Privacy-Preserving distributed deep learning based on secret sharing

被引:35
作者
Duan, Jia [1 ]
Zhou, Jiantao [1 ]
Li, Yuanman [2 ]
机构
[1] Univ Macau, Fac Sci & Technol, Dept Comp & Informat Sci, State Key Lab Internet Things Smart City, Taipa, Macao, Peoples R China
[2] Shenzhen Univ, Coll Elect & Informat Engn, Shenzhen, Peoples R China
关键词
Deep neural network; Distributed deep learning; Secure multi-party computation; Privacy preserving; Secret sharing; LARGE-SCALE SYSTEMS; CLOUD; SECURE; ENCRYPTION; SEARCH;
D O I
10.1016/j.ins.2020.03.074
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed deep learning (DDL) naturally provides a privacy-preserving solution to enable multiple parties to jointly learn a deep model without explicitly sharing the local datasets. However, the existing privacy-preserving DDL schemes still suffer from severe information leakage and/or lead to significant increase of the communication cost. In this work, we design a privacy-preserving DDL framework such that all the participants can keep their local datasets private with low communication and computational cost, while still maintaining the accuracy and efficiency of the learned model. By adopting an effective secret sharing strategy, we allow each participant to split the intervening parameters in the training process into shares and upload an aggregation result to the cloud server. We can theoretically show that the local dataset of a particular participant can be well protected against the honest-but-curious cloud server as well as the other participants, even under the challenging case that the cloud server colludes with some participants. Extensive experimental results are provided to validate the superiority of the proposed secret sharing based distributed deep learning (SSDDL) framework. (C) 2020 Elsevier Inc. All rights reserved.
引用
收藏
页码:108 / 127
页数:20
相关论文
共 48 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
[Anonymous], 2014, C EMPIRICAL METHODS, DOI 10.3115/v1/d14-1179.
[3]  
[Anonymous], 2011, JMLR WORKSHOP C P
[4]  
[Anonymous], 2009, P 26 ANN INT C MACH
[5]  
Barni Mauro, 2006, P 8 WORKSH MULT SEC, P146
[6]  
Bellare M, 2003, LECT NOTES COMPUT SC, V2612, P1
[7]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Chabanne H., 2017, IACR CRYPTOL EPRINT, V2017, P35, DOI DOI 10.1109/WITS.2017.7934613
[10]   New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations [J].
Chen, Xiaofeng ;
Huang, Xinyi ;
Li, Jin ;
Ma, Jianfeng ;
Lou, Wenjing ;
Wong, Duncan S. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (01) :69-78