Defending CNN against privacy leakage in edge computing via binary neural networks

被引:7
|
作者
Qiang, Weizhong [1 ,2 ]
Liu, Renwan [1 ,3 ]
Jin, Hai [1 ,3 ]
机构
[1] Huazhong Univ Sci & Technol, Serv Comp Technol & Syst Lab, Natl Engn Res Ctr Big Data Technol & Syst, Big Data Secur Engn Res Ctr,Cluster & Grid Comp L, Wuhan 430074, Peoples R China
[2] Huazhong Univ Sci & Technol, Sch Cyber Sci & Engn, Wuhan 430074, Peoples R China
[3] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Privacy-preserving machine learning; Binary neural network; Edge computing;
D O I
10.1016/j.future.2021.06.037
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the IoT has developed, edge computing has played an increasingly important role in the IoT ecosystem. The edge computing paradigm offers low latency and high computing performance, which is conducive to machine learning tasks such as object detection in autonomous driving. However, data privacy risks in edge computing still exist and the existing privacy-preserving methods are not satisfactory due to the large computational overhead and unbearable accuracy loss. We have designed a privacy-preserving machine learning framework for both user and cloud data. Users and the cloud provide data for inference and training respectively, and the privacy protection of these two aspects is both considered in this paper. Users provide test data and want to access the data-processing models in cloud for inference, and the cloud provides the training data used for training an eligible model. For user data, in order to maintain the overall performance of the machine learning framework while using homomorphic encryption, instead of providing encrypted data to all machine learning tasks, we divide the neural network into two parts, with one part kept on the trusted edge and provided with plaintext, and the other deployed on the untrusted cloud and provided with encrypted input. For cloud data, we apply the binary neural network, a network with the binarized value of weights. This method is practical for narrowing the confidence score gap (between the training and test sets) predicted by the model, which accounts most for a successful exploratory attack on training data. Experiments demonstrate that the results of the adversary's membership inference attack are close to random guessing, and the accuracy is only slightly affected. Compared with the unencrypted network on VGG19, when the network is split from conv4_1 to fc8, the efficiency of using HE is only 100 to 30 times slower. (C) 2021 Elsevier B.V. All rights reserved.
引用
下载
收藏
页码:460 / 470
页数:11
相关论文
共 50 条
  • [41] Random sketch learning for deep neural networks in edge computing
    Bin Li
    Peijun Chen
    Hongfu Liu
    Weisi Guo
    Xianbin Cao
    Junzhao Du
    Chenglin Zhao
    Jun Zhang
    Nature Computational Science, 2021, 1 : 221 - 228
  • [42] OptDNN: Automatic deep neural networks optimizer for edge computing
    Giovannesi, Luca
    Mattia, Gabriele Proietti
    Beraldi, Roberto
    SOFTWARE IMPACTS, 2024, 20
  • [43] Poster: Scalable Quantum Convolutional Neural Networks for Edge Computing
    Wu, Jindi
    Li, Qun
    2022 IEEE/ACM 7TH SYMPOSIUM ON EDGE COMPUTING (SEC 2022), 2022, : 307 - 309
  • [44] Massively Parallel Combinational Binary Neural Networks for Edge Processing
    Murovic, Tadej
    Trost, Andrej
    ELEKTROTEHNISKI VESTNIK, 2019, 86 (1-2): : 47 - 53
  • [45] Massively parallel combinational binary neural networks for edge processing
    Murovič, Tadej
    Trost, Andrej
    Elektrotehniski Vestnik/Electrotechnical Review, 2019, 86 (01): : 47 - 53
  • [46] A Spectrum Sharing Incentive Scheme Against Location Privacy Leakage in IoT Networks
    Feng J.
    Yang J.
    Zhang R.
    Zhang W.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2209 - 2220
  • [47] Privacy-Preserving Live Video Analytics for Drones via Edge Computing
    Nagasubramaniam, Piyush
    Wu, Chen
    Sun, Yuanyi
    Karamchandani, Neeraj
    Zhu, Sencun
    He, Yongzhong
    Applied Sciences (Switzerland), 2024, 14 (22):
  • [48] Defending Quantum Neural Networks against Adversarial Attacks with Homomorphic Data Encryption
    Wang, Ellen
    Chain, Helena
    Wang, Xiaodi
    Ray, Avi
    Wooldridge, Tyler
    2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023, 2023, : 816 - 822
  • [49] Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks
    Liu, Kang
    Dolan-Gavitt, Brendan
    Garg, Siddharth
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, RAID 2018, 2018, 11050 : 273 - 294
  • [50] One Parameter Defense-Defending Against Data Inference Attacks via Differential Privacy
    Ye, Dayong
    Shen, Sheng
    Zhu, Tianqing
    Liu, Bo
    Zhou, Wanlei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1466 - 1480