Edge-Assisted CNN Inference over Encrypted Data for Internet of Things | SpringerLink
Skip to main content

Edge-Assisted CNN Inference over Encrypted Data for Internet of Things

  • Conference paper
  • First Online:
Security and Privacy in Communication Networks (SecureComm 2019)

Abstract

Supporting the inference tasks of convolutional neural network (CNN) on resource-constrained Internet of Things (IoT) devices in a timely manner has been an outstanding challenge for emerging smart systems. To mitigate the burden on IoT devices, one prevalent solution is to offload the CNN inference tasks to the public cloud. However, this “offloading-to-cloud” solution may cause privacy breach since the offloaded data can contain sensitive information. For privacy protection, the research community has resorted to advanced cryptographic primitives to support CNN inference over encrypted data. Nevertheless, these attempts are limited by the real-time performance due to the heavy IoT computational overhead brought by cryptographic primitives.

In this paper, we propose an edge-computing-assisted scheme to boost the efficiency of CNN inference tasks on IoT devices, which also protects the privacy of IoT data to be offloaded. In our scheme, the most time-consuming convolutional and fully-connected layers are offloaded to edge computing devices and the IoT device only performs efficient encryption and decryption on the fly. As a result, our scheme enables IoT devices to securely offload over 99% CNN operations, and edge devices to execute CNN inference over encrypted data as efficiently as on plaintext. Experiments on AlexNet show that our scheme can speed up CNN inference for more than \(35\times \) with a 95.56% energy saving for IoT devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Verhelst, M., Moons, B.: Embedded deep neural network processing: algorithmic and processor techniques bring deep learning to IoT and edge devices. IEEE Solid-State Circ. Mag. 9(4), 55–65 (2017)

    Article  Google Scholar 

  2. Kodali, S., Hansen, P., Mulholland, N., Whatmough, P., Brooks, D., Wei, G.Y.: Applications of deep neural networks for ultra low power IoT. In 2017 IEEE International Conference on Computer Design (ICCD), pp. 589–592, November 2017

    Google Scholar 

  3. Burns, M.: Arm chips with Nvidia AI could change the Internet of Things (2018). https://techcrunch.com/2018/03/27/arm-chips-will-with-nvidia-ai-could-change-the-internet-of-things/. Accessed July 2018

  4. Mohammadi, M., Al-Fuqaha, A., Sorour, S., Guizani, M.: Deep learning for IoT big data and streaming analytics: a survey (2017). arXiv:1712.04301

  5. Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Proceedings of the 25th International Conference on Neural Information Processing Systems NIPS 2012, vol. 1, pp. 1097–1105, Curran Associates Inc., USA (2012)

    Google Scholar 

  6. Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 815–823, June 2015

    Google Scholar 

  7. He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770–778, June 2016

    Google Scholar 

  8. Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55(1), 26–33 (2017)

    Article  Google Scholar 

  9. Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)

    Article  Google Scholar 

  10. Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K.E., Naehrig, M., Wernsing, J.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, 19–24 June, pp. 201–210 (2016)

    Google Scholar 

  11. Chabanne, H., de Wargny, A., Milgram, J., Morel, C., Prouff, E.: Privacy-preserving classification on deep neural network. IACR Cryptology ePrint Archive 2017/35 (2017)

    Google Scholar 

  12. Hesamifard, E., Takabi, H., Ghasemi, M.: CryptoDL: deep neural networks over encrypted data. CoRR, abs/1711.05189 (2017)

    Google Scholar 

  13. Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19–38, May 2017

    Google Scholar 

  14. Wagh, S., Gupta, D., Chandran, N.: SecureNN: efficient and private neural network training. (PETS 2019), February 2019

    Google Scholar 

  15. Juvekar, C., Vaikuntanathan, V., Chandrakasan, A.: \(\{\)GAZELLE\(\}\): a low latency framework for secure neural network inference. In: 27th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 2018), pp. 1651–1669 (2018)

