EPIDL: Towards efficient and privacy-preserving inference in deep learning

被引:0
作者
Nie, Chenfei [1 ]
Zhou, Zhipeng [1 ]
Dong, Mianxiong [2 ]
Ota, Kaoru [2 ]
Li, Qiang [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun, Peoples R China
[2] Muroran Inst Technol, Dept Sci & Informat, Muroran, Japan
基金
中国国家自然科学基金;
关键词
deep learning; secure inference; secure multi-party computation;
D O I
10.1002/cpe.8110
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Deep learning has shown its great potential in real-world applications. However, users(clients) who want to use deep learning applications need to send their data to the deep learning service provider (server), which can make the client's data leak to the server, resulting in serious privacy concerns. To address this issue, we propose a protocol named EPIDL to perform efficient and secure inference tasks on neural networks. This protocol enables the client and server to complete inference tasks by performing secure multi-party computation (MPC) and the client's private data is kept secret from the server. The work in EPIDL can be summarized as follows: First, we optimized the convolution operation and matrix multiplication, such that the total communication can be reduced; Second, we proposed a new method for truncation following secure multiplication based on oblivious transfer and garbled circuits, which will not fail and can be executed together with the ReLU activation function; Finally, we replace complex activation function with MPC-friendly approximation function. We implement our work in C++ and accelerate the local matrix computation with CUDA support. We evaluate the efficiency of EPIDL in privacy-preserving deep learning inference tasks, such as the time to execute a secure inference on the MNIST dataset in the LeNet model is about 0.14 s. Compared with the state-ofthe-art work, our work is 1.8x$$ \times $$-98x$$ \times $$ faster over LAN and WAN, respectively. The experimental results show that our EPIDL is efficient and privacy-preserving.
引用
收藏
页数:14
相关论文
共 30 条
[1]   QUOTIENT: Two-Party Secure Neural Network Training and Prediction [J].
Agrawal, Nitin ;
Shamsabadi, Ali Shahin ;
Kusner, Matt J. ;
Gascon, Adria .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :1231-1247
[2]   Privacy-Preserving Machine Learning: Threats and Solutions [J].
Al-Rubaie, Mohammad ;
Chang, J. Morris .
IEEE SECURITY & PRIVACY, 2019, 17 (02) :49-58
[3]   Scalable and Secure Logistic Regression via Homomorphic Encryption [J].
Aono, Yoshinori ;
Hayashi, Takuya ;
Le Trieu Phong ;
Wang, Lihua .
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2016, :142-144
[4]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145
[5]   Security and composition of multiparty cryptographic protocols [J].
Canetti, R .
JOURNAL OF CRYPTOLOGY, 2000, 13 (01) :143-202
[6]  
Chandran N., 2017, 20171109 CRYPT EPRIN, P1109
[7]   ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation [J].
Demmler, Daniel ;
Schneider, Thomas ;
Zohner, Michael .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[8]  
Ishai Y, 2003, LECT NOTES COMPUT SC, V2729, P145
[9]  
Juvekar C., 2018, GAZELLE: A Low Latency Framework for Secure Neural Network Inference
[10]  
Juvekar C, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1651