Logo

dev-resources.site

for different kinds of informations.

How cryptography 💪works to protect ML models

Published at
10/25/2021
Categories
security
cryptography
riskmanagement
machinelearning
Author
cossacklabs
Author
11 person written this
cossacklabs
open
How cryptography 💪works to protect ML models

Let’s speak about Machine Learning and cryptography. Are they a match?

spoiler:

yep

Let’s imagine that you are in ML.
You trained fantastic ML models that add cat’s ears =^..^= (nekomimi) to all people on the video. You decided to make an app for that! Suddenly, your app became popular, and some people wanted to copy it. So, it would be best to protect your ML models from leakage and misuse.

Simplified, it works like this: users upload their videos to your app. Your app takes them to your backend, which generates a video-specific ML model, and then sends it back to the app. Then your application stores and executes it.

Being a 💪 security pro, you understand that ML models need protection. But from a data security perspective ML model is a… just file with model data and procedure/algorithm. So, you’re to adjust your security efforts and protect those tiny ML models—from their generation point to their usage.

IML dataflow, by Anastasiia Voitova, Cossack Labs

You carefully add encryption: the backend will encrypt each ML model per user per video using ephemeral keys and an HPKE-like approach. It means that every ML model will be explicitly encrypted for specific videos by your backend code. This approach is known as application-level encryption (ALE).

Your mobile apps will receive an encrypted model and decrypt it before usage. Each ML model is encrypted by a unique encryption key used only once to make things complicated for attackers.

Encryption layer: solutions, by Anastasiia Voitova, Cossack Labs

Indeed, you don’t want to leave encryption alone.

So, you add multiple protection measures: use Keychain/Keystore on a device, add logging and monitoring on a server, and an anti-fraud system that prevents sending ML models to untrusted users.

Anti-fraud system 201, by Anastasiia Voitova, Cossack Labs

Curious to learn details?

Dive into the full video—to learn more about cryptography, cloud storage security, API protection, anti-fraud system, etc.


Sounds too complicated as for protecting =^..^= cat-ears ML model?

Well, imagine a financial analytics ML model instead. We built specific ML-protection technologies several times, as it was exciting every time.


Say hi to @vixentael and follow @cossacklabs for data security updates on Twitter, YouTube, Linkedin, and our website. 👋🧡🔐

riskmanagement Article's
30 articles in total
Favicon
There's more to risk management than what engineers typically see
Favicon
IT Security Risk Management: A Comprehensive Approach to Safeguarding Digital Assets
Favicon
Streamlining Supply Chains: How Incident Response and Automation Platforms Transform Logistics
Favicon
Third-Party Risk Management Questionnaire Best Practice
Favicon
IT Risk Management Software: Essential Features for Safeguarding Digital Assets
Favicon
Unleashing Agile Potential with Risk Storming Cards
Favicon
Unlocking the Secrets: How to Live Off Forex Trading Successfully
Favicon
Proactive Risk Management in DevSecOps
Favicon
The Growth of Cybersecurity and the significance of Virtual CISO Consulting Services for Modern Businesses
Favicon
Essential Risk Management Techniques for Investors
Favicon
What Are Regulatory Compliance Services in the UAE?
Favicon
Navigating Crisis: Preparation Strategies for Unforeseen Events
Favicon
Navigating Crisis: Preparation Strategies for Unforeseen Events
Favicon
Crafting a Long-term Sustainable Business: Your 2024 Continuity Checklist
Favicon
The Role of AI in Construction Risk Management
Favicon
Quantum Computing in Finance Revolutionizing the Industry
Favicon
Risk Management Strategies for Government Contractors
Favicon
Harnessing Predictive Analytics for Proactive Construction Risk Management
Favicon
Engineering Success: Mastering Risk Management In Product Design
Favicon
Cybersecurity Best Practices for Small Businesses
Favicon
Top GRC Trends for 2024 and Beyond
Favicon
Risk management frameworks
Favicon
Rethinking Project Management Tools: Our Switch from Trello to MS Planner
Favicon
Strategies for Maximizing Engagement and Minimizing Risks with Remote Software Developers
Favicon
SBOM Explained: 📚 An Enterprise Guide to Security Risk Management
Favicon
A.I. Risk
Favicon
Acra. Features: Data leakage detection
Favicon
Treat security as a risk
Favicon
How cryptography 💪works to protect ML models
Favicon
Mitigating Risk When Implementing an Analytics Platform

Featured ones: