Loading [MathJax]/extensions/MathMenu.js
Low-Latency Privacy-Preserving Outsourcing of Deep Neural Network Inference | IEEE Journals & Magazine | IEEE Xplore

Low-Latency Privacy-Preserving Outsourcing of Deep Neural Network Inference


Abstract:

Efficiently supporting inference tasks of deep neural network (DNN) on the resource-constrained Internet-of-Things (IoT) devices has been an outstanding challenge for eme...Show More

Abstract:

Efficiently supporting inference tasks of deep neural network (DNN) on the resource-constrained Internet-of-Things (IoT) devices has been an outstanding challenge for emerging smart systems. To mitigate the burden on IoT devices, one prevalent solution is to outsource DNN inference tasks to the public cloud. However, this type of “cloud-backed” solutions can cause privacy breach since the outsourced data may contain sensitive information. For privacy protection, the research community has resorted to advanced cryptographic primitives to support DNN inference over encrypted data. Nevertheless, these attempts are limited by the real-time performance due to the heavy IoT computational overhead brought by cryptographic primitives. In this article, we proposed an edge computing-assisted framework to boost the efficiency of DNN inference tasks on IoT devices, which also protects the privacy of IoT data to be outsourced. In our framework, the most time-consuming DNN layers are outsourced to edge computing devices. The IoT device only processes compute-efficient layers and fast encryption/decryption. Thorough security analysis and numerical analysis are carried out to show the security and efficiency of the proposed framework. Our analysis results indicate a 99%+ outsourcing rate of DNN operations for IoT devices. Experiments on AlexNet show that our scheme can speed up DNN inference for 40.6× with a 96.2% energy saving for IoT devices.
Published in: IEEE Internet of Things Journal ( Volume: 8, Issue: 5, 01 March 2021)
Page(s): 3300 - 3309
Date of Publication: 18 June 2020

ISSN Information:

Funding Agency:

References is not available for this document.

Select All
1.
Y. Tian, J. Yuan, S. Yu, Y. Hou and H. Song, "Edge-assisted CNN inference over encrypted data for Internet of Things", Proc. 15th Int. Conf. Security Privacy Commun. Netw. (SecureComm), pp. 58-104, 2019.
2.
M. Mehdi, A.-F. Ala, S. Sameh and G. Mohsen, Deep learning for IoT big data and streaming analytics: A survey, 2017, [online] Available: http://arXiv:1712.04301.
3.
W. G. Hatcher and W. Yu, "A survey of deep learning: Platforms applications and emerging research trends", IEEE Access, vol. 6, pp. 24411-24432, 2018.
4.
A. Krizhevsky, I. Sutskever and G. E. Hinton, "ImageNet classification with deep convolutional neural networks", Proc. 25th Int. Conf. Neural Inf. Process. Syst. (NIPS’12), vol. 1, pp. 1097-1105, 2012.
5.
F. Schroff, D. Kalenichenko and J. Philbin, "FaceNet: A unified embedding for face recognition and clustering", Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 815-823, Jun. 2015.
6.
K. He, X. Zhang, S. Ren and J. Sun, "Deep residual learning for image recognition", Proc. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 770-778, Jun. 2016.
7.
J. Zhou, Z. Cao, X. Dong and A. V. Vasilakos, "Security and privacy for cloud-based IoT: Challenges", IEEE Commun. Mag., vol. 55, no. 1, pp. 26-33, Jan. 2017.
8.
S. Sharma, K. Chen and A. Sheth, "Toward practical privacy-preserving analytics for IoT and cloud-based healthcare systems", IEEE Internet Comput., vol. 22, no. 2, pp. 42-51, Mar./Apr. 2018.
9.
R. Gilad-Bachrach, N. Dowlin, K. Laine, K. E. Lauter, M. Naehrig and J. Wernsing, "CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy", Proc. 33rd Int. Conf. Mach. Learn. (ICML), pp. 201-210, Jun. 2016.
10.
F. Bourse, M. Minelli, M. Minihold and P. Paillier, Fast homomorphic evaluation of deep discretized neural networks, 2017.
11.
E. Hesamifard, H. Takabi and M. Ghasemi, CryptoDL: Deep neural networks over encrypted data, 2017, [online] Available: https://arxiv.org/abs/1711.05189.
12.
P. Mohassel and Y. Zhang, "SecureML: A system for scalable privacy-preserving machine learning", Proc. IEEE Symp. Security Privacy (SP), pp. 19-38, May 2017.
13.
S. Wagh, D. Gupta and N. Chandran, "SecureNN: Efficient and private neural network training", Proc. 19th Annu. Privacy Enhancing Technol. Symp. (PETS), pp. 26-49, Feb. 2019.
14.
P. Mohassel and P. Rindal, "ABY3: A mixed protocol framework for machine learning", Proc. ACM SIGSAC Conf. Comput. Commun. Security (CCS’18), pp. 35-52, 2018.
15.
C. Juvekar, V. Vaikuntanathan and A. Chandrakasan, "GAZELLE: A low latency framework for secure neural network inference", Proc. 27th USENIX Security Symp. (USENIX Security), pp. 1651-1669, 2018.
16.
M. S. Riazi, C. Weinert, O. Tkachenko, E. M. Songhori, T. Schneider and F. Koushanfar, "Chameleon: A hybrid secure computation framework for machine learning applications", Proc. Asia Conf. Comput. Commun. Security (ASIACCS’18), pp. 707-721, 2018.
17.
J. Liu, M. Juuti, Y. Lu and N. Asokan, "Oblivious neural network predictions via minionn transformations", Proc. ACM SIGSAC Conf. Comput. Commun. Security (CCS’17), pp. 619-631, 2017.
18.
J. Cong and B. Xiao, "Minimizing computation in convolutional neural networks", Proc. Int. Conf. Artif. Neural Netw. (ICANN), pp. 281-290, 2014.
19.
J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang and W. Zhao, "A survey on Internet of Things: Architecture enabling technologies security and privacy and applications", IEEE Internet Things J., vol. 4, no. 5, pp. 1125-1142, Oct. 2017.
20.
P. Lindstrom and M. Isenburg, "Fast and efficient compression of floating-point data", IEEE Trans. Vis. Comput. Graphics, vol. 12, no. 5, pp. 1245-1250, Sep./Oct. 2006.
21.
I. Goodfellow, Y. Bengio and A. Courville, Deep Learning, Cambridge, U.K.:MIT Press, 2016, [online] Available: http://www.deeplearningbook.org.
22.
J. Katz and Y. Lindell, Chapter 3 Introduction to Modern Cryptography, Boca Raton, FL, USA:Chapman & Hall, 2007.
23.
J. W. Bos, K. Lauter, J. Loftus and M. Naehrig, "Improved security for a ring-based fully homomorphic encryption scheme" in Cryptography and Coding, Heidelberg, Germany:Springer, pp. 45-64, 2013.
Contact IEEE to Subscribe

References

References is not available for this document.