PCIR: Privacy-Preserving Convolutional Neural Network Inference With Rapid Responsiveness

被引:0
作者
Li, Jinguo [1 ]
Yan, Yan [1 ]
Zhang, Kai [1 ]
Li, Chunlin [1 ]
Yuan, Peichun [1 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
convolutional neural network; data privacy; deep learning; model privacy;
D O I
10.1111/coin.70030
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Several companies leverage trained convolutional neural networks (CNNs) to offer predictive services to users. These companies capitalize on CNNs' superior performance in image processing tasks, such as autonomous driving or face recognition. To safeguard data privacy and model parameters, various algorithms have been proposed. Most of them are predominantly designed using secure multi-party computation (MPC) or hardware-assisted solutions. However, certain limitations persist. First, MPC-based approaches (e.g., garbled circuits, homomorphic encryption) fail to meet rapid responsiveness requirements. Additionally, hardware-assisted solutions impose extra burdens to realize secure inference tasks. The primary reasons for these shortcomings can be summarized as follows: (1) high computation and communication delays are introduced by heavy cryptographic operations during the online phase. (2) Additional overhead for sharing triples. In this article, we propose PCIR, a secure protocol for privacy-preserving convolutional neural network inference (PCIR). PCIR aims to address the aforementioned issues based on a pre-shared secret sharing mechanism. It can achieve rapid responses to user requirements and preserve privacy of data and model for the following reasons: (1) it circumvents computationally expensive operations, such as an operation for permuting plaintext slots, which runs 56 times slower than a homomorphic addition operation, and 34 times slower than a homomorphic multiplication operation. (2) Computational operations, such as homomorphic additions or multiplications, are conducted during the pre-computation phase. It can significantly reduce the online computing costs. (3) PCIR conducts secure multiplication based on pre-shared secret shares. It results in much lower communication and computation costs compared with the use of multiplicative triples. Finally, we evaluate PCIR with benchmark neural networks trained on the MNIST and CIFAR-10 datasets. The results have shown that PCIR requires 1.3 x -3.7x less time and 1.1 x -12.3x less communication cost than previous methodologies.
引用
收藏
页数:12
相关论文
共 27 条
[1]  
Brasser F., 2017, P 11 USENIX WORKSHOP
[2]   FederatedNILM: A Distributed and Privacy-Preserving Framework for Non-Intrusive Load Monitoring Based on Federated Deep Learning [J].
Dai, Shuang ;
Meng, Fanlin ;
Wang, Qian ;
Chen, Xizhong .
2023 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, IJCNN, 2023,
[3]  
Demmler D., 2015, Framework for Efficient MixedProtocol Secure TwoParty Computation
[4]  
Di Wang, 2020, 2020 International Conference on Computer Information and Big Data Applications (CIBDA). Proceedings, P470, DOI 10.1109/CIBDA50819.2020.00111
[5]  
Dowlin N, 2016, PR MACH LEARN RES, V48
[6]   Privacy-preserving and verifiable deep learning inference based on secret sharing [J].
Duan, Jia ;
Zhou, Jiantao ;
Li, Yuanman ;
Huang, Caishi .
NEUROCOMPUTING, 2022, 483 :221-234
[7]   Privacy-Preserving Convolution Neural Network Inference with Edge-assistance [J].
Guo, Li ;
Yu, Jia ;
Yang, Ming ;
Kong, Fanyu .
COMPUTERS & SECURITY, 2022, 123
[8]  
Hähnel M, 2017, 2017 USENIX ANNUAL TECHNICAL CONFERENCE (USENIX ATC '17), P299
[9]   A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing [J].
Huang, Kai ;
Liu, Ximeng ;
Fu, Shaojing ;
Guo, Deke ;
Xu, Ming .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1441-1455
[10]   Secure Outsourced Matrix Computation and Application to Neural Networks [J].
Jiang, Xiaoqian ;
Kim, Miran ;
Lauter, Kristin ;
Song, Yongsoo .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :1209-1222