Confidential and Verifiable Machine Learning Delegations on the Cloud

Wenxuan Wu, Soamar Homsi, Yupeng Zhang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

With the growing adoption of cloud computing, the ability to store data and delegate computations to powerful and affordable cloud servers have become advantageous for both companies and individual users. However, the security of cloud computing has emerged as a significant concern. Particularly, Cloud Service Providers (CSPs) cannot assure data confidentiality and computations integrity in mission-critical applications. In this paper, we propose a confidential and verifiable delegation scheme that advances and overcomes major performance limitations of existing Secure Multiparty Computation (MPC) and Zero Knowledge Proof (ZKP). Secret-shared Data and delegated computations to multiple cloud servers remain completely confidential as long as there is at least one honest MPC server. Moreover, results are guaranteed to be valid even if all the participating servers are malicious. Specifically, we design an efficient protocol based on interactive proofs, such that most of the computations generating the proof can be done locally on each server. In addition, we propose a special protocol for matrix multiplication where the overhead of generating the proof is asymptotically smaller than the time to evaluate the result in MPC. Experimental evaluation demonstrates that our scheme significantly outperforms prior work, with the online prover time being 1–2 orders of magnitude faster. Notably, in the matrix multiplication protocol, only a minimal 2% of the total time is spent on the proof generation. Furthermore, we conducted tests on machine learning inference tasks. We executed the protocol for a fully-connected neural network with 3 layers on the MNIST dataset and it takes 2.6 s to compute the inference in MPC and generate the proof, 88× faster than prior work. We also tested the convolutional neural network of Lenet with 2 convolution layers and 3 dense layers and the running time is less than 300 s across three servers.

Original languageEnglish (US)
Title of host publicationComputer Security – ESORICS 2024 - 29th European Symposium on Research in Computer Security, Proceedings
EditorsJoaquin Garcia-Alfaro, Rafał Kozik, Michał Choraś, Sokratis Katsikas
PublisherSpringer
Pages182-201
Number of pages20
ISBN (Print)9783031708893
DOIs
StatePublished - 2024
Event29th European Symposium on Research in Computer Security, ESORICS 2024 - Bydgoszcz, Poland
Duration: Sep 16 2024Sep 20 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14983 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference29th European Symposium on Research in Computer Security, ESORICS 2024
Country/TerritoryPoland
CityBydgoszcz
Period9/16/249/20/24

Keywords

  • Privacy-preserving Machine Learning
  • Secure Multiparty Computations
  • Zero-Knowledge Proof

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Confidential and Verifiable Machine Learning Delegations on the Cloud'. Together they form a unique fingerprint.

Cite this