Secure Inference via Deep Learning as a Service without Privacy Leakage

被引:0
作者
Anh-Tu Tran [1 ]
The-Dung Luong [1 ]
Cong-Chieu Ha [1 ]
Duc-Tho Hoang [1 ]
Thi-Luong Tran [1 ]
机构
[1] Acad Cryptog Tech, Hanoi, Vietnam
来源
2021 RIVF INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES (RIVF 2021) | 2021年
关键词
Deep Learning; Privacy; Cloud; Secure Multiparty Computation;
D O I
10.1109/RIVF51545.2021.9642089
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing plays an important role in many applications today. There is a lot of machine learning as a service that provides models for users' prediction online. However, in many problems which involve healthcare or finances, the privacy of the data that sends from users to the cloud server needs to be considered. Machine learning as a service application does not only require accurate predictions but also ensures data privacy and security. In this paper, we present a novel secure protocol that ensures to compute a scalar product of two real number vectors without revealing the origin of themselves. The scalar product is the most common operation that used in the deep neural network so that our proposed protocol can be used to allow a data owner to send her data to a cloud service that hosts a deep model to get a prediction of input data. We show that the cloud service is capable of applying the neural network to make predictions without knowledge of the user's original data. We demonstrate our proposed protocol on an image benchmark dataset MNIST and an real life application dataset - COVID-19. The results show that our model can achieve 98.8% accuracy on MNIST and 95.02% on COVID-19 dataset with very simple network architecture and nearly no reduction in accuracy when compares with the original model. Moreover, the proposed system can make around 120000 predictions per hour on a single PC with low resources. Therefore, they allow high throughput, accurate, and private predictions.
引用
收藏
页码:267 / 272
页数:6
相关论文
共 29 条
[1]  
Aggarwal CC, 2018, NEURAL NETWORKS DEEP, V10, P978, DOI [10.1007/978-3-319-94463-0, DOI 10.1007/978-3-319-94463-0]
[2]   Fast Homomorphic Evaluation of Deep Discretized Neural Networks [J].
Bourse, Florian ;
Minelli, Michele ;
Minihold, Matthias ;
Paillier, Pascal .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III, 2018, 10993 :483-512
[3]  
Chabanne H., 2017, IACR CRYPTOL EPRINT, P1
[4]  
Chou ED, 2018, Arxiv, DOI arXiv:1811.09953
[5]  
Dayin Zhang, 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC). Proceedings, P652, DOI 10.1109/DSC.2018.00104
[6]  
Dowlin N, 2016, PR MACH LEARN RES, V48
[7]  
Goodfellow I, 2016, ADAPT COMPUT MACH LE, P77
[8]   node2vec: Scalable Feature Learning for Networks [J].
Grover, Aditya ;
Leskovec, Jure .
KDD'16: PROCEEDINGS OF THE 22ND ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2016, :855-864
[9]   Deep learning with word embeddings improves biomedical named entity recognition [J].
Habibi, Maryam ;
Weber, Leon ;
Neves, Mariana ;
Wiegandt, David Luis ;
Leser, Ulf .
BIOINFORMATICS, 2017, 33 (14) :I37-I48
[10]  
Hesamifard E, 2017, Arxiv, DOI [arXiv:1711.05189, DOI 10.48550/ARXIV.1711.05189]