Privacy-preserving and verifiable convolution neural network inference and training in cloud computing

Wei Cao, Wenting Shen*, Jing Qin, Hao Lin

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

7 Downloads (Pure)

Abstract

With the rapid development of cloud computing, outsourcing massive data and complex deep learning model to cloud servers (CSs) has become a popular trend, which also brings some security problems. One is that the model stored in the CSs may be corrupted, leading to incorrect inference and training results. The other is that the privacy of outsourced data and model may be compromised. However, existing privacy-preserving and verifiable inference schemes suffer from low detection probability, high communication overhead and substantial computational time. To solve the above problems, we propose a privacy-preserving and verifiable scheme for convolutional neural network inference and training in cloud computing. In our scheme, the model owner generates the authenticators for model parameters before uploading the model to CSs. In the phase of model integrity verification, model owner and user can utilize these authenticators to check model integrity with high detection probability. Furthermore, we design a set of privacy-preserving protocols based on replicated secret sharing for both the inference and training phases, significantly reducing communication overhead and computational time. Through security analysis, we demonstrate that our scheme is secure. Experimental evaluations show that the proposed scheme outperforms existing schemes in privacy-preserving inference and model integrity verification.

Original languageEnglish
Article number107560
Number of pages13
JournalFuture Generation Computer Systems
Volume164
DOIs
Publication statusPublished - 2025

Bibliographical note

Green Open Access added to TU Delft Institutional Repository 'You share, we take care!' - Taverne project https://www.openaccess.nl/en/you-share-we-take-care
Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • Cloud computing
  • Convolutional neural network
  • Integrity verification
  • Privacy-preserving

Fingerprint

Dive into the research topics of 'Privacy-preserving and verifiable convolution neural network inference and training in cloud computing'. Together they form a unique fingerprint.

Cite this