Attacking and Protecting Data Privacy in Edge–Cloud Collaborative Inference Systems
Autor: | Ruby B. Lee, Zecheng He, Tianwei Zhang |
---|---|
Rok vydání: | 2021 |
Předmět: |
Information privacy
Edge device Computer Networks and Communications business.industry Computer science Deep learning 020206 networking & telecommunications 020207 software engineering Cloud computing 02 engineering and technology computer.software_genre Computer security Computer Science Applications Hardware and Architecture Signal Processing 0202 electrical engineering electronic engineering information engineering Collaboration Artificial intelligence Enhanced Data Rates for GSM Evolution business Host (network) computer Edge computing Information Systems |
Zdroj: | IEEE Internet of Things Journal. 8:9706-9716 |
ISSN: | 2372-2541 |
DOI: | 10.1109/jiot.2020.3022358 |
Popis: | Benefiting from the advance of deep learning (DL) technology, Internet-of-Things (IoT) devices and systems are becoming more intelligent and multifunctional. They are expected to run various DL inference tasks with high efficiency and performance. This requirement is challenged by the mismatch between the limited computing capability of edge devices and large-scale deep neural networks. Edge–cloud collaborative systems are then introduced to mitigate this conflict, enabling resource-constrained IoT devices to host arbitrary DL applications. However, the introduction of third-party clouds can bring potential privacy issues to edge computing. In this article, we conduct a systematic study about the opportunities of attacking and protecting the privacy of edge–cloud collaborative systems. Our contributions are twofold: 1) we first devise a set of new attacks for an untrusted cloud to recover arbitrary inputs fed into the system, even if the attacker has no access to the edge device’s data or computations, or permissions to query this system and 2) we empirically demonstrate that solutions that add noise fail to defeat our proposed attacks, and then propose two more effective defense methods. This provides insights and guidelines to develop more privacy-preserving collaborative systems and algorithms. |
Databáze: | OpenAIRE |
Externí odkaz: |