[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3195970.3196023acmconferencesArticle/Chapter ViewAbstractPublication PagesdacConference Proceedingsconference-collections
research-article
Public Access

Deepsecure: scalable provably-secure deep learning

Published: 24 June 2018 Publication History

Abstract

This paper presents DeepSecure, the an scalable and provably secure Deep Learning (DL) framework that is built upon automated design, efficient logic synthesis, and optimization methodologies. DeepSecure targets scenarios in which neither of the involved parties including the cloud servers that hold the DL model parameters or the delegating clients who own the data is willing to reveal their information. Our framework is the first to empower accurate and scalable DL analysis of data generated by distributed clients without sacrificing the security to maintain efficiency. The secure DL computation in DeepSecure is performed using Yao's Garbled Circuit (GC) protocol. We devise GC-optimized realization of various components used in DL. Our optimized implementation achieves up to 58-fold higher throughput per sample compared with the best prior solution. In addition to the optimized GC realization, we introduce a set of novel low-overhead pre-processing techniques which further reduce the GC overall runtime in the context of DL. Our extensive evaluations demonstrate up to two orders-of-magnitude additional runtime improvement achieved as a result of our pre-processing methodology.

References

[1]
Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. Deep learning. Nature, 521(7553), 2015.
[2]
Nicola Jones et al. The learning machines. Nature, 505(7482):146--148, 2014.
[3]
Jeremy Kirk. Ibm join forces to build a brain-like computer. http://www.pcworld.com/article/2051501/universities-join-ibm-in-cognitive-computing-researchproject.html, 2016.
[4]
Amir Efrati. How "deep learning" works at apple, beyond. https://www.theinformation.com/How-Deep-Learning-Works-at-Apple-Beyond, 2017.
[5]
Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In Proceedings of The 33rd International Conference on Machine Learning, pages 201--210, 2016.
[6]
Payman Mohassel and Yupeng Zhang. Secureml: A system for scalable privacy-preserving machine learning. IACR Cryptology ePrint Archive, 2017:396, 2017.
[7]
Ebrahim M Songhori, Siam U Hussain, Ahmad-Reza Sadeghi, Thomas Schneider, and Farinaz Koushanfar. Tinygarble: Highly compressed and scalable sequential garbled circuits. In 2015 IEEE Symposium on Security and Privacy, pages 411--428. IEEE, 2015.
[8]
Moni Naor and Benny Pinkas. Computationally secure oblivious transfer. Journal of Cryptology, 18(1):1--35, 2005.
[9]
Andrew Chi-Chih Yao. How to generate and exchange secrets. In Foundations of Computer Science, 1986., 27th Annual Symposium on, pages 162--167. IEEE, 1986.
[10]
Vladimir Kolesnikov and Thomas Schneider. Improved garbled circuit: Free xor gates and applications. In International Colloquium on Automata, Languages, and Programming, pages 486--498. Springer, 2008.
[11]
Moni Naor, Benny Pinkas, and Reuban Sumner. Privacy preserving auctions and mechanism design. In Proceedings of the 1st ACM conference on Electronic commerce, pages 129--139. ACM, 1999.
[12]
Samee Zahur, Mike Rosulek, and David Evans. Two halves make a whole. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 220--250. Springer, 2015.
[13]
Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, and Phillip Rogaway. Efficient garbling from a fixed-key blockcipher. In Security and Privacy (SP), 2013 IEEE Symposium on, pages 478--492. IEEE, 2013.
[14]
Bita Darvish Rouhani, Azalia Mirhoseini, and Farinaz Koushanfar. Deep3: Leveraging three levels of parallelism for efficient deep learning. In Proceedings of the 54rd Annual Design Automation Conference. ACM, 2017.
[15]
Bita Darvish Rouhani, Azalia Mirhoseini, and Farinaz Koushanfar. Delight: Adding energy dimension to deep neural networks. In Proceedings of the 2016 International Symposium on Low Power Electronics and Design, pages 112--117. ACM, 2016.
[16]
Bita Darvish Rouhani, Azalia Mirhoseini, and Farinaz Koushanfar. Tinydl: Just-in-time deep learning solution for constrained embedded systems. In Circuits and Systems (ISCAS), 2017 IEEE International Symposium on, pages 1--4. IEEE, 2017.
[17]
Song Han, Jeff Pool, John Tran, and William Dally. Learning both weights and connections for efficient neural network. In Advances in Neural Information Processing Systems, pages 1135--1143, 2015.
[18]
Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. Foundations of garbled circuits. In Proceedings of the 2012 ACM conference on Computer and communications security, pages 784--796. ACM, 2012.
[19]
Yann LeCun, Corinna Cortes, and Christopher Burges. Mnist dataset. http://yann.lecun.com/exdb/mnist/, 2017.
[20]
UCI machine learning repository. https://archive.ics.uci.edu/ml/datasets/isolet, 2017.
[21]
UCI machine learning repository. https://archive.ics.uci.edu/ml/datasets/Daily+and+Sports+Activities, 2017.
[22]
Intel Processors. http://www.velocitymicro.com/blog/xeon-vs-i7i5-whats-difference/, 2017.
[23]
Mauro Barni, Claudio Orlandi, and Alessandro Piva. A privacy-preserving protocol for neural-network-based computation. In Proceedings of the 8th workshop on Multimedia and security, pages 146--151. ACM, 2006.
[24]
Claudio Orlandi, Alessandro Piva, and Mauro Barni. Oblivious neural network computing via homomorphic encryption. EURASIP Journal on Information Security, 2007:18, 2007.
[25]
Alessandro Piva, Claudio Orlandi, M Caini, Tiziano Bianchi, and Mauro Barni. Enhancing privacy in remote data classification. In IFIP International Information Security Conference, pages 33--46. Springer, 2008.
[26]
Jian Liu, Mika Juuti, Yao Lu, and N Asokan. Oblivious neural network predictions via MiniONN transformations. In ACM Conference on Computer and Communications Security (CCS), 2017.
[27]
Mohammad Samragh, Mohammad Ghasemzadeh, and Farinaz Koushanfar. Customizing neural networks for efficient fpga implementation. In IEEE 25th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), 2017.