    Google Scholar 

  16. Mohassel, P., Rindal, P.: ABY 3: a mixed protocol framework for machine learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, pp. 35–52, ACM. New York (2018)

    Google Scholar 

  17. Riazi, M.S., Weinert, C., Tkachenko, O., Songhori, E.M., Schneider, T., Koushanfar, F.: Chameleon: a hybrid secure computation framework for machine learning applications. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, ASIACCS 2018, pp. 707–721, ACM. New York (2018)

    Google Scholar 

  18. Liu, J., Juuti, M., Lu, Y., Asokan, N.: Oblivious neural network predictions via MiniONN transformations. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 619–631, ACM. New York (2017)

    Google Scholar 

  19. Mario, C., Mathieu, P.: Benchmarking Paillier Encryption (2018). https://medium.com/snips-ai/benchmarking-paillier-encryption-15631a0b5ad8. Accessed July 2018

  20. Shi, W., Cao, J., Zhang, Q., Li, Y., Lanyu, X.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)

    Article  Google Scholar 

  21. Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: CVPR 2009 (2009)

    Google Scholar 

  22. Wikipedia. Convolutional neural network. https://en.wikipedia.org/wiki/Convolutional_neural_network. Accessed July 2018

  23. Phan N.H., Wu, X., Hu, H., Dou, D.: Adaptive laplace mechanism: differential privacy preservation in deep learning. In: Proceedings of the 2017 IEEE International Conference on Data Mining, ICDM 2017. IEEE (2017)

    Google Scholar 

  24. Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 308–318, ACM. New York (2016)

    Google Scholar 

  25. Cong, J., Xiao, B.: Minimizing computation in convolutional neural networks. In: Wermter, S., et al. (eds.) ICANN 2014. LNCS, vol. 8681, pp. 281–290. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11179-7_36

    Chapter  Google Scholar 

  26. Katz, J., Lindell, Y.: Introduction to Modern Cryptography, Chapt. 3.3. Chapman & Hall/CRC (2007)

    Google Scholar 

  27. Lee, J., Wang, J., Crandall, D., Šabanović, S., Fox, G.: Real-time, cloud-based object detection for unmanned aerial vehicles. In: 2017 First IEEE International Conference on Robotic Computing (IRC), pp. 36–43, April 2017

    Google Scholar 

  28. Airdata UAV. Drone Flight Stats (2018). https://airdata.com/blog/2017/drone-flight-stats-part-1. Accessed July 2018

  29. Rimal, B.P., Van, D.P., Maier, M.: Mobile edge computing empowered fiber-wireless access networks in the 5G era. IEEE Commun. Mag. 55(2), 192–200 (2017)

    Article  Google Scholar 

  30. Paul, N.: Now trending: SD memory cards (2018). https://www.sdcard.org/press/thoughtleadership/180118_Now_Trending_SD_Memory_Cards.html. Accessed July 2018

  31. Bos, J.W., Lauter, K., Loftus, J., Naehrig, M.: Improved security for a ring-based fully homomorphic encryption scheme. In: Stam, M. (ed.) IMACC 2013. LNCS, vol. 8308, pp. 45–64. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-45239-0_4

    Chapter  Google Scholar 

  32. Dramble, R.P.: Power Consumption Benchmarks (2018). http://www.pidramble.com/wiki/benchmarks/power-consumption. Accessed Apr 2019

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiawei Yuan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tian, Y., Yuan, J., Yu, S., Hou, Y., Song, H. (2019). Edge-Assisted CNN Inference over Encrypted Data for Internet of Things. In: Chen, S., Choo, KK., Fu, X., Lou, W., Mohaisen, A. (eds) Security and Privacy in Communication Networks. SecureComm 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 304. Springer, Cham. https://doi.org/10.1007/978-3-030-37228-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37228-6_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37227-9

  • Online ISBN: 978-3-030-37228-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics