Privacy-preserving remote deep-learning-based inference under constrained client-side environment

被引:2
作者
Boulemtafes, Amine [1 ,2 ]
Derhab, Abdelouahid [3 ]
Ait Ali Braham, Nassim [4 ]
Challal, Yacine [5 ]
机构
[1] Ctr Rech Informat Sci & Tech, Div Secur Informat, Algiers, Algeria
[2] Univ Bejaia, Fac Sci Exactes, Dept Informat, Bejaia 06000, Algeria
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
[4] PSL Res Univ, Univ Paris Dauphine, CNRS, LAMSADE, F-75016 Paris, France
[5] Ecole Natl Super Informat, Lab Methodes Concept Syst, Algiers, Algeria
关键词
Deep learning; Deep neural network; Privacy; Sensitive data; Constrained; Inference;
D O I
10.1007/s12652-021-03312-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Remote deep learning paradigm raises important privacy concerns related to clients sensitive data and deep learning models. However, dealing with such concerns may come at the expense of more client-side overhead, which does not fit applications relying on constrained environments. In this paper, we propose a privacy-preserving solution for deep-learning-based inference, which ensures effectiveness and privacy, while meeting efficiency requirements of constrained client-side environments. The solution adopts the non-colluding two-server architecture, which prevents accuracy loss as it avoids using approximation of activation functions, and copes with constrained client-side due to low overhead cost. The solution also ensures privacy by leveraging two reversible perturbation techniques in combination with paillier homomorphic encryption scheme. Client-side overhead evaluation compared to the conventional homomorphic encryption approach, achieves up to more than two thousands times improvement in terms of execution time, and up to more than thirty times improvement in terms of the transmitted data size.
引用
收藏
页码:553 / 566
页数:14
相关论文
共 52 条
[1]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[2]   Deep learning approaches for anomaly-based intrusion detection systems: A survey, taxonomy, and open issues [J].
Aldweesh, Arwa ;
Derhab, Abdelouahid ;
Emam, Ahmed Z. .
KNOWLEDGE-BASED SYSTEMS, 2020, 189
[3]  
[Anonymous], INT C MACH LEARN
[4]  
[Anonymous], DAT PYTH PAILL
[5]  
[Anonymous], PYMPL 2021 PYMPL 0 5
[6]  
[Anonymous], BOSSW PYS
[7]  
[Anonymous], 2018, ARXIV180903272
[8]  
[Anonymous], 2017, P 2017 CLOUD COMP SE
[9]  
[Anonymous], MWOJN NIFT
[10]  
Baryalai M, 2016, ANN CONF PRIV SECUR