Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3576915.3624364acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
demonstration

Demo: Image Disguising for Scalable GPU-accelerated Confidential Deep Learning

Published: 21 November 2023 Publication History
  • Get Citation Alerts
  • Abstract

    Deep learning training involves large training data and expensive model tweaking, for which cloud GPU resources can be a popular option. However, outsourcing data often raises privacy concerns. The challenge is to preserve data and model confidentiality without sacrificing GPU-based scalable training and low-cost client-side preprocessing, which is difficult for conventional cryptographic solutions to achieve. This demonstration shows a new approach, image disguising, represented by recent work: DisguisedNets, NeuraCrypt, and InstaHide, which aim to securely transform training images while still enabling the desired scalability and efficiency. We present an interactive system for visually and comparatively exploring these methods. Users can view disguised images, note low client-side processing costs, and observe the maintained efficiency and model quality during server-side GPU-accelerated training. This demo aids researchers and practitioners in swiftly grasping the advantages and limitations of image-disguising methods.

    References

    [1]
    Martin Abadi and et al. 2016. Deep Learning with Differential Privacy. In Pro-ceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.
    [2]
    Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Shuang Song, Abhradeep Thakurta, and Florian Tramèr. 2021. Is Private Learning Possible with Instance Encoding?. In IEEE Symposium on Security and Privacy (S&P).
    [3]
    Nicholas Carlini, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, and Florian Tramèr. 2021. NeuraCrypt is not private. CoRR abs/2108.07256 (2021). arXiv:2108.07256 https://arxiv.org/abs/2108.07256
    [4]
    Briland Hitaj, Giuseppe Ateniese, and Fernando Perez-Cruz. 2017. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM.
    [5]
    Yangsibo Huang, Zhao Song, Kai Li, and Sanjeev Arora. 2020. InstaHide: Instance-hiding Schemes for Private Distributed Learning. In Proceedings of the 37th International Conference on Machine Learning, Vol. 119. PMLR, 4507--4518.
    [6]
    Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In 2017 IEEE Symposium on Security and Privacy (SP). 19--38.
    [7]
    Sagar Sharma, AKM Mubashwir Alam, and Keke Chen. 2021. Image Disguising for Protecting Data and Model Confidentiality in Outsourced Deep Learning. In IEEE Conference on Cloud Computing.
    [8]
    Adam Yala and et al. 2021. NeuraCrypt: Hiding Private Health Data via Random Neural Networks for Public Training. CoRR abs/2106.02484 (2021). arXiv:2106.02484 https://arxiv.org/abs/2106.02484

    Cited By

    View all
    • (2023)Deep Learning-Based Multifunctional End-to-End Model for Optical Character Classification and DenoisingJournal of Computational Methods in Engineering Applications10.62836/jcmea.v3i1.030103(1-13)Online publication date: 15-Nov-2023
    • (2022)A Review of the Comprehensive Application of Big Data, Artificial Intelligence, and Internet of Things Technologies in Smart CitiesJournal of Computational Methods in Engineering Applications10.62836/jcmea.v2i1.0004(1-10)Online publication date: 22-Sep-2022

    Index Terms

    1. Demo: Image Disguising for Scalable GPU-accelerated Confidential Deep Learning

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
      November 2023
      3722 pages
      ISBN:9798400700507
      DOI:10.1145/3576915
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 November 2023

      Check for updates

      Author Tags

      1. gpu-acceleration
      2. instance encoding
      3. privacy-preserving machine learning

      Qualifiers

      • Demonstration

      Funding Sources

      • NSF

      Conference

      CCS '23
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)123
      • Downloads (Last 6 weeks)28
      Reflects downloads up to

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Deep Learning-Based Multifunctional End-to-End Model for Optical Character Classification and DenoisingJournal of Computational Methods in Engineering Applications10.62836/jcmea.v3i1.030103(1-13)Online publication date: 15-Nov-2023
      • (2022)A Review of the Comprehensive Application of Big Data, Artificial Intelligence, and Internet of Things Technologies in Smart CitiesJournal of Computational Methods in Engineering Applications10.62836/jcmea.v2i1.0004(1-10)Online publication date: 22-Sep-2022

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media