Yulong Wang , Guoxin Zhong , Yubing Duan , Yunchang Cheng , Mingyong Yin , Run Yang
{"title":"Efficient and privacy-preserving deep inference towards cloud–edge collaborative","authors":"Yulong Wang , Guoxin Zhong , Yubing Duan , Yunchang Cheng , Mingyong Yin , Run Yang","doi":"10.1016/j.asoc.2025.113381","DOIUrl":null,"url":null,"abstract":"<div><div>The cloud–edge collaborative inference approach splits deep neural networks (DNNs) into two parts to run collaboratively on resource-constrained edge devices(AIoT devices) and cloud servers, aiming at minimizing inference latency and protecting data privacy for AIoT computing system. However, despite not exposing the raw input data from edge devices directly to the cloud, state-of-the-art attacks can still target collaborative inference to reconstruct the raw private data from exposed local models’ intermediate outputs, introducing serious privacy risks. In this paper, we propose a secure privacy inference framework for cloud–edge collaboration system towards AIoT network, called CIS (<u>C</u>ollaborative <u>I</u>nference <u>S</u>hield), which supports adaptively partitioning the network according to dynamically changing network bandwidth and fully releases the computational power of edge devices. To mitigate the influence introduced by private perturbation, CIS provides a way to achieve differential privacy protection by adding refined noise to the intermediate layer feature maps offloaded to the cloud. Meanwhile, given a total privacy budget, the budget is reasonably allocated by the size of the feature graph rank generated by different convolution filters, making cloud inference robust to the perturbed data, thus effectively trading-off between privacy and availability. Finally, we construct a real cloud–edge collaborative inference computing scenario to verify the effectiveness of inference latency and model partitioning on resource-constrained edge devices. Furthermore, the state-of-the-art cloud–edge collaborative reconstruction attack is utilized to evaluate the practical availability of the end-to-end privacy protection mechanism provided by CIS.</div></div>","PeriodicalId":50737,"journal":{"name":"Applied Soft Computing","volume":"180 ","pages":"Article 113381"},"PeriodicalIF":7.2000,"publicationDate":"2025-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Soft Computing","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1568494625006921","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
The cloud–edge collaborative inference approach splits deep neural networks (DNNs) into two parts to run collaboratively on resource-constrained edge devices(AIoT devices) and cloud servers, aiming at minimizing inference latency and protecting data privacy for AIoT computing system. However, despite not exposing the raw input data from edge devices directly to the cloud, state-of-the-art attacks can still target collaborative inference to reconstruct the raw private data from exposed local models’ intermediate outputs, introducing serious privacy risks. In this paper, we propose a secure privacy inference framework for cloud–edge collaboration system towards AIoT network, called CIS (Collaborative Inference Shield), which supports adaptively partitioning the network according to dynamically changing network bandwidth and fully releases the computational power of edge devices. To mitigate the influence introduced by private perturbation, CIS provides a way to achieve differential privacy protection by adding refined noise to the intermediate layer feature maps offloaded to the cloud. Meanwhile, given a total privacy budget, the budget is reasonably allocated by the size of the feature graph rank generated by different convolution filters, making cloud inference robust to the perturbed data, thus effectively trading-off between privacy and availability. Finally, we construct a real cloud–edge collaborative inference computing scenario to verify the effectiveness of inference latency and model partitioning on resource-constrained edge devices. Furthermore, the state-of-the-art cloud–edge collaborative reconstruction attack is utilized to evaluate the practical availability of the end-to-end privacy protection mechanism provided by CIS.
期刊介绍:
Applied Soft Computing is an international journal promoting an integrated view of soft computing to solve real life problems.The focus is to publish the highest quality research in application and convergence of the areas of Fuzzy Logic, Neural Networks, Evolutionary Computing, Rough Sets and other similar techniques to address real world complexities.
Applied Soft Computing is a rolling publication: articles are published as soon as the editor-in-chief has accepted them. Therefore, the web site will continuously be updated with new articles and the publication time will be short.