preferences, habits, stylistic choices. Cannot identify a person. Food preferences, tone choices
PL2 Information that can identify or trace a specific individual. Full name, email, phone, address, account ID
PL3 Data whose leakage can cause significant harm to safety, health, or finances. Medical records, bank account, passport number, biometrics, precise location
PL4 Immediately exploitable secrets — usable for account takeover or financial loss. Passwords, PINs, OTPs, API keys, private keys, session tokens

04 / 07  —  Typed Placeholders

How typed placeholders preserve utility

When a privacy span is detected, it is replaced with a structured token that carries the semantic type of the information — not just a blank mask.

// Original user input:
"My blood pressure today was 160/110.
Reply to [email protected].
Never mention my recovery code RC-7291."

// After MemPrivacy uplink desensitization:
"My blood pressure today was <Health_Info_1>.
Reply to [email protected].
Never mention my <Recovery_Code_1>."

The cloud sees <Health_Info_1> and knows it’s health data. It can draft the email correctly. It never sees 160/110 or RC-7291.

Session Persistence

The original—to—placeholder mapping is stored in a local secure database and persists across sessions. The same value always gets the same placeholder, enabling consistent long-term memory.

Multiple spans of the same type are distinguished by incremental indices: <Email_1>, <Email_2>, etc.

05 / 07  —  Getting Started

Installation & model setup

MemPrivacy models are available at three scales for different edge hardware budgets: 0.6B, 1.7B, and 4B parameters (all based on Qwen3). The 4B-RL model is the strongest.

# Clone the repository
git clone https://github.com/MemTensor/MemPrivacy

# Install dependencies
cd MemPrivacy
pip install -r requirements.txt

# Load model from HuggingFace
from transformers import AutoModelForCausalLM, AutoTokenizer

model_id = "IAAR-Shanghai/MemPrivacy-4B-RL"
tokenizer = AutoTokenizer.from_pretrained(model_id)
model = AutoModelForCausalLM.from_pretrained(
model_id, torch_dtype="auto", device_map="auto"
)

Model collection

All six model variants (0.6B/1.7B/4B × SFT/RL) are available at:
huggingface.co/collections/IAAR-Shanghai/memprivacy

06 / 07  —  Integration

Integrating with Mem0, LangMem, or Memobase

MemPrivacy sits between your user-facing application and the cloud memory system. The three-stage pipeline maps directly onto your existing architecture.

  • 1
    Uplink: Pass raw user input through the MemPrivacy model. It returns a list of detected spans with (original_text, privacy_level, privacy_type). Replace each span at or above your configured threshold with a typed placeholder. Store mappings locally.
  • 2
    Cloud call: Send the desensitized input to your existing memory system (Mem0, LangMem, Memobase) as normal. No changes to the cloud-side configuration are needed.
  • 3
    Downlink: Scan the cloud response for placeholders. Query your local mapping database and substitute each placeholder with its original value before displaying to the user.
Masking threshold config

Set lambda = "PL4" to protect only credentials, "PL3" for PL3+PL4, or "PL2" for full protection. Utility loss at PL4-only is below 0.89% across all tested memory systems.

07 / 07  —  Results & Resources

Benchmark results & where to go next

Model F1 (MemPrivacy-Bench) F1 (PersonaMem-v2) Latency
MemPrivacy-4B-RL 85.97% 94.48% ~2s
MemPrivacy-0.6B-RL 84.66% 93.40% ~1.6s
Gemini-3.1-Pro 78.41% 86.59% ~33s
OpenAI-Privacy-Filter 35.50% 85.27% 0.34s

Utility loss when protecting PL2—PL4 content across LangMem, Mem0, and Memobase is within 1.6% vs. no-protection baselines. Irreversible masking causes up to 41.87% accuracy drop on the same systems.


  • ↗
    Code: github.com/MemTensor/MemPrivacy
  • ↗
    Models: huggingface.co/collections/IAAR-Shanghai/memprivacy
  • ↗
    Paper: arxiv.org/abs/2605.09530


Check out the Paper and Model Weights. Also, feel free to follow us on Twitter and don’t forget to join our 150k+ ML SubReddit and Subscribe to our Newsletter. Wait! are you on telegram? now you can join us on telegram as well.

