SlideShare a Scribd company logo
1 of 43
Download to read offline
2 0 J U L Y 2 0 2 1
B U I L D I N G A I W I T H S E C U R I T Y A N D
P R I V A C Y I N M I N D
G E E T A C H A U H A N
PyTorch Partner Engineering, Facebook AI
@ C H A U H A N G
CTO Connection 2021
A G E N D A 0 1


P R I V A C Y C H A L L E N G E S I N A I


0 2


P R I V A C Y P R E S E R V I N G M L


0 3


T O O L S & T E C H N I Q U E S


0 4


S T E P S F O R S T A R T I N G Y O U R J O U R N E Y
CTO Connection 2021
Privacy Challenges in AI
CTO Connection 2021
Centralized AI is like Closed Source of the 90s
CTO Connection 2021
• Privacy Tradeoff between protecting data privacy and training AI/ML models


• Tensions associated with data minimization and retention


• Proliferation of AI/ML models: heighten lack of public understanding


• As artificial intelligence evolves, it magnifies the ability to use information in ways that
can intrude on privacy interests


• Increasingly sensitive nature of data used for research raises other privacy challenges


• Sourcing of data that is free of bias


•
PRIVACY CHALLENGES IN AI
CTO Connection 2021
PRIVACY CHALLENGES
CTO Connection 2021
Privacy Preserving ML Techniques
CTO Connection 2021
PRIVACY PRESERVING ML TECHNIQUES
CTO Connection 2021
Data x Function f(.)
Encrypted Data c
Encrypted Output c'
HOMOMORPHIC ENCRYPTION
CTO Connection 2021
HOMOMORPHIC ENCRYPTION
CTO Connection 2021
D I F F E R E N T I A L P R I V A C Y
Promise, made by a data holder, or a curator, to a data subject:


“ You will not be affected, adversely or otherwise, by allowing
your data to be used in any study or analysis, no matter what
other studies, data sets, or information sources, are available ”


~ Cynthia Dwork
CTO Connection 2021
D I F F E R E N T I A L P R I V A C Y
∀ D and D′ that di
ff
er in one person’s data ∀ x: ℙ[M(D) = x] ≤ exp(ε) ⋅ ℙ[M(D′) = x] +
𝛿
The distribution of the output M(D) on database D is (nearly) the same
as M(D′), where D and D′ di
ff
er in one person’s contributions.
Parameter ε quanti
fi
es
information leakage


Parameter
𝛿
gives some slack


(ε,
𝛿
)
CTO Connection 2021
Data corrupted
with noise
Function f(.)


Data corrupted
with noise
D I F F E R E N T I A L P R I V A C Y
CTO Connection 2021
Jointly compute function f(.)
Random numbers Random numbers
Trusted Third Party
Jointly compute function f(.)
Secret


share


of Data x
Secret


share


of Data x
SECURE MULTI-PARTY COMPUTATION
CTO Connection 2021
B
SECURE MULTI-PARTY COMPUTATION
CTO Connection 2021
Function f(.)


Data x
Train / Evaluate
ON DEVICE COMPUTATION
CTO Connection 2021
Function f(.)


in an enclave


Encrypted Data c
Data x


Output and function
attestation
TRUSTED EXECUTION ENVIRONMENT
CTO Connection 2021
F E D E R A T E D L E A R N I N G
Federated Learning enables devices to
collaboratively train global models with
privacy by default
CTO Connection 2021
Clients
Server
...
⧖
⧖
⧖
⧖
⫐
Private
data
Eligibility
criteria
Need
me?
F E D E R A T E D L E A R N I N G
Checkin
CTO Connection 2021
Clients
Server
...
⧖
⧖
⧖
⧖
⫐
Private
data
Eligibility
criteria
Need
me?
Yes!
Not
now...
Select subset
of devices
Selection
F E D E R A T E D L E A R N I N G
CTO Connection 2021
Clients
Server
...
⧖
⧖
⧖
⧖
⫐
Model weights
and code
Current
model
Current model
distribution
F E D E R A T E D L E A R N I N G
CTO Connection 2021
Clients
Server
...
⟳
⟳
⟳
⧖
⫐
Λ
Updated
model
Model
training
On-device
model training
F E D E R A T E D L E A R N I N G
CTO Connection 2021
Clients
Server
...
⟳
⟳
⟳
⧖
➖
Model
delta
Focused collection,
deltas are ephemeral
Model update
sharing
F E D E R A T E D L E A R N I N G
CTO Connection 2021
Clients
Server
...
⟳
⟳
⟳
⧖
⟳
Weighted delta
aggregation
Σ
Λ
Optimizing current model
using weighted delta
Global model
optimization
F E D E R A T E D L E A R N I N G
CTO Connection 2021
Clients
Server
...
⟳
⟳
⟳
⧖
⟳
Monitor and
snapshot progress
Repeat until
model
converges
Repeat until
model
converges
F E D E R A T E D L E A R N I N G
CTO Connection 2021
P R I V A C Y P R E S E R V I N G M L T E C H N I Q U E S
Homomorphic Encryption
• Encrypted data, encrypted computations


• Zero-knowledge proof intermediate results


• May leak information when output is revealed
Differential Privacy
• Low-probability guarantees on the output


