Private-preserving language model inference based on secure multi-party computation

被引:0
|
作者
Song, Chen [1 ,2 ]
Huang, Ruwei [1 ]
Hu, Sai [1 ,2 ]
机构
[1] Guangxi Univ, Sch Comp & Elect Informat, Nanning 530004, Guangxi, Peoples R China
[2] Guangxi Key Lab Multimedia Commun & Network Techno, Nanning 530004, Guangxi, Peoples R China
关键词
Privacy-preserving inference; Natural language processing; Secret sharing; Secure multi-party computation;
D O I
10.1016/j.neucom.2024.127794
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the exponential expansion of Internet information, technology that combines big data and artificial intelligence has gradually developed. Pre -trained large-scale language models with the transformer architecture as the core have begun to be used in daily life, resulting in the huge market of MLaaS. leading to the significant market of Machine Learning as a Service (MLaaS). Although MLaaS brings huge benefits to users, it requires receiving users' data for processing, which includes many sensitive data. While MLaaS offers considerable benefits, it necessitates processing users' data, which includes much sensitive data.Therefore, the problem of privacy data leakage has also been exposed. In this article paper, we propose a novel language model secure inference scheme based on secure multi -party computation (MPC) technology. This solution involves three non -colluding parties: the data provider, the model provider, and the computing power provider. Compared with direct inference on pre -trained large models, the proposed security inference framework improves the inference speed by 1.55-6.25 times. Our findings demonstrate that, when compared to conventional inference methods on pre -trained large-scale models, our approach significantly enhances inference efficiency, achieving speed improvements ranging from 1.55 to 6.25 times.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Secure Multi-party Computation of Differentially Private Median
    Bohler, Jonas
    Kerschbaum, Florian
    [J]. PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2147 - 2164
  • [2] A Fast and Secure Transformer Inference Scheme with Secure Multi-Party Computation
    Liu, Weixin
    Guan, Yewei
    Huo, Jiarong
    Ding, Yuanchao
    Guo, Hua
    Li, Bo
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (05): : 1218 - 1229
  • [3] Private outsourced model predictive control via secure multi-party computation
    Adelipour, Saeed
    Haeri, Mohammad
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 116
  • [4] Privacy preserving distributed data mining based on secure multi-party computation
    Liu, Jun
    Tian, Yuan
    Zhou, Yu
    Xiao, Yang
    Ansari, Nirwan
    [J]. COMPUTER COMMUNICATIONS, 2020, 153 : 208 - 216
  • [5] Privacy preserving sequential pattern mining based on secure multi-party computation
    Ouyang, Weimin
    Huang, Qinhua
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 149 - 154
  • [6] Secure Multi-Party Computation
    Bayatbabolghani, Fattaneh
    Blanton, Marina
    [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
  • [7] Secure Multi-party Computation of Differentially Private Heavy Hitters
    Boehler, Jonas
    Kerschbaum, Florian
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2361 - 2377
  • [8] Privacy preserving E-negotiation protocols based on secure multi-party computation
    Chakraborty, S
    Sehgal, SK
    Pal, AK
    [J]. PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: EXCELLENCE IN ENGINEERING, SCIENCE, AND TECHNOLOGY, 2005, : 455 - 461
  • [9] Heterogeneous Secure Multi-Party Computation
    Djatmiko, Mentari
    Cunche, Mathieu
    Boreli, Roksana
    Seneviratne, Aruna
    [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
  • [10] Quorum-based secure multi-party computation
    Beaver, D
    Wool, A
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 375 - 390