Visible to the public TEE-based decentralized recommender systems: The raw data sharing redemption

TitleTEE-based decentralized recommender systems: The raw data sharing redemption
Publication TypeConference Paper
Year of Publication2022
AuthorsDhasade, Akash, Dresevic, Nevena, Kermarrec, Anne-Marie, Pires, Rafael
Conference Name2022 IEEE International Parallel and Distributed Processing Symposium (IPDPS)
Date Publishedmay
KeywordsCollaborative Work, data privacy, Human Behavior, human factors, Neural networks, privacy, privacy breach, pubcrawl, recommender systems, resilience, Resiliency, Scalability, security, SGX, Software, telecommunication traffic, Training
AbstractRecommenders are central in many applications today. The most effective recommendation schemes, such as those based on collaborative filtering (CF), exploit similarities between user profiles to make recommendations, but potentially expose private data. Federated learning and decentralized learning systems address this by letting the data stay on user's machines to preserve privacy: each user performs the training on local data and only the model parameters are shared. However, sharing the model parameters across the network may still yield privacy breaches. In this paper, we present Rex, the first enclave-based decentralized CF recommender. Rex exploits Trusted execution environments (TEE), such as Intel software guard extensions (SGX), that provide shielded environments within the processor to improve convergence while preserving privacy. Firstly, Rex enables raw data sharing, which ultimately speeds up convergence and reduces the network load. Secondly, Rex fully preserves privacy. We analyze the impact of raw data sharing in both deep neural network (DNN) and matrix factorization (MF) recommenders and showcase the benefits of trusted environments in a full-fledged implementation of Rex. Our experimental results demonstrate that through raw data sharing, Rex significantly decreases the training time by 18.3 x and the network load by 2 orders of magnitude over standard decentralized approaches that share only parameters, while fully protecting privacy by leveraging trustworthy hardware enclaves with very little overhead.
NotesISSN: 1530-2075
Citation Keydhasade_tee-based_2022