Difference between revisions of "Mirhoseini2016cryptoml"
From ACES
(Import from BibTeX) |
m (Default pdf) |
||
(One intermediate revision by the same user not shown) | |||
Line 3: | Line 3: | ||
|keywords=Garbled Circuits, Machine Learning | |keywords=Garbled Circuits, Machine Learning | ||
|abstract=<p>We present CryptoML, the first practical framework for provably secure and efficient delegation of a wide range of contemporary matrix-based machine learning (ML) applications on massive datasets. In CryptoML a delegating client with memory and computational resource constraints wishes to assign the storage and ML-related computations to the cloud servers, while preserving the privacy of its data. We first suggest the dominant components of delegation performance cost, and create a matrix sketching technique that aims at minimizing the cost by data pre-processing. We then propose a novel interactive delegation protocol based on the provably secure Shamir\’s secret sharing. We demonstrate how the proposed protocol can be customized for our new sketching technique to maximize the client\’s resource efficiency. CryptoML shows a new trade-off between the efficiency of secure delegation and the accuracy of the ML task. Proof of concept evaluations corroborate applicability of CryptoML to datasets with billions of non-zero records.</p> | |abstract=<p>We present CryptoML, the first practical framework for provably secure and efficient delegation of a wide range of contemporary matrix-based machine learning (ML) applications on massive datasets. In CryptoML a delegating client with memory and computational resource constraints wishes to assign the storage and ML-related computations to the cloud servers, while preserving the privacy of its data. We first suggest the dominant components of delegation performance cost, and create a matrix sketching technique that aims at minimizing the cost by data pre-processing. We then propose a novel interactive delegation protocol based on the provably secure Shamir\’s secret sharing. We demonstrate how the proposed protocol can be customized for our new sketching technique to maximize the client\’s resource efficiency. CryptoML shows a new trade-off between the efficiency of secure delegation and the accuracy of the ML task. Proof of concept evaluations corroborate applicability of CryptoML to datasets with billions of non-zero records.</p> | ||
|month=5 | |||
|year=2016 | |||
|booktitle=IEEE International Symposium on Hardware Oriented Security and Trust(HOST) | |booktitle=IEEE International Symposium on Hardware Oriented Security and Trust(HOST) | ||
|title=CryptoML: Secure Outsourcing of Big Data Machine Learning Applications | |title=CryptoML: Secure Outsourcing of Big Data Machine Learning Applications | ||
|entry=inproceedings | |entry=inproceedings | ||
| | |pdf=Mirhoseini2016cryptoml.pdf | ||
}} | }} |
Latest revision as of 17:38, 9 November 2021
Mirhoseini2016cryptoml | |
---|---|
entry | inproceedings |
address | |
annote | |
author | Azalia Mirhoseini and Ahmad-Reza Sadeghi and Farinaz Koushanfar |
booktitle | IEEE International Symposium on Hardware Oriented Security and Trust(HOST) |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | 5 |
note | |
number | |
organization | |
pages | |
publisher | |
school | |
series | |
title | CryptoML: Secure Outsourcing of Big Data Machine Learning Applications |
type | |
volume | |
year | 2016 |
doi | |
issn | |
isbn | |
url | |
Mirhoseini2016cryptoml.pdf |