Affiliation:
1. Dalian Minzu University, College of Computer Science and Engineering, Dalian, Liaoning, China
Abstract
The increased use of artificial intelligence generated content (AIGC) among vast user populations has heightened the risk of private data leaks. Effective auditing and regulation remain challenging, further compounding the risks associated with the leaks involving model parameters and user data. Blockchain technology, renowned for its decentralized consensus mechanism and tamper-resistant properties, is emerging as an ideal tool for documenting, auditing, and analyzing the behaviors of all stakeholders in machine learning as a service (MLaaS). This study centers on biometric recognition systems, addressing pressing privacy and security concerns through innovative endeavors. We conducted experiments to analyze six distinct deep neural networks, leveraging a dataset quality metric grounded in the query output space to quantify the value of the transfer datasets. This analysis revealed the impact of imbalanced datasets on training accuracy, thereby bolstering the system’s capacity to detect model data thefts. Furthermore, we designed and implemented a novel Bio-Rollup scheme, seamlessly integrating technologies such as certificate authority, blockchain layer two scaling, and zero-knowledge proofs. This innovative scheme facilitates lightweight auditing through Merkle proofs, enhancing efficiency while minimizing blockchain storage requirements. Compared to the baseline approach, Bio-Rollup restores the integrity of the biometric system and simplifies deployment procedures. It effectively prevents unauthorized use through certificate authorization and zero-knowledge proofs, thus safeguarding user privacy and offering a passive defense against model stealing attacks.
Funder
The Excellent program of Chinese higher education pedagogy society
Reference57 articles.
1. A privacy-preservation framework based on biometrics blockchain (BBC) to prevent attacks in VANET;Alharthi;IEEE Access,2021
2. Aztec network: ethereum, encrypted;Aztec,2020
3. Black-box ripper: copying black-box models using generative evolutionary algorithms;Barbalau;Advances in Neural Information Processing Systems,2020
4. Random oracles are practical: a paradigm for designing efficient protocols;Bellare,1993
5. Succinct non-interactive arguments via linear interactive proofs;Bitansky,2013