Leveraging Memory PUFs and PIM-based encryption to secure edge deep learning systems

被引:2
|
作者
Li, Wen
Wang, Ying [1 ]
Li, Huawei [1 ]
Li, Xiaowei
机构
[1] Chinese Acad Sci, Inst Comp Technol, SKLCA, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
Security and privacy; PUF; PIM; deep learning;
D O I
10.1109/vts.2019.8758660
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There is a sheer growth of attention on the issue of deep learning attacks launched by adversaries. Especially with the spread of edge computing devices that cooperate with the central cloud, how to protect the neural network models and private data from being attacked becomes a hot topic. In this paper, we consider two collaborative edge-cloud deep learning scenarios. The first is that deep learning models are trained on resource-rich cloud and deployed on the terminal deep learning accelerators for delay-sensitive tasks. While in the second scenario, edge collected data is offloaded to the cloud for computationally-intensive tasks. In both scenarios, the valuable pre-trained neural network models and the private data are exposed to the risks of being attacked if they are transmitted and processed in an unencrypted way. To tackle this security problem, we present a lightweight protection scheme towards data-oriented attacks and model-oriented attacks. With the use of on-chip memory Physical Unclonable Functions (PUFs) and Processing-In-Memory (PIM), our method limits the model execution only on specific edge devices and also prevents the unauthorized analysis of private data. Experiments on state-of-the-art deep learning networks show that our method secures edge deep learning models and user-data with a negligible performance overhead.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Leveraging writing systems changes for deep learning based Chinese affective analysis
    Xiang, Rong
    Lu, Qin
    Jiao, Ying
    Zheng, Yufei
    Ying, Wenhao
    Long, Yunfei
    INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2019, 10 (11) : 3313 - 3325
  • [22] Leveraging writing systems changes for deep learning based Chinese affective analysis
    Rong Xiang
    Qin Lu
    Ying Jiao
    Yufei Zheng
    Wenhao Ying
    Yunfei Long
    International Journal of Machine Learning and Cybernetics, 2019, 10 : 3313 - 3325
  • [23] Enhancing Deep Learning: Leveraging Skip Connections and Memory Efficiency
    Manchukonda, Abhishek
    ARTIFICIAL INTELLIGENCE AND KNOWLEDGE PROCESSING, AIKP 2023, 2024, 2127 : 173 - 182
  • [24] Optimal ElGamal Encryption with Hybrid Deep-Learning-Based Classification on Secure Internet of Things Environment
    Annamalai, Chinnappa
    Vijayakumaran, Chellavelu
    Ponnusamy, Vijayakumar
    Kim, Hyunsung
    SENSORS, 2023, 23 (12)
  • [25] Secure healthcare monitoring of arrythmias in internet of things with deep learning and elgamal encryption
    Sumathi, S.
    Ganesh, A. Balaji
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2024, 46 (01) : 1697 - 1712
  • [26] Visually secure image encryption: Exploring deep learning for enhanced robustness and flexibility
    Chen, Wei
    Ji, Wenjiang
    Wang, Yichuan
    Ren, Ju
    Sheng, Guanglei
    Hei, Xinhong
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 266
  • [27] BAYHENN: Combining Bayesian Deep Learning and Homomorphic Encryption for Secure DNN Inference
    Xie, Peichen
    Wu, Bingzhe
    Sun, Guangyu
    PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 4831 - 4837
  • [28] SECHO: A deep reinforcement learning-based scheme for secure handover in mobile edge computing
    Cheng, Zhimo
    Ji, Xinsheng
    You, Wei
    Zhao, Yu
    Guo, Zhongfu
    COMPUTER NETWORKS, 2023, 229
  • [29] Deep Reinforcement Learning Based Secure Transmission for UAV-Assisted Mobile Edge Computing
    Vijayalakshmi, N.
    Gulati, Sagar
    Sujin, B. Ben
    Rao, B. Madhav
    Kumar, K. Kiran
    International Journal of Interactive Mobile Technologies, 2024, 18 (17) : 154 - 169
  • [30] Deep Learning Based Distributed Intrusion Detection in Secure Cyber Physical Systems
    Ramadevi, P.
    Baluprithviraj, K. N.
    Pillai, V. Ayyem
    Subramaniam, Kamalraj
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 2067 - 2081