Cited By

View all
  • (2024)Slalom at the Carnival: Privacy-preserving Inference with Masks from Public KnowledgeIACR Communications in Cryptology10.62056/akp-49qgxqOnline publication date: 7-Oct-2024
  • (2024)SeesawProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3693248(29266-29277)Online publication date: 21-Jul-2024
  • (2024)Frameworks for Privacy-Preserving Federated LearningIEICE Transactions on Information and Systems10.1587/transinf.2023MUI0001E107.D:1(2-12)Online publication date: 1-Jan-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
DAC '18: Proceedings of the 55th Annual Design Automation Conference
June 2018
1089 pages
ISBN:9781450357005
DOI:10.1145/3195970
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 June 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. automated design
  2. evaluation
  3. garbled circuit
  4. logic synthesis
  5. privacy-preserving deep learning
  6. secure function

Qualifiers

  • Research-article

Funding Sources

Conference

DAC '18
Sponsor:
DAC '18: The 55th Annual Design Automation Conference 2018
June 24 - 29, 2018
California, San Francisco

Acceptance Rates

Overall Acceptance Rate 1,770 of 5,499 submissions, 32%

Upcoming Conference

DAC '25
62nd ACM/IEEE Design Automation Conference
June 22 - 26, 2025
San Francisco , CA , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)462
  • Downloads (Last 6 weeks)66
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Slalom at the Carnival: Privacy-preserving Inference with Masks from Public KnowledgeIACR Communications in Cryptology10.62056/akp-49qgxqOnline publication date: 7-Oct-2024
  • (2024)SeesawProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3693248(29266-29277)Online publication date: 21-Jul-2024
  • (2024)Frameworks for Privacy-Preserving Federated LearningIEICE Transactions on Information and Systems10.1587/transinf.2023MUI0001E107.D:1(2-12)Online publication date: 1-Jan-2024
  • (2024)Private and Secure Distributed Deep Learning: A SurveyACM Computing Surveys10.1145/370345257:4(1-43)Online publication date: 15-Nov-2024
  • (2024)When Federated Learning Meets Privacy-Preserving ComputationACM Computing Surveys10.1145/367901356:12(1-36)Online publication date: 22-Jul-2024
  • (2024)PrivatEyes: Appearance-based Gaze Estimation Using Federated Secure Multi-Party ComputationProceedings of the ACM on Human-Computer Interaction10.1145/36556068:ETRA(1-23)Online publication date: 28-May-2024
  • (2024)MOSAIC: A Prune-and-Assemble Approach for Efficient Model Pruning in Privacy-Preserving Deep LearningProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637680(1034-1048)Online publication date: 1-Jul-2024
  • (2024)Privacy preserving support vector machine based on federated learning for distributed IoT‐enabled data analysisComputational Intelligence10.1111/coin.1263640:2Online publication date: 3-Apr-2024
  • (2024)SecDM: A Secure and Lossless Human Mobility Prediction SystemIEEE Transactions on Services Computing10.1109/TSC.2024.335829217:4(1793-1805)Online publication date: Jul-2024
  • (2024)PP-Stream: Toward High-Performance Privacy-Preserving Neural Network Inference via Distributed Stream Processing2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00123(1492-1505)Online publication date: 13-May-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media