Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions

被引:48
作者
Li, Minghui [1 ,2 ]
Chow, Sherman S. M. [3 ]
Hu, Shengshan [4 ]
Yan, Yuejing [5 ]
Shen, Chao [6 ]
Wang, Qian [1 ,2 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Key Lab Aerosp Informat Secur & Trusted Comp, Minist Educ, Wuhan 430072, Hubei, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Chinese Univ Hong Kong, Dept Informat Engn, Shatin, Hong Kong, Peoples R China
[4] Huazhong Univ Sci & Technol, Natl Engn Res Ctr Big Data Technol & Syst, Sch Cyber Sci & Engn, Serv Comp Technol & Syst Lab,Cluster & Grid Comp, Wuhan 430074, Hubei, Peoples R China
[5] Wuhan Univ, State Key Lab Informat Engn Surveying Mapping & R, Wuhan 430072, Hubei, Peoples R China
[6] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, MOE Key Lab Intelligent Networks & Network Secur, Xian 710049, Shaanxi, Peoples R China
关键词
Secure outsourcing; machine learning; convolutional neural network; homomorphic encryption;
D O I
10.1109/TDSC.2020.3029899
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Convolutional neural networks (CNN) is a popular architecture in machine learning for its predictive power, notably in computer vision and medical image analysis. Its great predictive power requires extensive computation, which encourages model owners to host the prediction service in a cloud platform. This article proposes a CNN prediction scheme that preserves privacy in the outsourced setting, i.e., the model-hosting server cannot learn the query, (intermediate) results, and the model. Similar to SecureML (S&P'17), a representative work that provides model privacy, we employ two non-colluding servers with secret sharing and triplet generation to minimize the usage of heavyweight cryptography. We made the following optimizations for both overall latency and accuracy. 1) We adopt asynchronous computation and SIMD for offline triplet generation and parallelizable online computation. 2) As MiniONN (CCS'17) and its improvement by the generic EzPC compiler (EuroS&P'19), we use a garbled circuit for the non-polynomial ReLU activation to keep the same accuracy as the underlying network (instead of approximating it in SecureML prediction). 3) For the pooling in CNN, we employ (linear) average-pooling, which achieves almost the same accuracy as the (non-linear, and hence less efficient) max-pooling exhibited by MiniONN and EzPC. Considering both offline and online costs, our experiments on the MNIST dataset show a latency reduction of 122 x, 14.63 x, and 36.69x compared to SecureML, MiniONN, and EzPC; and a reduction of communication costs by 1.09 x, 36.69 x, and 31.32 x, respectively. On the CIFAR dataset, our scheme achieves a lower latency by 7.14x and 3.48x and lower communication costs by 13.88x and 77.46x when compared with MiniONN and EzPC, respectively.
引用
收藏
页码:1592 / 1604
页数:13
相关论文
共 46 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[3]   Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption [J].
Aloufi, Asma ;
Hu, Peizhao ;
Wong, Harry W. H. ;
Chow, Sherman S. M. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (04) :1821-1835
[4]  
BEAVER D, 1992, LECT NOTES COMPUT SC, V576, P420
[5]  
Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
[6]   Machine Learning Classification over Encrypted Data [J].
Bost, Raphael ;
Popa, Raluca Ada ;
Tu, Stephen ;
Goldwasser, Shafi .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[7]   EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning [J].
Chandran, Nishanth ;
Gupta, Divya ;
Rastogi, Aseem ;
Sharma, Rahul ;
Tripathi, Shardul .
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, :496-511
[8]  
Chow S., 2009, NDSS, DOI [DOI 10.1109/ICDRET.2009.5454192, 10.1109/ICDRET.2009.5454192, DOI 10.1109/WI-IAT.2012.73]
[9]   Privacy-Preserving Machine Learning [J].
Chow, Sherman S. M. .
FRONTIERS IN CYBER SECURITY, 2018, 879 :3-6
[10]  
Chowdhury S. H., 2019, P INT WORKSH SEC CLO, P1, DOI DOI 10.1145/3327962.3331455