论文标题
Cryptotl:私人,高效且安全的转移学习
CryptoTL: Private, Efficient and Secure Transfer Learning
论文作者
论文摘要
近年来,大数据一直是一个普遍存在的口号,但是处理数据稀缺已成为许多现实世界深度学习(DL)应用的关键问题。有效地培训DL模型能够在数据可用性较低的情况下执行任务的一种流行方法是转移学习(TL)。 TL允许将知识从通用域转移到特定目标。但是,在敏感或私人数据方面,这种知识转移可能会使隐私处于危险之中。使用Cryptotl,我们引入了解决此问题的解决方案,并首次展示了基于同型加密的加密隐私性TL方法,该方法在现实世界中有效且可行。我们通过仔细设计框架来实现这一目标,以使培训始终是平淡的,同时仍从同构加密获得的隐私中获利。为了证明我们的框架的效率,我们将其实例化与他计划的流行CKK,并使用小数据集应用于分类任务,并显示我们的方法分析和垃圾邮件检测的适用性。此外,我们强调了如何将方法与差分隐私相结合以进一步提高安全保证。我们的广泛基准表明,使用加密植物会导致高精度,同时尽管使用了同型加密,但仍具有实际的微调和分类时间。具体而言,通过我们设置的加密层进行一个前通通,大约需要笔记本CPU上的1秒。
Big data has been a pervasive catchphrase in recent years, but dealing with data scarcity has become a crucial question for many real-world deep learning (DL) applications. A popular methodology to efficiently enable the training of DL models to perform tasks in scenarios with low availability of data is transfer learning (TL). TL allows to transfer knowledge from a general domain to a specific target one. However, such a knowledge transfer may put privacy at risk when it comes to sensitive or private data. With CryptoTL we introduce a solution to this problem, and show for the first time a cryptographic privacy-preserving TL approach based on homomorphic encryption that is efficient and feasible for real-world use cases. We achieve this by carefully designing the framework such that training is always done in plain while still profiting from the privacy gained by homomorphic encryption. To demonstrate the efficiency of our framework, we instantiate it with the popular CKKS HE scheme and apply CryptoTL to classification tasks with small datasets and show the applicability of our approach for sentiment analysis and spam detection. Additionally, we highlight how our approach can be combined with differential privacy to further increase the security guarantees. Our extensive benchmarks show that using CryptoTL leads to high accuracy while still having practical fine-tuning and classification runtimes despite using homomorphic encryption. Concretely, one forward-pass through the encrypted layers of our setup takes roughly 1s on a notebook CPU.