Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3576915.3624364acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
demonstration

Demo: Image Disguising for Scalable GPU-accelerated Confidential Deep Learning

Published: 21 November 2023 Publication History

Abstract

Deep learning training involves large training data and expensive model tweaking, for which cloud GPU resources can be a popular option. However, outsourcing data often raises privacy concerns. The challenge is to preserve data and model confidentiality without sacrificing GPU-based scalable training and low-cost client-side preprocessing, which is difficult for conventional cryptographic solutions to achieve. This demonstration shows a new approach, image disguising, represented by recent work: DisguisedNets, NeuraCrypt, and InstaHide, which aim to securely transform training images while still enabling the desired scalability and efficiency. We present an interactive system for visually and comparatively exploring these methods. Users can view disguised images, note low client-side processing costs, and observe the maintained efficiency and model quality during server-side GPU-accelerated training. This demo aids researchers and practitioners in swiftly grasping the advantages and limitations of image-disguising methods.

References

[1]
Martin Abadi and et al. 2016. Deep Learning with Differential Privacy. In Pro-ceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.
[2]
Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Shuang Song, Abhradeep Thakurta, and Florian Tramèr. 2021. Is Private Learning Possible with Instance Encoding?. In IEEE Symposium on Security and Privacy (S&P).
[3]
Nicholas Carlini, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Florian Tramèr. 2021. NeuraCrypt is not private. CoRR abs/2108.07256 (2021). arXiv:2108.07256 https://arxiv.org/abs/2108.07256
[4]
Briland Hitaj, Giuseppe Ateniese, and Fernando Perez-Cruz. 2017. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM.
[5]
Yangsibo Huang, Zhao Song, Kai Li, and Sanjeev Arora. 2020. InstaHide: Instance-hiding Schemes for Private Distributed Learning. In Proceedings of the 37th International Conference on Machine Learning, Vol. 119. PMLR, 4507--4518.
[6]
Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy (SP). 19--38.
[7]
Sagar Sharma, AKM Mubashwir Alam, and Keke Chen. 2021. Image Disguising for Protecting Data and Model Confidentiality in Outsourced Deep Learning. In IEEE Conference on Cloud Computing.
[8]
Adam Yala and et al. 2021. NeuraCrypt: Hiding Private Health Data via Random Neural Networks for Public Training. CoRR abs/2106.02484 (2021). arXiv:2106.02484 https://arxiv.org/abs/2106.02484

Cited By

View all
  • (2023)Deep Learning-Based Multifunctional End-to-End Model for Optical Character Classification and DenoisingJournal of Computational Methods in Engineering Applications10.62836/jcmea.v3i1.030103(1-13)Online publication date: 15-Nov-2023
  • (2022)A Review of the Comprehensive Application of Big Data, Artificial Intelligence, and Internet of Things Technologies in Smart CitiesJournal of Computational Methods in Engineering Applications10.62836/jcmea.v2i1.0004(1-10)Online publication date: 22-Sep-2022

Index Terms

  1. Demo: Image Disguising for Scalable GPU-accelerated Confidential Deep Learning

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
    November 2023
    3722 pages
    ISBN:9798400700507
    DOI:10.1145/3576915
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 November 2023

    Check for updates

    Author Tags

    1. gpu-acceleration
    2. instance encoding
    3. privacy-preserving machine learning

    Qualifiers

    • Demonstration

    Funding Sources

    • NSF

    Conference

    CCS '23
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)127
    • Downloads (Last 6 weeks)9
    Reflects downloads up to 30 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Deep Learning-Based Multifunctional End-to-End Model for Optical Character Classification and DenoisingJournal of Computational Methods in Engineering Applications10.62836/jcmea.v3i1.030103(1-13)Online publication date: 15-Nov-2023
    • (2022)A Review of the Comprehensive Application of Big Data, Artificial Intelligence, and Internet of Things Technologies in Smart CitiesJournal of Computational Methods in Engineering Applications10.62836/jcmea.v2i1.0004(1-10)Online publication date: 22-Sep-2022

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media