Need to partner with us for promoting your GitHub Repo OR Hugging Face Page OR Product Release OR Webinar etc.? Connect with us




Source_link

Related Posts

Al, Analytics and Automation

Implementing Statistical Guardrails for Non-Deterministic Agents

May 18, 2026
A Coding Implementation to Compress and Benchmark Instruction-Tuned LLMs with FP8, GPTQ, and SmoothQuant Quantization using llmcompressor
Al, Analytics and Automation

A Coding Implementation to Compress and Benchmark Instruction-Tuned LLMs with FP8, GPTQ, and SmoothQuant Quantization using llmcompressor

May 18, 2026
The Roadmap to Mastering Tool Calling in AI Agents
Al, Analytics and Automation

The Roadmap to Mastering Tool Calling in AI Agents

May 18, 2026
Vercel Labs Introduces Zero, a Systems Programming Language Designed So AI Agents Can Read, Repair, and Ship Native Programs
Al, Analytics and Automation

Vercel Labs Introduces Zero, a Systems Programming Language Designed So AI Agents Can Read, Repair, and Ship Native Programs

May 17, 2026
Implementing Permission-Gated Tool Calling in Python Agents
Al, Analytics and Automation

Implementing Permission-Gated Tool Calling in Python Agents

May 17, 2026
Nous Research Proposes Lighthouse Attention: A Training-Only Selection-Based Hierarchical Attention That Delivers 1.4–1.7× Pretraining Speedup at Long Context
Al, Analytics and Automation

Nous Research Proposes Lighthouse Attention: A Training-Only Selection-Based Hierarchical Attention That Delivers 1.4–1.7× Pretraining Speedup at Long Context

May 16, 2026
Next Post
The First F1 Race On Netflix Is This Weekend

The First F1 Race On Netflix Is This Weekend

POPULAR NEWS

Trump ends trade talks with Canada over a digital services tax

Trump ends trade talks with Canada over a digital services tax

June 28, 2025
Communication Effectiveness Skills For Business Leaders

Communication Effectiveness Skills For Business Leaders

June 10, 2025
15 Trending Songs on TikTok in 2025 (+ How to Use Them)

15 Trending Songs on TikTok in 2025 (+ How to Use Them)

June 18, 2025
App Development Cost in Singapore: Pricing Breakdown & Insights

App Development Cost in Singapore: Pricing Breakdown & Insights

June 22, 2025
Comparing the Top 7 Large Language Models LLMs/Systems for Coding in 2025

Comparing the Top 7 Large Language Models LLMs/Systems for Coding in 2025

November 4, 2025

EDITOR'S PICK

Brand Lessons From The Demise Of Del Monte

Brand Lessons From The Demise Of Del Monte

July 7, 2025
Do Higher Content Scores Mean Higher Google Rankings? We Studied It (So You Don’t Have To)

Do Higher Content Scores Mean Higher Google Rankings? We Studied It (So You Don’t Have To)

June 9, 2025
Brand Management Lessons Emerge From FTC Meta Trial

Brand Management Lessons Emerge From FTC Meta Trial

June 3, 2025
Anthropic revenue tied to two customers as AI pricing war threatens margins

Anthropic revenue tied to two customers as AI pricing war threatens margins

August 9, 2025

About

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

Follow us

Categories

  • Account Based Marketing
  • Ad Management
  • Al, Analytics and Automation
  • Brand Management
  • Channel Marketing
  • Digital Marketing
  • Direct Marketing
  • Event Management
  • Google Marketing
  • Marketing Attribution and Consulting
  • Marketing Automation
  • Mobile Marketing
  • PR Solutions
  • Social Media Management
  • Technology And Software
  • Uncategorized

Recent Posts

  • The Scoop: Students booing AI at commencement signals a larger shift in perception
  • The First F1 Race On Netflix Is This Weekend
  • Meet MemPrivacy: An Edge-Cloud Framework that Uses Local Reversible Pseudonymization to Protect User Data Without Breaking Memory Utility
  • How to Position Your Service as Essential When Clients Cut Costs
  • About Us
  • Disclaimer
  • Contact Us
  • Privacy Policy
No Result
View All Result
  • Technology And Software
    • Account Based Marketing
    • Channel Marketing
    • Marketing Automation
      • Al, Analytics and Automation
      • Ad Management
  • Digital Marketing
    • Social Media Management
    • Google Marketing
  • Direct Marketing
    • Brand Management
    • Marketing Attribution and Consulting
  • Mobile Marketing
  • Event Management
  • PR Solutions