Improved Secure Deep Neural Network Inference Offloading with Privacy-Preserving Scalar Product Evaluation for Edge Computing

被引:1
作者
Li, Jiarui [1 ]
Zhang, Zhuosheng [1 ]
Yu, Shucheng [1 ]
Yuan, Jiawei [2 ]
机构
[1] Stevens Inst Technol, Dept Elect & Comp Engn, 1 Castle Point Terrace, Hoboken, NJ 07030 USA
[2] Univ Massachusetts Dartmouth, Dept Comp & Informat Sci, 285 Old Westport Rd, N Dartmouth, MA 02747 USA
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 18期
关键词
privacy; Internet of Things; convolutional neural networks; deep learning; computation outsourcing; edge computing; privacy-preserving scalar product; SYSTEM; IOT;
D O I
10.3390/app12189010
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Enabling deep learning inferences on resource-constrained devices is important for intelligent Internet of Things. Edge computing makes this feasible by outsourcing resource-consuming operations from IoT devices to edge devices. In such scenarios, sensitive data shall be protected while transmitted to the edge. To address this issue, one major challenge is to efficiently execute inference tasks without hampering the real-time operation of IoT applications. Existing techniques based on complex cryptographic primitives or differential privacy are limited to either efficiency or model accuracy. This paper addresses this challenge with a lightweight interactive protocol by utilizing low-latency IoT-to-edge communication links for computational efficiency. We achieve this with a new privacy-preserving scalar product evaluation technique that caters to the unique requirements of deep learning inference. As compared to the state-of-the-art, our solution offers improved trade-offs among privacy, efficiency, and utility. Experimental results on a Raspberry Pi 4 (Model B) show that our construction can achieve over 14x acceleration versus local execution for AlexNet inference over ImageNet. The proposed privacy-preserving scalar-product-evaluation technique can also be used as a general primitive in other applications.
引用
收藏
页数:17
相关论文
共 36 条
  • [21] Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge
    Liu, Xiaoning
    Wu, Bang
    Yuan, Xingliang
    Yi, Xun
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 237 - 252
  • [22] Mishra P, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P2505
  • [23] Deep Learning for IoT Big Data and Streaming Analytics: A Survey
    Mohammadi, Mehdi
    Al-Fuqaha, Ala
    Sorour, Sameh
    Guizani, Mohsen
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 2923 - 2960
  • [24] ABY3: A Mixed Protocol Framework for Machine Learning
    Mohassel, Payman
    Rindal, Peter
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 35 - 52
  • [25] Motamedi M., 2016, ARXIV
  • [26] Joint wireless power transfer and task offloading in mobile edge computing: a survey
    Mustafa, Ehzaz
    Shuja, Junaid
    Zaman, S. Khaliq Uz
    Jehangiri, Ali Imran
    Din, Sadia
    Rehman, Faisal
    Mustafa, Saad
    Maqsood, Tahir
    Khan, Abdul Nasir
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2429 - 2448
  • [27] CRYPTFLow2: Practical 2-Party Secure Inference
    Rathee, Deevashwer
    Rathee, Mayank
    Kumar, Nishant
    Chandran, Nishanth
    Gupta, Divya
    Rastogi, Aseem
    Sharma, Rahul
    [J]. CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 325 - 342
  • [28] Riazi MS, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P1501
  • [29] Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications
    Riazi, M. Sadegh
    Weinert, Christian
    Tkachenko, Oleksandr
    Songhori, Ebrahim M.
    Schneider, Thomas
    Koushanfar, Farinaz
    [J]. PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 707 - 721
  • [30] Tang J, 2017, COMPUTER, V50, P92, DOI 10.1109/MC.2017.3641648