skip to main content
10.1145/3556563.3558534acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

BloomXNOR-Net: privacy-preserving machine learning in IoT

Published:17 October 2022Publication History

ABSTRACT

In recent years, the Internet of Things (IoT) has become a dominant data generation framework for establishing a higher level of system intelligence. At the same time, to avail the full advantage of this domain, the adopters of IoT are also keen on applying Machine Learning (ML) algorithms to these datasets to reveal new business insights. However, these datasets contain sensitive information that demands careful processing to prevent privacy breaches. Many existing privacy-preserving ML (PPML) algorithms are unsuitable for these resource-constrained devices. We propose a novel PPML technique that can be executed on IoT devices using the Bloom Filter encoded IoT dataset in XNOR-Net architecture. The preliminary experimental result using the MNIST dataset shows satisfactory performance.

References

  1. Burton H Bloom. 1970. Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13, 7 (1970), 422--426.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. 2015. Leakageabuse attacks against searchable encryption. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security. 668--679.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Li Deng. 2012. The mnist database of handwritten digit images for machine learning research [best of the web]. IEEE Signal Processing Magazine 29, 6 (2012), 141--142.Google ScholarGoogle ScholarCross RefCross Ref
  4. Úlfar Erlingsson, Vasyl Pihur, and Aleksandra Korolova. 2014. Rappor: Randomized aggregatable privacy-preserving ordinal response. In Proceedings of the 2014 ACM SIGSAC conference on computer and communications security. 1054--1067.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Craig Gentry. 2009. A fully homomorphic encryption scheme. Stanford university.Google ScholarGoogle Scholar
  6. Itay Hubara, Matthieu Courbariaux, Daniel Soudry, Ran El-Yaniv, and Yoshua Bengio. 2016. Binarized neural networks. Advances in neural information processing systems 29 (2016).Google ScholarGoogle Scholar
  7. Yann LeCun et al. 2015. LeNet-5, convolutional neural networks. URL: http://yann.lecun. com/exdb/lenet 20, 5 (2015), 14.Google ScholarGoogle Scholar
  8. Mohammad Rastegari, Vicente Ordonez, Joseph Redmon, and Ali Farhadi. 2016. Xnor-net: Imagenet classification using binary convolutional neural networks. In European conference on computer vision. Springer, 525--542.Google ScholarGoogle ScholarCross RefCross Ref
  9. Mohammad Rastegari, Vicente Ordonez, Joseph Redmon, and Ali Farhadi. 2020. Enabling AI at the edge with XNOR-networks. Commun. ACM 63, 12 (2020), 83--90.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Taylor Simons and Dah-Jye Lee. 2019. A review of binarized neural networks. Electronics 8, 6 (2019), 661.Google ScholarGoogle ScholarCross RefCross Ref
  11. Dinusha Vatsalan and Peter Christen. 2016. Privacy-preserving matching of similar patients. Journal of biomedical informatics 59 (2016), 285--298.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Wanli Xue, Dinusha Vatsalan, Wen Hu, and Aruna Seneviratne. 2020. Sequence data matching and beyond: New privacy-preserving primitives based on Bloom filters. IEEE Transactions on Information Forensics and Security 15 (2020), 2973--2987.Google ScholarGoogle ScholarCross RefCross Ref
  13. Mengyao Zheng, Dixing Xu, Linshan Jiang, Chaojie Gu, Rui Tan, and Peng Cheng. 2019. Challenges of privacy-preserving machine learning in IoT. In Proceedings of the First International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things. 1--7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Liehuang Zhu, Xiangyun Tang, Meng Shen, Feng Gao, Jie Zhang, and Xiaojiang Du. 2021. Privacy-preserving machine learning training in IoT aggregation scenarios. IEEE Internet of Things Journal 8, 15 (2021), 12106--12118.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. BloomXNOR-Net: privacy-preserving machine learning in IoT

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      S3 '22: Proceedings of the 13th ACM Wireless of the Students, by the Students, and for the Students Workshop
      October 2022
      13 pages
      ISBN:9781450395267
      DOI:10.1145/3556563

      Copyright © 2022 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 October 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate65of93submissions,70%
    • Article Metrics

      • Downloads (Last 12 months)48
      • Downloads (Last 6 weeks)2

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader