Defending CNN against privacy leakage in edge computing via binary neural networks

被引:7
|
作者
Qiang, Weizhong [1 ,2 ]
Liu, Renwan [1 ,3 ]
Jin, Hai [1 ,3 ]
机构
[1] Huazhong Univ Sci & Technol, Serv Comp Technol & Syst Lab, Natl Engn Res Ctr Big Data Technol & Syst, Big Data Secur Engn Res Ctr,Cluster & Grid Comp L, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[3] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy-preserving machine learning; Binary neural network; Edge computing;
D O I
10.1016/j.future.2021.06.037
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the IoT has developed, edge computing has played an increasingly important role in the IoT ecosystem. The edge computing paradigm offers low latency and high computing performance, which is conducive to machine learning tasks such as object detection in autonomous driving. However, data privacy risks in edge computing still exist and the existing privacy-preserving methods are not satisfactory due to the large computational overhead and unbearable accuracy loss. We have designed a privacy-preserving machine learning framework for both user and cloud data. Users and the cloud provide data for inference and training respectively, and the privacy protection of these two aspects is both considered in this paper. Users provide test data and want to access the data-processing models in cloud for inference, and the cloud provides the training data used for training an eligible model. For user data, in order to maintain the overall performance of the machine learning framework while using homomorphic encryption, instead of providing encrypted data to all machine learning tasks, we divide the neural network into two parts, with one part kept on the trusted edge and provided with plaintext, and the other deployed on the untrusted cloud and provided with encrypted input. For cloud data, we apply the binary neural network, a network with the binarized value of weights. This method is practical for narrowing the confidence score gap (between the training and test sets) predicted by the model, which accounts most for a successful exploratory attack on training data. Experiments demonstrate that the results of the adversary's membership inference attack are close to random guessing, and the accuracy is only slightly affected. Compared with the unencrypted network on VGG19, when the network is split from conv4_1 to fc8, the efficiency of using HE is only 100 to 30 times slower. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页码:460 / 470
页数:11
相关论文
共 50 条
  • [21] Privacy Leakage via Attribute Inference in Directed Social Networks
    Wong, Raymond K.
    Vidyalakshmi, B. S.
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2016, 2016, 9977 : 333 - 346
  • [22] SybilGuard: Defending against sybil attacks via social networks
    Yu, Haifeng
    Kaminsky, Michael
    Gibbons, Phillip B.
    Flaxman, Abraham
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2006, 36 (04) : 267 - 278
  • [23] SybilGuard: Defending against sybil attacks via social networks
    Yu, Haifeng
    Kaminsky, Michael
    Gibbons, Phillip B.
    Flaxman, Abraham D.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (03) : 576 - 589
  • [24] The Case for Adaptive Deep Neural Networks in Edge Computing
    McNamee, Francis
    Dustdar, Schahram
    Kilpatrick, Peter
    Shi, Weisong
    Spence, Ivor
    Varghese, Blesson
    2021 IEEE 14TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2021), 2021, : 43 - 52
  • [25] A Survey of Convolutional Neural Networks on Edge with Reconfigurable Computing
    Vestias, Mario P.
    ALGORITHMS, 2019, 12 (08)
  • [26] Pyramid: Enabling Hierarchical Neural Networks with Edge Computing
    He, Qiang
    Dong, Zeqian
    Chen, Feifei
    Deng, Shuiguang
    Liang, Weifa
    Yang, Yun
    PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22), 2022, : 1860 - 1870
  • [27] Quantization of Deep Neural Networks for Accurate Edge Computing
    Chen, Wentao
    Qiu, Hailong
    Zhuang, Jian
    Zhang, Chutong
    Hu, Yu
    Lu, Qing
    Wang, Tianchen
    Shi, Yiyu
    Huang, Meiping
    Xu, Xiaowe
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2021, 17 (04)
  • [28] Efficacy of Defending Deep Neural Networks against Adversarial Attacks with Randomization
    Zhou, Yan
    Kantarcioglu, Murat
    Xi, Bowei
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS II, 2020, 11413
  • [29] Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks
    Zhang, Ming
    Li, Hu
    Kuang, Xiaohui
    Pang, Ling
    Wu, Zhendong
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 613 - 629
  • [30] HeteroGuard: Defending Heterogeneous Graph Neural Networks against Adversarial Attacks
    Kumarasinghe, Udesh
    Nabeel, Mohamed
    De Zoysa, Kasun
    Gunawardana, Kasun
    Elvitigala, Charitha
    2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW, 2022, : 698 - 705