Efficient FHE-Based Privacy-Enhanced Neural Network for Trustworthy AI-as-a-Service

被引:3
作者
Lam, Kwok-Yan [1 ]
Lu, Xianhui [4 ]
Zhang, Linru [2 ]
Wang, Xiangning [2 ]
Wang, Huaxiong [3 ]
Goh, Si Qi [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
[2] Nanyang Technol Univ, Singapore 639798, Singapore
[3] Nanyang Technol Univ, Div Math Sci, Singapore 639798, Singapore
[4] Chinese Acad Sci, Inst Informat Engn, Beijing 100045, Peoples R China
基金
新加坡国家研究基金会;
关键词
Neural networks; Data models; Artificial intelligence; Table lookup; Face recognition; Biological system modeling; Servers; Fully homomorphic encryption; privacy-enhanced neural networks; look-up table algorithm; deep neural network; digital trust; secure cloud computing; data privacy; cryptographic protocol; applied cryptography;
D O I
10.1109/TDSC.2024.3353536
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
AI-as-a-Service has emerged as an important trend for supporting the growth of the digital economy. Digital service providers make use of their vast amount of customer data to train AI models (such as image recognition, financial modelling and pandemic modelling etc) and offer them as a service on the cloud. While there are convincing advantages for using such third-party models, the fact that model users are required to upload their data to the cloud is bound to raise serious privacy concerns, especially in the face of increasingly stringent privacy regulations and legislation. To promote the adoption of AI-as-a-Service while addressing privacy issues, we propose a practical approach for constructing privacy-enhanced neural networks by designing an efficient implementation of fully homomorphic encryption. With this approach, an existing neural network can be converted to process FHE-encrypted data and produce encrypted output which are only accessible by the model users, and more importantly, within an operationally acceptable time (e.g., within 1 s for facial recognition in typical border control systems). Experimental results show that in many practical tasks such as facial recognition, text classification and so on, we obtained the state-of-the-art inference accuracy in less than one second on a 16 cores CPU.
引用
收藏
页码:4451 / 4468
页数:18
相关论文
共 26 条
[1]   nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data [J].
Boemer, Fabian ;
Lao, Yixing ;
Cammarota, Rosario ;
Wierzynski, Casimir .
CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS, 2019, :3-15
[2]   Fast Homomorphic Evaluation of Deep Discretized Neural Networks [J].
Bourse, Florian ;
Minelli, Michele ;
Minihold, Matthias ;
Paillier, Pascal .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 :483-512
[3]  
Brakerski Zvika, 2014, ACM Transactions on Computation Theory, V6, DOI 10.1145/2633600
[4]  
Brutzkus A, 2019, PR MACH LEARN RES, V97
[5]   Homomorphic Encryption for Arithmetic of Approximate Numbers [J].
Cheon, Jung Hee ;
Kim, Andrey ;
Kim, Miran ;
Song, Yongsoo .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 :409-437
[6]   TFHE: Fast Fully Homomorphic Encryption Over the Torus [J].
Chillotti, Ilaria ;
Gama, Nicolas ;
Georgieva, Mariya ;
Izabachene, Malika .
JOURNAL OF CRYPTOLOGY, 2020, 33 (01) :34-91
[7]  
Chou ED, 2018, Arxiv, DOI [arXiv:1811.09953, DOI 10.48550/ARXIV.1811.09953]
[8]  
Dowlin N, 2016, PR MACH LEARN RES, V48
[9]   FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second [J].
Ducas, Leo ;
Micciancio, Daniele .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT I, 2015, 9056 :617-640
[10]   Differential privacy: A survey of results [J].
Dwork, Cynthia .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 :1-19