Privacy-Preserving Collaborative Learning Through Feature Extraction

被引:6
作者
Sarmadi, Alireza [1 ]
Fu, Hao [1 ]
Krishnamurthy, Prashanth [1 ]
Garg, Siddharth [1 ]
Khorrami, Farshad [1 ]
机构
[1] NYU, Tandon Sch Engn, Dept Elect & Comp Engn, Brooklyn, NY 11201 USA
关键词
Feature extraction; Cryptography; Training; Servers; Computational modeling; Protocols; Data models; Collaborative learning; privacy-preserving training; secure multiparty computation; neural networks; feature extractor; COMPUTATION;
D O I
10.1109/TDSC.2023.3263507
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a framework in which multiple entities collaborate to build a machine learning model while preserving privacy of their data. The approach utilizes feature embeddings from shared/per-entity feature extractors transforming data into a feature space for cooperation between entities. We propose two specific methods and compare them with a baseline method. In Shared Feature Extractor (SFE) Learning, the entities use a shared feature extractor to compute feature embeddings of samples. In Locally Trained Feature Extractor (LTFE) Learning, each entity uses a separate feature extractor, and models are trained using concatenated features from all entities. As a baseline, in Cooperatively Trained Feature Extractor (CTFE) Learning, the entities train models by sharing raw data. Secure multi-party algorithms are utilized to train models without revealing data or features in plain text. We investigate the trade-offs among SFE, LTFE, and CTFE in regard to performance, privacy leakage (using an off-the-shelf membership inference attack), and computational cost. LTFE provides the most privacy, followed by SFE, and then CTFE. Computational cost is lowest for SFE and the relative speed of CTFE and LTFE depends on network architecture. CTFE and LTFE provide the best accuracy. We use three different datasets for evaluations.
引用
收藏
页码:486 / 498
页数:13
相关论文
共 64 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
Aggarwal CC, 2008, ADV DATABASE SYST, V34, P11
[3]   A comprehensive review on privacy preserving data mining [J].
Aldeen, Yousra Abdul Alsahib S. ;
Salleh, Mazleena ;
Razzaque, Mohammad Abdur .
SPRINGERPLUS, 2015, 4 :1-36
[4]  
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[5]   Garbling Gadgets for Boolean and Arithmetic Circuits [J].
Ball, Marshall ;
Malkin, Tal ;
Rosulek, Mike .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :565-577
[6]   Security and Privacy-Enhancing Multicloud Architectures [J].
Bohli, Jens-Matthias ;
Gruschka, Nils ;
Jensen, Meiko ;
Lo Iacono, Luigi ;
Marnau, Ninja .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) :212-224
[7]  
Bonawitz K, 2019, Arxiv, DOI arXiv:1902.01046
[8]   Limits of Practical Sublinear Secure Computation [J].
Boyle, Elette ;
Ishai, Yuval ;
Polychroniadou, Antigoni .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 :302-332
[9]   Privacy-preserving CNN feature extraction and retrieval over medical images [J].
Cai, Guopeng ;
Wei, Xiaochao ;
Li, Yao .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (11) :9267-9289
[10]   Secure outsourced garbled circuit evaluation for mobile devices [J].
Carter, Henry ;
Mood, Benjamin ;
Traynor, Patrick ;
Butler, Kevin .
JOURNAL OF COMPUTER SECURITY, 2016, 24 (02) :137-180