Defending CNN against privacy leakage in edge computing via binary neural networks

被引:7
|
作者
Qiang, Weizhong [1 ,2 ]
Liu, Renwan [1 ,3 ]
Jin, Hai [1 ,3 ]
机构
[1] Huazhong Univ Sci & Technol, Serv Comp Technol & Syst Lab, Natl Engn Res Ctr Big Data Technol & Syst, Big Data Secur Engn Res Ctr,Cluster & Grid Comp L, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[3] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy-preserving machine learning; Binary neural network; Edge computing;
D O I
10.1016/j.future.2021.06.037
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the IoT has developed, edge computing has played an increasingly important role in the IoT ecosystem. The edge computing paradigm offers low latency and high computing performance, which is conducive to machine learning tasks such as object detection in autonomous driving. However, data privacy risks in edge computing still exist and the existing privacy-preserving methods are not satisfactory due to the large computational overhead and unbearable accuracy loss. We have designed a privacy-preserving machine learning framework for both user and cloud data. Users and the cloud provide data for inference and training respectively, and the privacy protection of these two aspects is both considered in this paper. Users provide test data and want to access the data-processing models in cloud for inference, and the cloud provides the training data used for training an eligible model. For user data, in order to maintain the overall performance of the machine learning framework while using homomorphic encryption, instead of providing encrypted data to all machine learning tasks, we divide the neural network into two parts, with one part kept on the trusted edge and provided with plaintext, and the other deployed on the untrusted cloud and provided with encrypted input. For cloud data, we apply the binary neural network, a network with the binarized value of weights. This method is practical for narrowing the confidence score gap (between the training and test sets) predicted by the model, which accounts most for a successful exploratory attack on training data. Experiments demonstrate that the results of the adversary's membership inference attack are close to random guessing, and the accuracy is only slightly affected. Compared with the unencrypted network on VGG19, when the network is split from conv4_1 to fc8, the efficiency of using HE is only 100 to 30 times slower. (C) 2021 Elsevier B.V. All rights reserved.
引用
下载
收藏
页码:460 / 470
页数:11
相关论文
共 50 条
  • [1] A Review of Recent Advances of Binary Neural Networks for Edge Computing
    Zhao W.
    Ma T.
    Gong X.
    Zhang B.
    Doermann D.
    IEEE Journal on Miniaturization for Air and Space Systems, 2021, 2 (01): : 25 - 35
  • [2] Anchor Link Prediction via Network Structural Role for Privacy Leakage in Edge Computing
    Wang, Huanran
    Yang, Wu
    Lv, Jiguang
    Wang, Hanbo
    Tan, Jingwen
    Man, Dapeng
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 6030 - 6036
  • [3] FPGA-based acceleration for binary neural networks in edge computing
    Zhan J.-Y.
    Yu A.-T.
    Jiang W.
    Yang Y.-J.
    Xie X.-N.
    Chang Z.-W.
    Yang J.-H.
    Journal of Electronic Science and Technology, 2023, 21 (02)
  • [4] FPGA-based acceleration for binary neural networks in edge computing
    JinYu Zhan
    AnTai Yu
    Wei Jiang
    YongJia Yang
    XiaoNa Xie
    ZhengWei Chang
    JunHuan Yang
    Journal of Electronic Science and Technology, 2023, 21 (02) : 67 - 79
  • [5] Deniable-Based Privacy-Preserving Authentication Against Location Leakage in Edge Computing
    Zeng, Shengke
    Zhang, Hongjie
    Hao, Fei
    Li, Hongwei
    IEEE SYSTEMS JOURNAL, 2022, 16 (02): : 1729 - 1738
  • [6] Defending against adversarial attacks on graph neural networks via similarity property
    Yao, Minghong
    Yu, Haizheng
    Bian, Hong
    AI COMMUNICATIONS, 2023, 36 (01) : 27 - 39
  • [7] Defending edge computing based metaverse AI against adversarial attacks
    Yi, Zhangao
    Qian, Yongfeng
    Chen, Min
    Alqahtani, Salman A.
    Hossain, M. Shamim
    AD HOC NETWORKS, 2023, 150
  • [8] Model architecture level privacy leakage in neural networks
    Yan Li
    Hongyang Yan
    Teng Huang
    Zijie Pan
    Jiewei Lai
    Xiaoxue Zhang
    Kongyang Chen
    Jin Li
    Science China Information Sciences, 2024, 67
  • [9] Model architecture level privacy leakage in neural networks
    Li, Yan
    Yan, Hongyang
    Huang, Teng
    Pan, Zijie
    Lai, Jiewei
    Zhang, Xiaoxue
    Chen, Kongyang
    Li, Jin
    SCIENCE CHINA-INFORMATION SCIENCES, 2024, 67 (03)
  • [10] Binary classification architecture for Edge Computing based on cognitive services and deep neural networks
    Chancusig, Cristian
    Tumbaco, Sergio
    Alulema, Darwin
    Iribarne, Luis
    Criado, Javier
    PROCEEDINGS OF 2022 14TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF DIGITAL ECOSYSTEMS, MEDES 2022, 2022, : 148 - 155