skip to main content
10.1145/3411501.3419425acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference

Published:09 November 2020Publication History

ABSTRACT

We present an extended abstract of MP2ML, a machine learning framework which integrates Intel nGraph-HE, a homomorphic encryption (HE) framework, and the secure two-party computation framework ABY, to enable data scientists to perform private inference of deep learning (DL) models trained using popular frameworks such as TensorFlow at the push of a button. We benchmark MP2ML on the CryptoNets network with ReLU activations, on which it achieves a throughput of 33.3 images/s and an accuracy of 98.6%. This throughput matches the previous state-of-the-art frameworks.

References

  1. Nitin Agrawal, Ali Shahin Shamsabadi, Matt J Kusner, and Adrià Gascón. 2019. QUOTIENT: Two-Party Secure Neural Network Training and Prediction. In CCS'19 .Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, and Hossein Yalame. 2020. MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference. In ARES'20.Google ScholarGoogle Scholar
  3. Fabian Boemer, Anamaria Costache, Rosario Cammarota, and Casimir Wierzynski. 2019 a. nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data. In WAHC'19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Fabian Boemer, Yixing Lao, Rosario Cammarota, and Casimir Wierzynski. 2019 b. nGraph-HE: a graph compiler for deep learning on homomorphically encrypted data. In ACM International Conference on Computing Frontiers.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jung Hee Cheon, Andrey Kim, Miran Kim, and Yongsoo Song. 2017. Homomorphic Encryption for Arithmetic of Approximate Numbers. In ASIACRYPT'17.Google ScholarGoogle Scholar
  6. Daniel Demmler, Thomas Schneider, and Michael Zohner. 2015. ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. In NDSS'15.Google ScholarGoogle Scholar
  7. Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In ICML'16.Google ScholarGoogle Scholar
  8. Oded Goldreich, Silvio Micali, and Avi Wigderson. 1987. How to play any mental game. In STOC'87.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadeghi, Thomas Schneider, and Immo Wehrenberg. 2010. TASTY: Tool for Automating Secure Two-party Computations. In CCS'10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi, and Rebecca N. Wright. 2018. Privacy-preserving Machine Learning as a Service. PETS'18.Google ScholarGoogle Scholar
  11. Chiraag Juvekar, Vinod Vaikuntanathan, and Anantha Chandrakasan. 2018. GAZELLE: A Low Latency Framework for Secure Neural Network Inference. In USENIX Security'18.Google ScholarGoogle Scholar
  12. Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, and Rahul Sharma. 2020. CrypTFlow: Secure TensorFlow Inference. In S&P'20.Google ScholarGoogle Scholar
  13. Jian Liu, Mika Juuti, Yao Lu, and Nadarajah Asokan. 2017. Oblivious neural network predictions via MiniONN transformations. In CCS'17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca Ada Popa. 2020. DELPHI: A Cryptographic Inference Service for Neural Networks. In USENIX Security.Google ScholarGoogle Scholar
  15. Payman Mohassel and Yupeng Zhang. 2017. SecureML: A system for scalable privacy-preserving machine learning. In S&P'17 .Google ScholarGoogle Scholar
  16. M Sadegh Riazi, Mohammad Samragh, Hao Chen, Kim Laine, Kristin E Lauter, and Farinaz Koushanfar. 2019. XONN: XNOR-based Oblivious Deep Neural Network Inference. In USENIX Security'19.Google ScholarGoogle Scholar
  17. M Sadegh Riazi, Christian Weinert, Oleksandr Tkachenko, Ebrahim M Songhori, Thomas Schneider, and Farinaz Koushanfar. 2018. Chameleon: A hybrid secure computation framework for machine learning applications. In ASIACCS'18.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Ronald L. Rivest, Len Adleman, and Michael L. Dertouzos. 1978. On Data Banks and Privacy Homomorphisms. Foundations of Secure Computation, Academia Press.Google ScholarGoogle Scholar
  19. SEAL 2019. Microsoft SEAL (release 3.4). https://github.com/Microsoft/SEAL. Microsoft Research, Redmond, WA.Google ScholarGoogle Scholar
  20. Sameer Wagh, Divya Gupta, and Nishanth Chandran. 2019. SecureNN: 3-Party Secure Computation for Neural Network Training. PETS'19.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice
        November 2020
        75 pages
        ISBN:9781450380881
        DOI:10.1145/3411501

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 9 November 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader