PrivacyEye: A Privacy-Preserving and Computationally Efficient Deep Learning-Based Mobile Video Analytics System

被引:10
作者
Du, Wei [1 ]
Li, Ang [2 ]
Zhou, Pan [3 ]
Niu, Ben [4 ]
Wu, Dapeng [5 ]
机构
[1] Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
[2] Duke Univ, Dept Elect & Comp Engn, Durham, NC 27708 USA
[3] Huazhong Univ Sci & Technol, Hubei Engn Res Ctr Big Data Secur, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[4] Chinese Acad Sci, Inst Informat Engn, Beijing 100864, Peoples R China
[5] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
基金
中国国家自然科学基金;
关键词
Feature extraction; Data mining; Task analysis; Color; Servers; Histograms; Privacy; Privacy protection; efficient mobile computing; deep learning; video analytics;
D O I
10.1109/TMC.2021.3050458
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Large volumes of video data recorded by the increasing mobile devices and embedded sensors can be leveraged to answer queries of our lives, physical world and our evolving society. Especially, the rapid development of convolutional neural networks (CNNs) in the past few years offers the great advantage for multiple tasks in video analysis. However, adopting running CNNs directly on mobile devices and embedded sensors for video analytics brings heavy burden due to their limited capacity, especially for learning a large volume of data. A promising approach is to outsource the computation-intensive part of CNN to cloud. However, the reveal of data to cloud may cause privacy leakage. In addition, the cloud-assisted approach may also bring some communication efficiency challenges for large volume of data. To address both privacy and efficiency issues, we design a privacy-preserving and computationally efficient framework for mobile video analytics. To protect the private information, we split the CNN model into two subnetworks, and first part is used as a feature extractor deployed in the mobile side and the second part is utilized as a classifier deployed in the cloud side. A specific-designed adversarial training process is adopted in order to extract features for normal task classification while hiding the features for sensitive task. In addition, to improve video process efficiency, we design a two-stage framework. The first stage is to extract key frames and necessary intermediate frames, while skipping redundant ones. The second stage is to extract the features of key frames by CNN-based feature extractor but apply optical-flow-based feature propagation algorithm to obtain the features of intermediate frames. Extensive experiments demonstrate our proposed system PrivacyEye can effectively protect private information while keep the accuracy of the normal tasks with less than 2 percent drop, and it saves up to 82.9 percent execution time and 78.8 percent energy consumption.
引用
收藏
页码:3263 / 3279
页数:17
相关论文
共 59 条
[1]  
Abadi M, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P265
[2]  
[Anonymous], 2015, PROC INT C LEARNING
[3]  
[Anonymous], 2008, Learning OpenCV
[4]  
[Anonymous], 2011, Differential Privacy, DOI [DOI 10.1007/978-1-4419-5906-5752, 10.1007/978-1-4419-5906-5752.https://doi.org/10.1007/978-1-4419-5906-5752]
[5]  
aws.amazon.com, 2019, ABOUTUS
[6]   HyCC: Compilation of Hybrid Protocols for Practical Secure Computation [J].
Buescher, Niklas ;
Demmler, Daniel ;
Katzenbeisser, Stefan ;
Kretzmer, David ;
Schneider, Thomas .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :847-861
[7]  
Council of European Union, 2014, COUNC REG EU 269 201
[8]  
Cover T. M., 2005, Wiley Series in Telecommunications and Signal Processing, V1st, DOI 10.1002/047174882X
[9]   Audio-based Activities of Daily Living (ADL) recognition with large-scale acoustic embeddings from online videos [J].
Liang, Dawei ;
Thomaz, Edison .
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 2019, 3 (01)
[10]  
digitaltrends.com, 2019, ABOUTUS