Papers
Topics
Authors
Recent
Search
2000 character limit reached

Two Birds with One Stone: Differential Privacy by Low-power SRAM Memory

Published 26 Mar 2024 in cs.CR | (2403.17303v1)

Abstract: The software-based implementation of differential privacy mechanisms has been shown to be neither friendly for lightweight devices nor secure against side-channel attacks. In this work, we aim to develop a hardware-based technique to achieve differential privacy by design. In contrary to the conventional software-based noise generation and injection process, our design realizes local differential privacy (LDP) by harnessing the inherent hardware noise into controlled LDP noise when data is stored in the memory. Specifically, the noise is tamed through a novel memory design and power downscaling technique, which leads to double-faceted gains in privacy and power efficiency. A well-round study that consists of theoretical design and analysis and chip implementation and experiments is presented. The results confirm that the developed technique is differentially private, saves 88.58% system power, speeds up software-based DP mechanisms by more than 106 times, while only incurring 2.46% chip overhead and 7.81% estimation errors in data recovery.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (36)
  1. Y. Zhou, D. Wilkinson, R. Schreiber, and R. Pan, “Large-scale parallel collaborative filtering for the netflix prize,” in International conference on algorithmic applications in management.   Springer, 2008, pp. 337–348.
  2. C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in Theory of cryptography conference.   Springer, 2006, pp. 265–284.
  3. A. Machanavajjhala, D. Kifer, J. Abowd, J. Gehrke, and L. Vilhuber, “Privacy: Theory meets practice on the map,” in Proceedings of the 2008 IEEE 24th International Conference on Data Engineering.   IEEE Computer Society, 2008, pp. 277–286.
  4. F. McSherry and I. Mironov, “Differentially private recommender systems: Building privacy into the netflix prize contenders,” in Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining.   ACM, 2009, pp. 627–636.
  5. Z. Qin, Y. Yang, T. Yu, I. Khalil, X. Xiao, and K. Ren, “Heavy hitter estimation over set-valued data with local differential privacy,” in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.   ACM, 2016, pp. 192–203.
  6. Ú. Erlingsson, V. Pihur, and A. Korolova, “Rappor: Randomized aggregatable privacy-preserving ordinal response,” in Proceedings of the 2014 ACM SIGSAC conference on computer and communications security.   ACM, 2014, pp. 1054–1067.
  7. I. Mironov, “On significance of the least significant bits for differential privacy,” in Proceedings of the 2012 ACM conference on Computer and communications security.   ACM, 2012, pp. 650–661.
  8. M. Andrysco, D. Kohlbrenner, K. Mowery, R. Jhala, S. Lerner, and H. Shacham, “On subnormal floating point and abnormal timing,” in 2015 IEEE Symposium on Security and Privacy.   IEEE, 2015, pp. 623–639.
  9. A. Haeberlen, B. C. Pierce, and A. Narayan, “Differential privacy under fire.” in USENIX Security Symposium, 2011.
  10. J. Liu and N. Gong, “Privacy by memory design: Visions and open problems,” IEEE Micro, vol. 44, no. 1, pp. 49–58, 2024.
  11. S. Y. Yu, H. Jiang, S. Huang, X. Peng, and A. Lu, “Compute-in-memory chips for deep learning: Recent trends and prospects,” IEEE Circuits and Systems Magazine, vol. 21, no. 3, pp. 31–56, 2021.
  12. S. L. Warner, “Randomized response: A survey technique for eliminating evasive answer bias,” Journal of the American Statistical Association, vol. 60, no. 309, pp. 63–69, 1965.
  13. J. Fu, Z. Liao, J. Liu, S. C. Smith, and J. Wang, “Memristor-based variation-enabled differentially private learning systems for edge computing in iot,” IEEE Internet of Things Journal, vol. 8, no. 12, pp. 9672–9682, 2020.
  14. Y. Xu, H. Das, Y. Gong, and N. Gong, “On mathematical models of optimal video memory design,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 30, no. 1, pp. 256–266, 2019.
  15. N. Gong, S. Jiang, J. Wang, B. Aravamudhan, K. Sekar, and R. Sridhar, “Hybrid-cell register files design for improving nbti reliability,” Microelectronics Reliability, vol. 52, no. 9-10, pp. 1865–1869, 2012.
  16. J. Croon, S. Decoutere, W. Sansen, and H. Maes, “Physical modeling and prediction of the matching properties of mosfets,” in Proceedings of the 30th European Solid-State Circuits Conference (IEEE Cat. No. 04EX850).   IEEE, 2004, pp. 193–196.
