Abstract
Supporting the inference tasks of convolutional neural network (CNN) on resource-constrained Internet of Things (IoT) devices in a timely manner has been an outstanding challenge for emerging smart systems. To mitigate the burden on IoT devices, one prevalent solution is to offload the CNN inference tasks to the public cloud. However, this “offloading-to-cloud” solution may cause privacy breach since the offloaded data can contain sensitive information. For privacy protection, the research community has resorted to advanced cryptographic primitives to support CNN inference over encrypted data. Nevertheless, these attempts are limited by the real-time performance due to the heavy IoT computational overhead brought by cryptographic primitives.
In this paper, we propose an edge-computing-assisted scheme to boost the efficiency of CNN inference tasks on IoT devices, which also protects the privacy of IoT data to be offloaded. In our scheme, the most time-consuming convolutional and fully-connected layers are offloaded to edge computing devices and the IoT device only performs efficient encryption and decryption on the fly. As a result, our scheme enables IoT devices to securely offload over 99% CNN operations, and edge devices to execute CNN inference over encrypted data as efficiently as on plaintext. Experiments on AlexNet show that our scheme can speed up CNN inference for more than \(35\times \) with a 95.56% energy saving for IoT devices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Verhelst, M., Moons, B.: Embedded deep neural network processing: algorithmic and processor techniques bring deep learning to IoT and edge devices. IEEE Solid-State Circ. Mag. 9(4), 55–65 (2017)
Kodali, S., Hansen, P., Mulholland, N., Whatmough, P., Brooks, D., Wei, G.Y.: Applications of deep neural networks for ultra low power IoT. In 2017 IEEE International Conference on Computer Design (ICCD), pp. 589–592, November 2017
Burns, M.: Arm chips with Nvidia AI could change the Internet of Things (2018). https://techcrunch.com/2018/03/27/arm-chips-will-with-nvidia-ai-could-change-the-internet-of-things/. Accessed July 2018
Mohammadi, M., Al-Fuqaha, A., Sorour, S., Guizani, M.: Deep learning for IoT big data and streaming analytics: a survey (2017). arXiv:1712.04301
Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Proceedings of the 25th International Conference on Neural Information Processing Systems NIPS 2012, vol. 1, pp. 1097–1105, Curran Associates Inc., USA (2012)
Schroff, F., Kalenichenko, D., Philbin, J.: FaceNet: a unified embedding for face recognition and clustering. In: 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 815–823, June 2015
He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 770–778, June 2016
Zhou, J., Cao, Z., Dong, X., Vasilakos, A.V.: Security and privacy for cloud-based IoT: challenges. IEEE Commun. Mag. 55(1), 26–33 (2017)
Shi, W., Cao, J., Zhang, Q., Li, Y., Xu, L.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)
Gilad-Bachrach, R., Dowlin, N., Laine, K., Lauter, K.E., Naehrig, M., Wernsing, J.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: Proceedings of the 33nd International Conference on Machine Learning, ICML 2016, New York City, NY, USA, 19–24 June, pp. 201–210 (2016)
Chabanne, H., de Wargny, A., Milgram, J., Morel, C., Prouff, E.: Privacy-preserving classification on deep neural network. IACR Cryptology ePrint Archive 2017/35 (2017)
Hesamifard, E., Takabi, H., Ghasemi, M.: CryptoDL: deep neural networks over encrypted data. CoRR, abs/1711.05189 (2017)
Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19–38, May 2017
Wagh, S., Gupta, D., Chandran, N.: SecureNN: efficient and private neural network training. (PETS 2019), February 2019
Juvekar, C., Vaikuntanathan, V., Chandrakasan, A.: \(\{\)GAZELLE\(\}\): a low latency framework for secure neural network inference. In: 27th \(\{\)USENIX\(\}\) Security Symposium (\(\{\)USENIX\(\}\) Security 2018), pp. 1651–1669 (2018)
Mohassel, P., Rindal, P.: ABY 3: a mixed protocol framework for machine learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, pp. 35–52, ACM. New York (2018)
Riazi, M.S., Weinert, C., Tkachenko, O., Songhori, E.M., Schneider, T., Koushanfar, F.: Chameleon: a hybrid secure computation framework for machine learning applications. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, ASIACCS 2018, pp. 707–721, ACM. New York (2018)
Liu, J., Juuti, M., Lu, Y., Asokan, N.: Oblivious neural network predictions via MiniONN transformations. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 619–631, ACM. New York (2017)
Mario, C., Mathieu, P.: Benchmarking Paillier Encryption (2018). https://medium.com/snips-ai/benchmarking-paillier-encryption-15631a0b5ad8. Accessed July 2018
Shi, W., Cao, J., Zhang, Q., Li, Y., Lanyu, X.: Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637–646 (2016)
Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., Fei-Fei, L.: ImageNet: a large-scale hierarchical image database. In: CVPR 2009 (2009)
Wikipedia. Convolutional neural network. https://en.wikipedia.org/wiki/Convolutional_neural_network. Accessed July 2018
Phan N.H., Wu, X., Hu, H., Dou, D.: Adaptive laplace mechanism: differential privacy preservation in deep learning. In: Proceedings of the 2017 IEEE International Conference on Data Mining, ICDM 2017. IEEE (2017)
Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 308–318, ACM. New York (2016)
Cong, J., Xiao, B.: Minimizing computation in convolutional neural networks. In: Wermter, S., et al. (eds.) ICANN 2014. LNCS, vol. 8681, pp. 281–290. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11179-7_36
Katz, J., Lindell, Y.: Introduction to Modern Cryptography, Chapt. 3.3. Chapman & Hall/CRC (2007)
Lee, J., Wang, J., Crandall, D., Šabanović, S., Fox, G.: Real-time, cloud-based object detection for unmanned aerial vehicles. In: 2017 First IEEE International Conference on Robotic Computing (IRC), pp. 36–43, April 2017
Airdata UAV. Drone Flight Stats (2018). https://airdata.com/blog/2017/drone-flight-stats-part-1. Accessed July 2018
Rimal, B.P., Van, D.P., Maier, M.: Mobile edge computing empowered fiber-wireless access networks in the 5G era. IEEE Commun. Mag. 55(2), 192–200 (2017)
Paul, N.: Now trending: SD memory cards (2018). https://www.sdcard.org/press/thoughtleadership/180118_Now_Trending_SD_Memory_Cards.html. Accessed July 2018
Bos, J.W., Lauter, K., Loftus, J., Naehrig, M.: Improved security for a ring-based fully homomorphic encryption scheme. In: Stam, M. (ed.) IMACC 2013. LNCS, vol. 8308, pp. 45–64. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-45239-0_4
Dramble, R.P.: Power Consumption Benchmarks (2018). http://www.pidramble.com/wiki/benchmarks/power-consumption. Accessed Apr 2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Tian, Y., Yuan, J., Yu, S., Hou, Y., Song, H. (2019). Edge-Assisted CNN Inference over Encrypted Data for Internet of Things. In: Chen, S., Choo, KK., Fu, X., Lou, W., Mohaisen, A. (eds) Security and Privacy in Communication Networks. SecureComm 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 304. Springer, Cham. https://doi.org/10.1007/978-3-030-37228-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-37228-6_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37227-9
Online ISBN: 978-3-030-37228-6
eBook Packages: Computer ScienceComputer Science (R0)