Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3559613.3563198acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Open access

SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning

Published: 07 November 2022 Publication History

Abstract

Distributed deep learning frameworks such as split learning provide great benefits with regards to the computational cost of training deep neural networks and the privacy-aware utilization of the collective data of a group of data-holders. Split learning, in particular, achieves this goal by dividing a neural network between a client and a server so that the client computes the initial set of layers, and the server computes the rest. However, this method introduces a unique attack vector for a malicious server attempting to steal the client's private data: the server can direct the client model towards learning any task of its choice, e.g. towards outputting easily invertible values. With a concrete example already proposed (Pasquini et al., CCS '21), such training-hijacking attacks present a significant risk for the data privacy of split learning clients. In this paper, we propose SplitGuard, a method by which a split learning client can detect whether it is being targeted by a training-hijacking attack or not. We experimentally evaluate our method's effectiveness, compare it with potential alternatives, and discuss in detail various points related to its use. We conclude that SplitGuard can effectively detect training-hijacking attacks while minimizing the amount of information recovered by the adversaries.

References

[1]
George J. Annas. 2003. HIPAA Regulations - A New Era of Medical-Record Privacy? New England Journal of Medicine, Vol. 348, 15 (April 2003), 1486--1490. https://doi.org/10.1056/NEJMlim035027
[2]
Keith Bonawitz, Hubert Eichner, Wolfgang Grieskamp, Dzmitry Huba, Alex Ingerman, Vladimir Ivanov, Chloe Kiddon, Jakub Kone?ný, Stefano Mazzocchi, H. Brendan McMahan, Timon Van Overveldt, David Petrou, Daniel Ramage, and Jason Roselander. 2019. Towards Federated Learning at Scale: System Design. arXiv:1902.01046 [cs, stat] (March 2019). http://arxiv.org/abs/1902.01046 arXiv: 1902.01046.
[3]
Cynthia Dwork, Aaron Roth, et al. 2014. The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci., Vol. 9, 3--4 (2014), 211--407.
[4]
Ege Erdogan, Alptekin Kupcu, and A. Ercument Cicek. 2021. UnSplit: Data-Oblivious Model Inversion, Model Stealing, and Label Inference Attacks Against Split Learning. arXiv preprint arXiv:2108.09033 (2021).
[5]
Grzegorz Gawron and Philip Stubbings. 2022. Feature Space Hijacking Attacks against Differentially Private Split Learning. arXiv preprint arXiv:2201.04018 (2022).
[6]
Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep Learning. MIT Press. http://www.deeplearningbook.org.
[7]
Otkrist Gupta and Ramesh Raskar. 2018. Distributed learning of deep neural network over multiple agents. arXiv:1810.06060 [cs, stat] (Oct. 2018). http://arxiv.org/abs/1810.06060 arXiv: 1810.06060.
[8]
Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770--778.
[9]
Dimitris Kalimeris, Gal Kaplun, Preetum Nakkiran, Benjamin Edelman, Tristan Yang, Boaz Barak, and Haofeng Zhang. 2019. Sgd on neural networks learns functions of increasing complexity. Advances in Neural Information Processing Systems, Vol. 32 (2019), 3496--3506.
[10]
Diederik P. Kingma and Jimmy Ba. 2017. Adam: A Method for Stochastic Optimization. arXiv:1412.6980 [cs] (Jan. 2017). http://arxiv.org/abs/1412.6980 arXiv: 1412.6980.
[11]
Jakub Kone?ný, H. Brendan McMahan, Daniel Ramage, and Peter Richtárik. 2016. Federated Optimization: Distributed Machine Learning for On-Device Intelligence. arXiv:1610.02527 [cs] (Oct. 2016). http://arxiv.org/abs/1610.02527 arXiv: 1610.02527.
[12]
Jakub Kone?ný, H. Brendan McMahan, Felix X. Yu, Peter Richtárik, Ananda Theertha Suresh, and Dave Bacon. 2017. Federated Learning: Strategies for Improving Communication Efficiency. arXiv:1610.05492 [cs] (Oct. 2017). http://arxiv.org/abs/1610.05492 arXiv: 1610.05492.
[13]
Alex Krizhevsky, Geoffrey Hinton, et al. 2009. Learning multiple layers of features from tiny images. (2009).
[14]
Yann LeCun, Corinna Cortes, and CJ Burges. 2010. MNIST handwritten digit database. ATT Labs [Online]. Available: http://yann.lecun.com/exdb/mnist, Vol. 2 (2010).
[15]
Rebecca T. Mercuri. 2004. The HIPAA-potamus in health care data security. Commun. ACM, Vol. 47, 7 (July 2004), 25--28. https://doi.org/10.1145/1005817.1005840
[16]
Dario Pasquini, Giuseppe Ateniese, and Massimo Bernaschi. 2021. Unleashing the tiger: Inference attacks on split learning. In ACM CCS. 2113--2129.
[17]
Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer, James Bradbury, Gregory Chanan, Trevor Killeen, Zeming Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison, Andreas Kopf, Edward Yang, Zachary DeVito, Martin Raison, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner, Lu Fang, Junjie Bai, and Soumith Chintala. 2019. PyTorch: An Imperative Style, High-Performance Deep Learning Library. In NeurIPS. 8024--8035. http://papers.neurips.cc/paper/9015-pytorch-an-imperative-style-high-performance-deep-learning-library.pdf
[18]
Sebastian Ruder. 2017. An overview of gradient descent optimization algorithms. arXiv:1609.04747 [cs] (June 2017). http://arxiv.org/abs/1609.04747 arXiv: 1609.04747.
[19]
Abhishek Singh, Praneeth Vepakomma, Otkrist Gupta, and Ramesh Raskar. 2019. Detailed comparison of communication efficiency of split learning and federated learning. arXiv preprint arXiv:1909.09145 (2019).
[20]
Neil C Thompson, Kristjan Greenewald, Keeheon Lee, and Gabriel F Manso. 2020. The computational limits of deep learning. arXiv preprint arXiv:2007.05558 (2020).
[21]
Praneeth Vepakomma, Otkrist Gupta, Tristan Swedish, and Ramesh Raskar. 2018a. Split learning for health: Distributed deep learning without sharing raw patient data. arXiv preprint arXiv:1812.00564 (2018).
[22]
Praneeth Vepakomma, Tristan Swedish, Ramesh Raskar, Otkrist Gupta, and Abhimanyu Dubey. 2018b. No peek: A survey of private distributed deep learning. arXiv preprint arXiv:1812.03288 (2018).
[23]
Han Xiao, Kashif Rasul, and Roland Vollgraf. 2017. Fashion-mnist: a novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv:1708.07747 (2017). io

