Improved Secure Deep Neural Network Inference Offloading with Privacy-Preserving Scalar Product Evaluation for Edge Computing

被引:1
作者
Li, Jiarui [1 ]
Zhang, Zhuosheng [1 ]
Yu, Shucheng [1 ]
Yuan, Jiawei [2 ]
机构
[1] Stevens Inst Technol, Dept Elect & Comp Engn, 1 Castle Point Terrace, Hoboken, NJ 07030 USA
[2] Univ Massachusetts Dartmouth, Dept Comp & Informat Sci, 285 Old Westport Rd, N Dartmouth, MA 02747 USA
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 18期
关键词
privacy; Internet of Things; convolutional neural networks; deep learning; computation outsourcing; edge computing; privacy-preserving scalar product; SYSTEM; IOT;
D O I
10.3390/app12189010
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Enabling deep learning inferences on resource-constrained devices is important for intelligent Internet of Things. Edge computing makes this feasible by outsourcing resource-consuming operations from IoT devices to edge devices. In such scenarios, sensitive data shall be protected while transmitted to the edge. To address this issue, one major challenge is to efficiently execute inference tasks without hampering the real-time operation of IoT applications. Existing techniques based on complex cryptographic primitives or differential privacy are limited to either efficiency or model accuracy. This paper addresses this challenge with a lightweight interactive protocol by utilizing low-latency IoT-to-edge communication links for computational efficiency. We achieve this with a new privacy-preserving scalar product evaluation technique that caters to the unique requirements of deep learning inference. As compared to the state-of-the-art, our solution offers improved trade-offs among privacy, efficiency, and utility. Experimental results on a Raspberry Pi 4 (Model B) show that our construction can achieve over 14x acceleration versus local execution for AlexNet inference over ImageNet. The proposed privacy-preserving scalar-product-evaluation technique can also be used as a general primitive in other applications.
引用
收藏
页数:17
相关论文
共 36 条
  • [1] QUOTIENT: Two-Party Secure Neural Network Training and Prediction
    Agrawal, Nitin
    Shamsabadi, Ali Shahin
    Kusner, Matt J.
    Gascon, Adria
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1231 - 1247
  • [2] Data Fusion and IoT for Smart Ubiquitous Environments: A Survey
    Alam, Furqan
    Mehmood, Rashid
    Katib, Iyad
    Albogami, Nasser N.
    Albeshri, Aiiad
    [J]. IEEE ACCESS, 2017, 5 : 9533 - 9554
  • [3] Bian S., 2020, P IEEE CVF C COMP VI, P9403
  • [4] nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data
    Boemer, Fabian
    Costache, Anamaria
    Cammarota, Rosario
    Wierzynski, Casimir
    [J]. PROCEEDINGS OF THE 7TH ACM WORKSHOP ON ENCRYPTED COMPUTING & APPLIED HOMOMORPHIC CRYPTOGRAPHY (WAHC'19), 2019, : 45 - 56
  • [5] Brakerski Z., 2012, ITCS 12, P309, DOI [10.1145/2090236.2090262, DOI 10.1145/2090236.2090262]
  • [6] Chaudhari H., 2019, 27 ANN NETW DISTR
  • [7] Collobert R., 2008, PROC INT C MACHINE L, P160, DOI DOI 10.1145/1390156.1390177
  • [8] CHET: An Optimizing Compiler for Fully-Homomorphic Neural-Network Inferencing
    Dathathri, Roshan
    Saarikivi, Olli
    Chen, Hao
    Laine, Kim
    Lauter, Kristin
    Maleki, Saeed
    Musuvathi, Madanlal
    Mytkowicz, Todd
    [J]. PROCEEDINGS OF THE 40TH ACM SIGPLAN CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION (PLDI '19), 2019, : 142 - 156
  • [9] Deng J, 2009, PROC CVPR IEEE, P248, DOI 10.1109/CVPRW.2009.5206848
  • [10] Dowlin N, 2016, PR MACH LEARN RES, V48