Difference between revisions of "Mirhoseini2016cryptoml"

From ACES

(Import from BibTeX)
 
m (Default pdf)
 
(One intermediate revision by the same user not shown)
Line 3: Line 3:
|keywords=Garbled Circuits, Machine Learning
|keywords=Garbled Circuits, Machine Learning
|abstract=<p>We present CryptoML, the first practical framework for provably secure and efficient delegation of a wide range of contemporary matrix-based machine learning (ML) applications on massive datasets. In CryptoML a delegating client with memory and computational resource constraints wishes to assign the storage and ML-related computations to the cloud servers, while preserving the privacy of its data. We first suggest the dominant components of delegation performance cost, and create a matrix sketching technique that aims at minimizing the cost by data pre-processing. We then propose a novel interactive delegation protocol based on the provably secure Shamir\&rsquo;s secret sharing. We demonstrate how the proposed protocol can be customized for our new sketching technique to maximize the client\&rsquo;s resource efficiency. CryptoML shows a new trade-off between the efficiency of secure delegation and the accuracy of the ML task. Proof of concept evaluations corroborate applicability of CryptoML to datasets with billions of non-zero records.</p>
|abstract=<p>We present CryptoML, the first practical framework for provably secure and efficient delegation of a wide range of contemporary matrix-based machine learning (ML) applications on massive datasets. In CryptoML a delegating client with memory and computational resource constraints wishes to assign the storage and ML-related computations to the cloud servers, while preserving the privacy of its data. We first suggest the dominant components of delegation performance cost, and create a matrix sketching technique that aims at minimizing the cost by data pre-processing. We then propose a novel interactive delegation protocol based on the provably secure Shamir\&rsquo;s secret sharing. We demonstrate how the proposed protocol can be customized for our new sketching technique to maximize the client\&rsquo;s resource efficiency. CryptoML shows a new trade-off between the efficiency of secure delegation and the accuracy of the ML task. Proof of concept evaluations corroborate applicability of CryptoML to datasets with billions of non-zero records.</p>
|month=5
|year=2016
|booktitle=IEEE International Symposium on Hardware Oriented Security and Trust(HOST)
|booktitle=IEEE International Symposium on Hardware Oriented Security and Trust(HOST)
|title=CryptoML: Secure Outsourcing of Big Data Machine Learning Applications
|title=CryptoML: Secure Outsourcing of Big Data Machine Learning Applications
|entry=inproceedings
|entry=inproceedings
|date=2016-Ma-01
|pdf=Mirhoseini2016cryptoml.pdf
}}
}}

Latest revision as of 17:38, 9 November 2021

Mirhoseini2016cryptoml
entryinproceedings
address
annote
authorAzalia Mirhoseini and Ahmad-Reza Sadeghi and Farinaz Koushanfar
booktitleIEEE International Symposium on Hardware Oriented Security and Trust(HOST)
chapter
edition
editor
howpublished
institution
journal
month5
note
number
organization
pages
publisher
school
series
titleCryptoML: Secure Outsourcing of Big Data Machine Learning Applications
type
volume
year2016
doi
issn
isbn
url
pdfMirhoseini2016cryptoml.pdf

File:Mirhoseini2016cryptoml.pdf

Icon-email.png
Email:
farinaz@ucsd.edu
Icon-addr.png
Address:
Electrical & Computer Engineering
University of California, San Diego
9500 Gilman Drive, MC 0407
Jacobs Hall, Room 6401
La Jolla, CA 92093-0407
Icon-addr.png
Lab Location: EBU1-2514
University of California San Diego
9500 Gilman Dr, La Jolla, CA 92093