Cited By

View all
  • (2025)Functionality and Data Stealing by Pseudo-Client Attack and Target Defenses in Split LearningIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.338739622:1(84-100)Online publication date: Jan-2025
  • (2025)Speed Up Federated Learning in Heterogeneous Environments: A Dynamic Tiering ApproachIEEE Internet of Things Journal10.1109/JIOT.2024.348747312:5(5026-5035)Online publication date: 1-Mar-2025
  • (2024)ZETA: ZEro-Trust Attack Framework with Split Learning for Autonomous Vehicles in 6G Networks2024 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC57260.2024.10571158(1-6)Online publication date: 21-Apr-2024
  • Show More Cited By

Index Terms

  1. SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WPES'22: Proceedings of the 21st Workshop on Privacy in the Electronic Society
      November 2022
      227 pages
      ISBN:9781450398732
      DOI:10.1145/3559613
      This work is licensed under a Creative Commons Attribution International 4.0 License.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 07 November 2022

      Check for updates

      Author Tags

      1. data privacy
      2. machine learning
      3. model inversion
      4. split learning

      Qualifiers

      • Research-article

      Funding Sources

      • TUBITAK

      Conference

      CCS '22
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 106 of 355 submissions, 30%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)243
      • Downloads (Last 6 weeks)25
      Reflects downloads up to 28 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Functionality and Data Stealing by Pseudo-Client Attack and Target Defenses in Split LearningIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2024.338739622:1(84-100)Online publication date: Jan-2025
      • (2025)Speed Up Federated Learning in Heterogeneous Environments: A Dynamic Tiering ApproachIEEE Internet of Things Journal10.1109/JIOT.2024.348747312:5(5026-5035)Online publication date: 1-Mar-2025
      • (2024)ZETA: ZEro-Trust Attack Framework with Split Learning for Autonomous Vehicles in 6G Networks2024 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC57260.2024.10571158(1-6)Online publication date: 21-Apr-2024
      • (2024)Distributed Split Learning for Map-Based Signal Strength Prediction Empowered by Deep Vision TransformerIEEE Transactions on Vehicular Technology10.1109/TVT.2023.332064373:2(2358-2373)Online publication date: Feb-2024
      • (2024)Communication-Efficient Training Workload Balancing for Decentralized Multi-Agent Learning2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS60910.2024.00069(680-691)Online publication date: 23-Jul-2024
      • (2024)A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack Against Split Learning2024 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)10.1109/CVPR52733.2024.01153(12130-12139)Online publication date: 16-Jun-2024
      • (2024)SIANeural Networks10.1016/j.neunet.2023.12.033171:C(396-409)Online publication date: 17-Apr-2024
      • (2024)SplitOut: Out-of-the-Box Training-Hijacking Detection in Split Learning via Outlier DetectionCryptology and Network Security10.1007/978-981-97-8016-7_6(118-142)Online publication date: 29-Sep-2024
      • (2023)Data Leakage Threats and Protection in Split Learning: A SurveyProceedings of the 2023 International Conference on Intelligent Computing and Its Emerging Applications10.1145/3659154.3659189(141-147)Online publication date: 14-Dec-2023
      • (2023)Decentralized Learning in Healthcare: A Review of Emerging TechniquesIEEE Access10.1109/ACCESS.2023.328183211(54188-54209)Online publication date: 2023
      • Show More Cited By

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media