SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning

被引:0
|
作者
Liang Z. [1 ]
Jin Q. [1 ]
Wang Z. [1 ]
Chen Z. [2 ,3 ,4 ]
Gu Z. [3 ,4 ,5 ]
Lu Y. [4 ,6 ]
Zhang F. [1 ]
机构
[1] Zhejiang University, Hangzhou
[2] Peking University, Beijing
[3] DAMO Academy, Alibaba group, Beijing
[4] Hupan Lab, Hangzhou
[5] Tsinghua University, Beijing
[6] Alibaba Group, Shanghai
基金
中国国家自然科学基金;
关键词
Additive Homomorphic Encryption; Hardware Accelerator; Multi-Party Computation; Privacy-Preserving Machine Learning;
D O I
10.46586/tches.v2024.i2.819-843
中图分类号
学科分类号
摘要
Secure multi-party computation and homomorphic encryption are two primary security primitives in privacy-preserving machine learning, whose wide adop-tion is, nevertheless, constrained by the computation and network communication overheads. This paper proposes a hybrid Secret-sharing and Homomorphic encryption Architecture for Privacy-pERsevering machine learning (SHAPER). SHAPER protects sensitive data in encrypted or randomly shared domains instead of rely-ing on a trusted third party. The proposed algorithm-protocol-hardware co-design methodology explores techniques such as plaintext Single Instruction Multiple Data (SIMD) and fine-grained scheduling, to minimize end-to-end latency in various network settings. SHAPER also supports secure domain computing acceleration and the conversion between mainstream privacy-preserving primitives, making it ready for general and distinctive data characteristics. SHAPER is evaluated by FPGA prototyping with a comprehensive hyper-parameter exploration, demonstrating a 94× speed-up over CPU clusters on large-scale logistic regression training tasks. © 2024, Ruhr-University of Bochum. All rights reserved.
引用
收藏
页码:819 / 843
页数:24
相关论文
共 50 条
  • [31] Privacy-friendly machine learning - Part 2: Privacy attacks and privacy-preserving machine learning
    Stock J.
    Petersen T.
    Behrendt C.-A.
    Federrath H.
    Kreutzburg T.
    Informatik Spektrum, 2022, 45 (3) : 137 - 145
  • [32] DEVA: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning
    Tsaloli, Georgia
    Liang, Bei
    Brunetta, Carlo
    Banegas, Gustavo
    Mitrokotsa, Aikaterini
    INFORMATION SECURITY (ISC 2021), 2021, 13118 : 296 - 319
  • [33] Toward Secure Weighted Aggregation for Privacy-Preserving Federated Learning
    He, Yunlong
    Yu, Jia
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 3475 - 3488
  • [34] Federated Learning for Privacy-Preserving Machine Learning in IoT Networks
    Anitha, G.
    Jegatheesan, A.
    2024 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT CYBER PHYSICAL SYSTEMS AND INTERNET OF THINGS, ICOICI 2024, 2024, : 338 - 342
  • [35] ESVFL: Efficient and secure verifiable federated learning with privacy-preserving
    Cai, Jiewang
    Shen, Wenting
    Qin, Jing
    INFORMATION FUSION, 2024, 109
  • [36] A Secure and Privacy-Preserving Machine Learning Model Sharing Scheme for Edge-Enabled IoT
    Zhou, Xianfei
    Xu, Kai
    Wang, Naiyu
    Jiao, Jianlin
    Dong, Ning
    Han, Meng
    Xu, Hao
    IEEE ACCESS, 2021, 9 (09): : 17256 - 17265
  • [37] TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning
    Xu, Runhua
    Li, Bo
    Li, Chao
    Joshi, James B. D.
    Ma, Shuai
    Li, Jianxin
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4309 - 4323
  • [38] More Practical Privacy-Preserving Machine Learning as A Service via Efficient Secure Matrix Multiplication
    Lu, Wen-jie
    Sakuma, Jun
    WAHC'18: PROCEEDINGS OF THE 6TH WORKSHOP ON ENCRYPTED COMPUTING & APPLIED HOMOMORPHIC CRYPTOGRAPHY, 2018, : 25 - 36
  • [39] Interpretable Machine Learning for Privacy-Preserving Pervasive Systems
    Baron, Benjamin
    Musolesi, Mirco
    IEEE PERVASIVE COMPUTING, 2020, 19 (01) : 73 - 82
  • [40] Efficient Privacy-Preserving Machine Learning for Blockchain Network
    Kim, Hyunil
    Kim, Seung-Hyun
    Hwang, Jung Yeon
    Seo, Changho
    IEEE ACCESS, 2019, 7 : 136481 - 136495