Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge

被引:25
作者
Liu, Xiaoning [1 ]
Wu, Bang [2 ]
Yuan, Xingliang [2 ]
Yi, Xun [1 ]
机构
[1] RMIT Univ, Sch Comp Technol, Melbourne, Vic 3001, Australia
[2] Monash Univ, Fac Informat Technol, Clayton, Vic 3800, Australia
基金
澳大利亚研究理事会;
关键词
Artificial neural networks; Cryptography; Computational modeling; Protocols; Servers; Privacy; Mobile handsets; Secure computation; privacy-preserving mobile application; neural network inference; edge computing;
D O I
10.1109/TIFS.2021.3138611
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advances in machine learning have revealed its great potential for emerging mobile applications such as face recognition and voice assistant. Models trained via a Neural Network (NN) can offer accurate and efficient inference services for mobile users. Unfortunately, the current deployment of such service encounters privacy concerns. Directly offloading the model to the mobile device violates model privacy of the model owner, while feeding user input to the service compromises user privacy. To address this issue, we propose Leia, a lightweight cryptographic NN inference system at the edge. Leia is designed from two mobile-friendly perspectives. First, it leverages the paradigm of edge computing wherein the inference procedure keeps the model closer to the mobile user to foster low latency service. Specifically, Leia's architecture consists of two non-colluding edge services to obliviously perform NN inference on the encoded user data and model. Second, Leia's realization makes the judicious use of potentially constrained computational and communication resources in edge devices. We adapt the Binarized Neural Network (BNN), a trending flavor of NN with low inference overhead, and purely choose the lightweight secret sharing techniques to realize secure blocks of BNN. We implement Leia and deploy it on Raspberry Pi. Empirical evaluations on benchmark and medical datasets via various models demonstrate the practicality of Leia.
引用
收藏
页码:237 / 252
页数:16
相关论文
共 38 条
[1]   QUOTIENT: Two-Party Secure Neural Network Training and Prediction [J].
Agrawal, Nitin ;
Shamsabadi, Ali Shahin ;
Kusner, Matt J. ;
Gascon, Adria .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :1231-1247
[2]  
[Anonymous], 2016, CoRR abs/1602.02830
[3]  
[Anonymous], 2018, FlexSC
[4]  
Asharov G., 2013, P 2013 ACM SIGSAC C, P535, DOI DOI 10.1145/2508859.2516738
[5]  
Atallah M., 2004, P 2004 ACM WORKSH PR, P103, DOI DOI 10.1145/1029179.1029204
[6]   Mad Max: Affine Spline Insights Into Deep Learning [J].
Balestriero, Randall ;
Baraniuk, Richard G. .
PROCEEDINGS OF THE IEEE, 2021, 109 (05) :704-727
[7]   Use of a portable computed tomography scanner for chest imaging of COVID-19 patients in the urgent care at a tertiary cancer center [J].
Bates, David D. B. ;
Vintonyak, Andriy ;
Mohabir, Rennie ;
Mahmood, Usman ;
Soto, Pat ;
Groeger, Jeffrey S. ;
Ginsberg, Michelle S. ;
Gollub, Marc J. .
EMERGENCY RADIOLOGY, 2020, 27 (06) :597-600
[8]  
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420
[9]   Improved Building Blocks for Secure Multi-party Computation Based on Secret Sharing with Honest Majority [J].
Blanton, Marina ;
Kang, Ahreum ;
Yuan, Chen .
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2020), PT I, 2020, 12146 :377-397
[10]   Universally composable security: A new paradigm for cryptographic protocols [J].
Canetti, R .
42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, :136-145