Hi, I'm Lucile đź‘‹

I'm a PhD candidate in ECE at NYU

Lucile Yang

Hi, I'm Lucile đź‘‹

I'm a PhD candidate in ECE at NYU

Privacy and Energy-Aware Split Deep Learning in Edge Camera Network

Privacy and Energy-Aware Split Deep Learning in Edge Camera Network

Paper (This work is published in IEEE Transactions on Network and Service Management): https://ieeexplore.ieee.org/abstract/document/9941479

Motivation

Recently, an increasing amount of application tasks have depended on deep learning (DL) inference models on Internet of Things (IoT) based camera networks. However, it is challenging to perform the inference of such resource-hungry DL models on the computationally limited IoT system. Compared to cloud computing, edge computing deploys resources near the end-users to reduce the transmission delay and retains the raw data on the trusted servers to mitigate privacy concerns. Since resources at the edge are limited, management like user association decisions, edge resources allocation, and device configuration with DL model parameter selection becomes essential.

Our approach

We proposes a coalition formation game-based algorithm to solve the association problem between IoT-based cameras and the edge nodes. Our goal is to maximize the social welfare that consists of multi-view detection enhancement, the privacy retained preference, and the power savings from the cameras. Besides, we adopt the concept of split-ML to provide more flexibility for networking and computing resources allocation at the edge.

An illustration of the association between IoT-based cameras and edge nodes.

An illustration of the association between IoT-based cameras and edge nodes.

Configuration table for edge cameras

The concept of Split-ML in Edge Camera Network is shown in the figure below. The inference of DNN models can be decomposed into two groups of consecutive layers according to the different output sizes of each layer. The former part (close to input) will be executed by local IoT-based camera while the latter part (close to output) will be performed by the associated edge server.

The concept of Split-ML in Edge Camera Network.

Different model and different input image resolution will result in different network architecture and hence different possible split points. The following figure shows an example of possible split points for VGG19. Different split points will correspond to different transmission requirement (in Mbps) from edge camera to edge server as well as different server computing requirement and camera computing requirements (in BFLOPs).

Different model and different input image resolution will result in different network architecture and hence different possible split points. Figure shows an example of possible split points for VGG19. Different split points will correspond to different transmission requirement (in Mbps) from edge camera to edge server as well as different server computing requirement and camera computing requirements (in BFLOPs).

Privacy leakage issue when performing split

With DNN partition techniques, each partition point would correspond to the output of a certain layer, that is, the feature map after executing the former part of the model. Research has shown that attackers can still recover the original raw image to some degree from these feature maps (see the figure below).

An example of white-box regularized maximum likelihood estimation attack for VGG19 on Caltech101 dataset.

An example of white-box regularized maximum likelihood estimation attack for VGG19 on Caltech101 dataset.

Moreover, feature maps from earlier layers are easier to reproduce, while those from later layers often require more effort to recover. The degree of recovery varies according to the split point selected. We use the structural similarity index measure (SSIM) as a metric to evaluate the quality of the reproduced images.

An illustration of images reproduced from intermediate feature maps of different split points.

An illustration of images reproduced from intermediate feature maps of different split points.

It is worth noting that when splitting at an earlier layer of the deep learning model (the case in which the camera has less computation workload), the attackers need less effort to obtain an image similar to the original data. On the other hand, if the split point is close to the output side of the model (the case in which the camera needs to compute more), it is not easy for the attackers to get an image similar to the original data even if they spent more time on training the attack model. As can be seen from the description above, there is a trade-off between privacy leakage and the camera’s power consumption. Thus, it is necessary to select an appropriate configuration (split poin ) based on the camera’s computing capability and privacy preference.

Results


Coalition formation games


Model-level task decomposition


DICE-IoT From: Y. Zhang, J.-H. Liu, C.-Y. Wang, and H.-Y. Wei, “Decomposable intelligence on cloud-edge iot framework for live video analytics,”IEEE Internet of Things Journal, vol. 7, no. 9, pp. 8860–8873, 2020.

Papers:


Layer-level decomposition


yolov4output

3gpptr From: 3GPP, “5G System (5GS); Study on traffic characteristics and performance requirements for AI/ML model transfer,” 3rd Generation Partnership Project (3GPP), Technical Report (TR) 22.874

Papers


Parallel decomposition


Papers


Both parallel and layer-level

Papers