  17. H. Das, A. A. Haidous, S. C. Smith, and N. Gong, “Flexible low-cost power-efficient video memory with ecc-adaptation,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 29, no. 10, pp. 1693–1706, 2021.
  18. M. Gottscho, A. BanaiyanMofrad, N. D. Dutt, A. Nicolau, and P. Gupta, “Dpcs: Dynamic power/capacity scaling for sram caches in the nanoscale era,” ACM Transactions on Architecture and Code Optimization, vol. 12, no. 3, pp. 1–27, 2015.
  19. J. Edstrom, D. Chen, Y. Gong, J. Wang, and N. Gong, “Data-pattern enabled self-recovery low-power storage system for big video data,” IEEE Transactions on Big Data, vol. 5, no. 1, pp. 95–105, 2017.
  20. Y. Wang, R. Paccagnella, E. T. He, H. Shacham, C. W. Fletcher, and D. Kohlbrenner, “Hertzbleed: Turning power {{\{{Side-Channel}}\}} attacks into remote timing attacks on x86,” in 31st USENIX Security Symposium (USENIX Security 22), 2022, pp. 679–697.
  21. D. R. Dipta and B. Gulmezoglu, “Df-sca: dynamic frequency side channel attacks are practical,” in Proceedings of the 38th Annual Computer Security Applications Conference, 2022, pp. 841–853.
  22. T. Murakami and Y. Kawamoto, “Utility-optimized local differential privacy mechanisms for distribution estimation,” in 28th {{\{{USENIX}}\}} Security Symposium ({{\{{USENIX}}\}} Security 19), 2019, pp. 1877–1894.
  23. T. Wang, J. Blocki, N. Li, and S. Jha, “Locally differentially private protocols for frequency estimation,” in 26th {{\{{USENIX}}\}} Security Symposium ({{\{{USENIX}}\}} Security 17), 2017, pp. 729–745.
  24. D. Yang, D. Zhang, V. W. Zheng, and Z. Yu, “Modeling user activity preference by leveraging user spatial temporal characteristics in lbsns,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 45, no. 1, pp. 129–142, 2015.
  25. N. Holohan, S. Braghin, P. Mac Aonghusa, and K. Levacher, “Diffprivlib: the ibm differential privacy library,” arXiv preprint arXiv:1907.02444, 2019.
  26. Digi-Key, “Use advanced ldos to meet iot wireless sensor power supply design challenges,” 2019. [Online]. Available: https://www.digikey.com/en/articles/use-advanced-ldos-iot-wireless-sensor-power-supply-design
  27. H. Kwon, D. Kim, Y. H. Kim, and S. Kang, “Variation-aware sram cell optimization using deep neural network-based sensitivity analysis,” IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 68, no. 4, pp. 1567–1577, 2021.
  28. K. A. Bowman, “Adaptive and resilient circuits: A tutorial on improving processor performance, energy efficiency, and yield via dynamic variation,” IEEE Solid-State Circuits Magazine, vol. 10, no. 3, pp. 16–25, 2018.
  29. J. Tschanz, N. S. Kim, S. Dighe, J. Howard, G. Ruhl, S. Vangal, S. Narendra, Y. Hoskote, H. Wilson, C. Lam et al., “Adaptive frequency and biasing techniques for tolerance to dynamic temperature-voltage variations and aging,” in 2007 IEEE International Solid-State Circuits Conference. Digest of Technical Papers.   IEEE, 2007, pp. 292–604.
  30. J. Liu, C. Zhang, B. Lorenzo, and Y. Fang, “Dpavatar: A real-time location protection framework for incumbent users in cognitive radio networks,” IEEE Transactions on Mobile Computing, vol. 19, no. 3, pp. 552–565, 2019.
  31. X. Pei, X. Deng, S. Tian, J. Liu, and K. Xue, “Privacy-enhanced graph neural network for decentralized local graphs,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 1614–1629, 2023.
  32. N. Gai, K. Xue, B. Zhu, J. Yang, J. Liu, and D. He, “An efficient data aggregation scheme with local differential privacy in smart grid,” Digital Communications and Networks, vol. 8, no. 3, pp. 333–342, 2022.
  33. C. Ilvento, “Implementing the exponential mechanism with base-2 differential privacy,” in Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020, pp. 717–742.
  34. L. Yang and B. Murmann, “Approximate sram for energy-efficient, privacy-preserving convolutional neural networks,” in 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI).   IEEE, 2017, pp. 689–694.
  35. J. Hsu, M. Gaboardi, A. Haeberlen, S. Khanna, A. Narayan, B. C. Pierce, and A. Roth, “Differential privacy: An economic method for choosing epsilon,” in 2014 IEEE 27th Computer Security Foundations Symposium.   IEEE, 2014, pp. 398–410.
  36. L. T. Clark, S. B. Medapuram, and D. K. Kadiyala, “Sram circuits for true random number generation using intrinsic bit instability,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 26, no. 10, pp. 2027–2037, 2018.
Citations (2)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (3)

Collections

Sign up for free to add this paper to one or more collections.