Privacy-preserving remote deep-learning-based inference under constrained client-side environment

被引:0
作者
Amine Boulemtafes
Abdelouahid Derhab
Nassim Ait Ali Braham
Yacine Challal
机构
[1] Centre de Recherche sur l’Information Scientifique et Technique,Division Sécurité Informatique
[2] Université de Bejaia,Département Informatique, Faculté des Sciences exactes
[3] King Saud University,Center of Excellence in Information Assurance
[4] Université Paris-Dauphine,CNRS, LAMSADE
[5] PSL Research University,Laboratoire de Méthodes de Conception des Systèmes
[6] Ecole Nationale Supérieure d’Informatique,undefined
来源
Journal of Ambient Intelligence and Humanized Computing | 2023年 / 14卷
关键词
Deep learning; Deep neural network; Privacy; Sensitive data; Constrained; Inference;
D O I
暂无
中图分类号
学科分类号
摘要
Remote deep learning paradigm raises important privacy concerns related to clients sensitive data and deep learning models. However, dealing with such concerns may come at the expense of more client-side overhead, which does not fit applications relying on constrained environments. In this paper, we propose a privacy-preserving solution for deep-learning-based inference, which ensures effectiveness and privacy, while meeting efficiency requirements of constrained client-side environments. The solution adopts the non-colluding two-server architecture, which prevents accuracy loss as it avoids using approximation of activation functions, and copes with constrained client-side due to low overhead cost. The solution also ensures privacy by leveraging two reversible perturbation techniques in combination with paillier homomorphic encryption scheme. Client-side overhead evaluation compared to the conventional homomorphic encryption approach, achieves up to more than two thousands times improvement in terms of execution time, and up to more than thirty times improvement in terms of the transmitted data size.
引用
收藏
页码:553 / 566
页数:13
相关论文
共 73 条
[1]  
Acar A(2018)A survey on homomorphic encryption schemes ACM Comput Surv 51 1-35
[2]  
Aksu H(2020)Deep learning approaches for anomaly-based intrusion detection systems: a survey, taxonomy, and open issues Knowl Based Syst 189 105124-127
[3]  
Uluagac A(2009)Learning deep architectures for AI Found Trends Mach Learn 2 1-45
[4]  
Conti M(2020)A review of privacy-preserving techniques for deep learning Neurocomputing 384 21-36
[5]  
Aldweesh A(2014)(Leveled) fully homomorphic encryption without bootstrapping ACM Trans Comput Theory 6 1-472
[6]  
Derhab A(2014)A tutorial survey of architectures, algorithms, and applications for deep learning APSIPA Trans Signal Inf Process 31 469-90
[7]  
Emam A(1985)A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans Inf Theory 50 102419-444
[8]  
Bengio Y(2020)Deep learning for cyber security intrusion detection: approaches, datasets, and comparative study J Inf Secur Appl 147 70-88
[9]  
Boulemtafes A(2018)Deep learning in agriculture: a survey Comput Electron Agric 521 436-26
[10]  
Derhab A(2015)Deep learning Nature 42 60-4889