Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud

被引:0
|
作者
Liu, Pinglan [1 ]
Zhang, Wensheng [1 ]
机构
[1] Iowa State Univ, Dept Comp Sci, Ames, IA 50011 USA
来源
2023 IEEE 16TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, CLOUD | 2023年
关键词
Autonomous Model Refining; Confidentiality; Homomorphic Encryption; Trusted Execution Environment;
D O I
10.1109/CLOUD60044.2023.00071
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of cloud computing and machine learning, it has been a trend to outsource machine learning processes (including model training and model-based inference) to cloud. By the outsourcing, other than utilizing the extensive and scalable resource offered by the cloud service provider, it will also be attractive to users if the cloud servers can manage the machine learning processes autonomously on behalf of the users. Such a feature will be especially salient when the machine learning is expected to be a long-term continuous process and the users are not always available to participate. Due to security and privacy concerns, it is also desired that the autonomous learning preserves the confidentiality of users' data and models involved. Hence, in this paper, we aim to design a scheme that enables autonomous and confidential model refining in cloud. Homomorphic encryption and trusted execution environment technology can protect confidentiality for autonomous computation, but each of them has their limitations respectively and they are complementary to each other. Therefore, we further propose to integrate these two techniques in the design of the model refining scheme. Through implementation and experiments, we evaluate the feasibility of our proposed scheme. The results indicate that, with our proposed scheme the cloud server can autonomously refine an encrypted model with newly provided encrypted training data to continuously improve its accuracy. Though the efficiency is still significantly lower than the baseline scheme that refines plaintext-model with plaintext-data, we expect that it can be improved by fully utilizing the higher level of parallelism and the computational power of GPU at the cloud server.
引用
收藏
页码:529 / 539
页数:11
相关论文
共 8 条
  • [1] Combining Homomorphic Encryption with Trusted Execution Environment: A Demonstration with Paillier Encryption and SGX
    Drucker, Nir
    Gueron, Shay
    PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 85 - 88
  • [2] Malicious Code Detection for Trusted Execution Environment Based on Paillier Homomorphic Encryption
    Wang, Ziwang
    Zhuang, Yi
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2020, E103B (03) : 155 - 166
  • [3] Pivacy-preserving federated learning based on multi-key fully homomorphic encryption and trusted execution environment
    Gang Liu
    Zheng He
    Le Cheng
    Yi Luo
    Senmiao Su
    Jingchen Su
    Keming Zhang
    Peer-to-Peer Networking and Applications, 2025, 18 (4)
  • [4] Ciphertext Retrieval Technology of Homomorphic Encryption Based on Cloud Pretreatment
    Gong, Changqing
    Xiao, Yun
    Li, Mengfei
    Han, Shoufei
    Lin, Na
    Guo, Zhenzhou
    NEURAL INFORMATION PROCESSING, ICONIP 2017, PT V, 2017, 10638 : 741 - 751
  • [5] Secure Cloud Storage with Client-side Encryption using a Trusted Execution Environment
    da Rocha, Marciano
    Gomes Valadares, Dalton Cezane
    Perkusich, Angelo
    Gorgonio, Kyller Costa
    Pagno, Rodrigo Tomaz
    Will, Newton Carlos
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE (CLOSER), 2020, : 31 - 43
  • [6] Enhanced security in federated learning by integrating homomorphic encryption for privacy-protected, collaborative model training
    Rao, Ganga Rama Koteswara
    Ghanimi, Hayder M. A.
    Ramachandran, V.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A) : 361 - 370
  • [7] Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment
    Jeniffer, J. Thresa
    Chandrasekar, A.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2022, 15 (01) : 703 - 723
  • [8] Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment
    J. Thresa Jeniffer
    A. Chandrasekar
    Peer-to-Peer Networking and Applications, 2022, 15 : 703 - 723