DeepGuard: Backdoor Attack Detection and Identification Schemes in Privacy-Preserving Deep Neural Networks

被引:4
作者
Chen, Congcong [1 ]
Wei, Lifei [2 ]
Zhang, Lei [1 ]
Peng, Ya [1 ]
Ning, Jianting [3 ]
机构
[1] Shanghai Ocean Univ, Coll Informat Technol, Shanghai 201306, Peoples R China
[2] Shanghai Maritime Univ, Coll Informat Engn, Shanghai 201306, Peoples R China
[3] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou 350117, Peoples R China
基金
上海市自然科学基金; 中国国家自然科学基金;
关键词
D O I
10.1155/2022/2985308
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deep neural networks (DNNs) have profoundly changed our lifeways in recent years. The cost of training a complicated DNN model is always overwhelming for most users with limited computation and storage resources. Consequently, an increasing number of people are considering to resort to a cloud for an outsourced DNN model training. However, the DNN models training process outsourced to the cloud faces privacy and security issues due to the semi-honest and malicious cloud environments. To preserve the privacy of the data and the parameters in DNN models during the outsourced training and to detect whether the models are injected with backdoors, this paper presents DeepGuard, a framework of privacy-preserving backdoor detection and identification in an outsourced cloud environment for multi-participant computation. In particular, we design a privacy-preserving reverse engineering algorithm for recovering the triggers and detecting the backdoor attacks among three cooperative but non-collusion servers. Moreover, we propose a backdoor identification algorithm adapting to single-label and multi-label attack detection. Finally, extensive experiments on the prevailing datasets such as MNIST, SVHN, and GTSRB confirm the effectiveness and efficiency of backdoor detection and identification in a privacy-preserving DNN model.
引用
收藏
页数:20
相关论文
共 53 条
[1]   High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority [J].
Araki, Toshinori ;
Furukawa, Jun ;
Lindell, Yehuda ;
Nof, Ariel ;
Ohara, Kazuma .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :805-817
[2]  
Bagdasaryan E, 2021, PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, P1505
[3]  
Byali Megha, 2020, Proceedings on Privacy Enhancing Technologies, V2020, P459, DOI [10.2478/popets-2020-0036, 10.2478/popets-2020-0036]
[4]  
Chaudhari H., 2020, TRIDENT EFFICIENT 4P
[5]   ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction [J].
Chaudhari, Harsh ;
Choudhury, Ashish ;
Patra, Arpita ;
Suresh, Ajith .
CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, :81-92
[6]  
Chen B., 2019, SAFEAI AAAI, V2301
[7]   MP-BADNet: A Backdoor-Attack Detection and Identification Protocol among Multi-Participants in Private Deep Neural Networks [J].
Chen, Congcong ;
Wei, Lifei ;
Zhang, Lei ;
Ning, Jianting .
PROCEEDINGS OF ACM TURING AWARD CELEBRATION CONFERENCE, ACM TURC 2021, 2021, :104-109
[8]  
Chen HL, 2019, PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P4658
[9]  
Chen X., 2021, P ICML 2021 WORKSHOP
[10]  
Chou E., 2020, SENTINET DETECTING L, P48