PCIR: Privacy-Preserving Convolutional Neural Network Inference With Rapid Responsiveness

被引:0
作者
Li, Jinguo [1 ]
Yan, Yan [1 ]
Zhang, Kai [1 ]
Li, Chunlin [1 ]
Yuan, Peichun [1 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
convolutional neural network; data privacy; deep learning; model privacy;
D O I
10.1111/coin.70030
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Several companies leverage trained convolutional neural networks (CNNs) to offer predictive services to users. These companies capitalize on CNNs' superior performance in image processing tasks, such as autonomous driving or face recognition. To safeguard data privacy and model parameters, various algorithms have been proposed. Most of them are predominantly designed using secure multi-party computation (MPC) or hardware-assisted solutions. However, certain limitations persist. First, MPC-based approaches (e.g., garbled circuits, homomorphic encryption) fail to meet rapid responsiveness requirements. Additionally, hardware-assisted solutions impose extra burdens to realize secure inference tasks. The primary reasons for these shortcomings can be summarized as follows: (1) high computation and communication delays are introduced by heavy cryptographic operations during the online phase. (2) Additional overhead for sharing triples. In this article, we propose PCIR, a secure protocol for privacy-preserving convolutional neural network inference (PCIR). PCIR aims to address the aforementioned issues based on a pre-shared secret sharing mechanism. It can achieve rapid responses to user requirements and preserve privacy of data and model for the following reasons: (1) it circumvents computationally expensive operations, such as an operation for permuting plaintext slots, which runs 56 times slower than a homomorphic addition operation, and 34 times slower than a homomorphic multiplication operation. (2) Computational operations, such as homomorphic additions or multiplications, are conducted during the pre-computation phase. It can significantly reduce the online computing costs. (3) PCIR conducts secure multiplication based on pre-shared secret shares. It results in much lower communication and computation costs compared with the use of multiplicative triples. Finally, we evaluate PCIR with benchmark neural networks trained on the MNIST and CIFAR-10 datasets. The results have shown that PCIR requires 1.3 x -3.7x less time and 1.1 x -12.3x less communication cost than previous methodologies.
引用
收藏
页数:12
相关论文
共 27 条
[11]  
Juvekar C, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1651
[12]  
Lee T., 2019, MOB P 25 ANN INT C, p1 17
[13]   Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions [J].
Li, Minghui ;
Chow, Sherman S. M. ;
Hu, Shengshan ;
Yan, Yuejing ;
Shen, Chao ;
Wang, Qian .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) :1592-1604
[14]   HomoPAl: A Secure Collaborative Machine Learning Platform based on Homomorphic Encryption [J].
Li, Qifei ;
Huang, Zhicong ;
Lu, Wen-jie ;
Hong, Cheng ;
Qu, Hunter ;
He, Hui ;
Zhang, Weizhe .
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020), 2020, :1713-1717
[15]   Securely Outsourcing Neural Network Inference to the Cloud With Lightweight Techniques [J].
Liu, Xiaoning ;
Zheng, Yifeng ;
Yuan, Xingliang ;
Yi, Xun .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (01) :620-636
[16]   Design and Implementation of Encryption/Decryption Architectures for BFV Homomorphic Encryption Scheme [J].
Mert, Ahmet Can ;
Ozturk, Erdinc ;
Savas, Erkay .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2020, 28 (02) :353-362
[17]  
Mishra Pratyush, 2020, PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, P27, DOI 10.1145/3411501.3419418
[18]  
Patra A, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P2165
[19]   A biological image classification method based on improved CNN [J].
Qin, Jiaohua ;
Pan, Wenyan ;
Xiang, Xuyu ;
Tan, Yun ;
Hou, Guimin .
ECOLOGICAL INFORMATICS, 2020, 58
[20]  
Rouhani BD, 2018, DES AUT CON, DOI [10.1145/3195970.3196023, 10.1109/DAC.2018.8465894]