• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zuo Pengfei, Hua Yu, Xie Xinfeng, Hu Xing, Xie Yuan, Feng Dan. A Secure Encryption Scheme for Deep Learning Accelerators[J]. Journal of Computer Research and Development, 2019, 56(6): 1161-1169. DOI: 10.7544/issn1000-1239.2019.20190109
Citation: Zuo Pengfei, Hua Yu, Xie Xinfeng, Hu Xing, Xie Yuan, Feng Dan. A Secure Encryption Scheme for Deep Learning Accelerators[J]. Journal of Computer Research and Development, 2019, 56(6): 1161-1169. DOI: 10.7544/issn1000-1239.2019.20190109

A Secure Encryption Scheme for Deep Learning Accelerators

Funds: This work was supported by the National Natural Science Foundation of China (61772212, 61821003).
More Information
  • Published Date: May 31, 2019
  • With the rapid development of machine learning techniques, especially deep learning (DL), their application domains are wider and wider and increasingly expanded from cloud computing to edge computing. In deep learning, DL models as the intellectual property (IP) of model providers become important data. We observe that DL accelerators deployed on edge devices for edge computing have the risk of leaking DL models stored on them. Attackers are able to easily obtain the DL model data by snooping the memory bus connecting the on-chip accelerator and off-chip device memory. Therefore, encrypting data transmitted on the memory bus is non-trivial. However, directly using memory encryption in DL accelerators significantly decreases their performance. To address this problem, this paper proposes COSA, a COunter mode Secure deep learning Accelerator architecture. COSA achieves higher security level than direct encryption and removes decryption operations from the critical path of memory accesses by leveraging counter mode encryption. We have implemented COSA in GPGPU-Sim and evaluated it using the neural network workload. Experimental results show COSA improves the performance of the secure accelerator by over 3 times compared with direct encryption and causes only 13% performance decrease compared with an insecure accelerator without using encryption.
  • Related Articles

    [1]Zhao Xingwang, Zhang Yaopu, Liang Jiye. Two-Stage Ensemble-Based Community Discovery Algorithm in Multilayer Networks[J]. Journal of Computer Research and Development, 2023, 60(12): 2832-2843. DOI: 10.7544/issn1000-1239.202220214
    [2]Zhao Xia, Zhang Zehua, Zhang Chenwei, Li Xian. RGNE:A Network Embedding Method for Overlapping Community Detection Based on Rough Granulation[J]. Journal of Computer Research and Development, 2020, 57(6): 1302-1311. DOI: 10.7544/issn1000-1239.2020.20190572
    [3]Zheng Wenping, Che Chenhao, Qian Yuhua, Wang Jie. A Two-Stage Community Detection Algorithm Based on Label Propagation[J]. Journal of Computer Research and Development, 2018, 55(9): 1959-1971. DOI: 10.7544/issn1000-1239.2018.20180277
    [4]Du Hangyuan, Wang Wenjian, Bai Liang. An Overlapping Community Detection Algorithm Based on Centrality Measurement of Network Node[J]. Journal of Computer Research and Development, 2018, 55(8): 1619-1630. DOI: 10.7544/issn1000-1239.2018.20180187
    [5]Liu Yao, Kang Xiaohui, Gao Hong, Liu Qiao, Wu Zufeng, Qin Zhiguang. A Community Detecting Method Based on the Node Intimacy and Degree in Social Network[J]. Journal of Computer Research and Development, 2015, 52(10): 2363-2372. DOI: 10.7544/issn1000-1239.2015.20150407
    [6]Xin Yu, Yang Jing, Xie Zhiqiang. A Semantic Overlapping Community Detecting Algorithm in Social Networks Based on Random Walk[J]. Journal of Computer Research and Development, 2015, 52(2): 499-511. DOI: 10.7544/issn1000-1239.2015.20131246
    [7]Sun Yifan, Li Sai. Similarity-Based Community Detection in Social Network of Microblog[J]. Journal of Computer Research and Development, 2014, 51(12): 2797-2807. DOI: 10.7544/issn1000-1239.2014.20131209
    [8]Zhu Mu, Meng Fanrong, and Zhou Yong. Density-Based Link Clustering Algorithm for Overlapping Community Detection[J]. Journal of Computer Research and Development, 2013, 50(12): 2520-2530.
    [9]Deng Xiaolong, Wang Bai, Wu Bin, and Yang Shengqi. Modularity Modeling and Evaluation in Community Detecting of Complex Network Based on Information Entropy[J]. Journal of Computer Research and Development, 2012, 49(4): 725-734.
    [10]Lin Youfang, Wang Tianyu, Tang Rui, Zhou Yuanwei, Huang Houkuan. An Effective Model and Algorithm for Community Detection in Social Networks[J]. Journal of Computer Research and Development, 2012, 49(2): 337-345.

Catalog

    Article views (1659) PDF downloads (792) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return