• Prevent linkages attacks
Secure MPC
• Zero-knowledge proof intermediate results


• No information is leaked through the transcript of a computation


• May leak information when other parties output is revealed
On-device computation
• Local data privacy


• Limitations due to computation or memory on device


• Reduced ability to aggregate data from multiple devices
Trusted Execution Environments
• Hardware isolated environment, Limited in memory


• Securing data and models


• Remote attestation
Federated Learning
• Decentralized, training takes longer, heterogenous


• Aggregate data from multiple devices / datasets, without revealing data


• Network transmission costs high for model downloads, gradient updates
CTO Connection 2021
Training
Server
...
⟳
⟳
⟳
Σ
Λ
Inference
...
⌃
⌃
⌃
Intermediate
model state
Encrypted model
update
Ephemeral model
update
Final model state
Intermediate
model state
Can we
improve?
W H A T C A N B E S E E N ?
CTO Connection 2021
E N D T O E N D P R I V A C Y P R E S E R V I N G S Y S T E M
Federated Learning (FL) FL+ Secure Enclaves + DP + Secure Aggregation
Device
• Intermediate Model State


• Still prone to remembering
• Clients get the secure enclave private key


• Client clips the model updates before adding random mask


• Model with DP noise
Server
• Ephemeral Model Updates


• Compromised server, can leak
details
• Logic for computing the sum of the masks and the DP noise
inside Secure enclaves with attestation


• Only-In-Aggregate Model Updates
Network • Encrypted Model Updates • Randomly masked Encrypted Ephemeral Model Updates
Developer • Intermediate Model State • Intermediate Model State with DP
Consumer/World • Final Model State • Final Model State - Model with user level DP
CTO Connection 2021
Tools & Techniques
CTO Connection 2021
AI Broad Guidelines and Considerations
PRIVACY BY DESIGN
Opt-In vs. Opt-Out




Making opt-in the default
approach.
Data Minimization




Collecting only the data
that is needed.
Limited Data Retention


Limiting the amount of time
that data is kept.
Transparency and
Education




Ensure consumers are
aware of processes that
use their data.
Privacy Review Boards


Ensure consumer privacy is
prioritized across the
organization.
Responsible


AI Principles




Committing AI development
to principles that the
company abides by.
CTO Connection 2021
Understand
Align
Mitigate
Monitor
Measure
Stakeholder conversations to find


consensus and outline measurement and
mitigation plans


Analyze model performance,


label bias, outcomes, and other
relevant signals
Address observed


issues in dataset,


models, policies, etc
How might the product’s goals, its policy,
and its implementation affect users from
different subgroups? Identify contextual
definitions of fairness


Monitor effect of mitigations on


subgroups, and ensure fairness
analysis holds as product adapts


PRIVACY BY DESIGN
CTO Connection 2021
TOOLS & LIBRARIES
CTO Connection 2021
CrypTen is a platform for research in machine learning + MPC


•BGW + Beaver triples


•PyTorch-based


•reverse-mode autograd


•GPU support


•import torch  → import crypten as torch 


•Designed to expose MPC in an API familiar to ML researchers that use PyTorch
https://crypten.ai/
CTO Connection 2021
Library that enables training PyTorch models with Di
ff
erential Privacy


•PyTorch-based


•Instantiate Privacy Engine and attach to Optimizer


•Vectorized per-sample gradient computation that is 10x faster than microbatching


•Cryptographically safe pseudo-random number generator


•Extensible API


https://opacus.ai/
CTO Connection 2021
“The mission of the OpenMined community is to create an accessible ecosystem of
privacy tools and education. We do this by extending popular libraries like PyTorch
with advanced techniques in cryptography and di
ff
erential privacy.”




“With OpenMined, people and organizations can host private datasets, allowing data
scientists to train or query on data they "cannot see". The data owners retain
complete control: data is never copied, moved, or shared.”


Remote Execution, Encrypted Computation, Di
ff
erential Privacy


PySyft, PyGrid, Duet, TenSEAL…


https://www.openmined.org/
CTO Connection 2021
OTHER INDUSTRY SOLUTIONS
Private Federated Learning
Azure Confidential
Computing
CTO Connection 2021
Getting Started Resources
CTO Connection 2021
Level1: Just Starting


• Intro course from courses.openmined.org


• Simple sample with Con
fi
dential VMs


Level2: Intermediate


• Experiment with Server side FL, DP, Secure MPC


• Use tools like OpenMined, Crypten, Opacus


Level3: Advanced


• Experiment with Secure Enclaves, combine multiple techniques


• Experiment with On-device training for Decentralized Distributed ML


Level4: Mature


• Advanced techniques for large scale on-device training HSL, VSL


• Sols for Adversarial attacks
WHERE TO START YOUR JOURNEY?
USE CASES
+ COVID-19 Sols


+ Cancer Research


+ Integrity (eg PhotoDNA project)


+ Federated AI across Enterprise Silos


+ What problems will you solve?
PAPERS WITH CODE
•Reproducible
Research - ArXiv
integration


•Datasets


•Federated
Learning task


https://paperswithcode.com/task/federated-learning
REFERENCES
• CrypTen: https://crypten.ai/


• CrypTen Tutorials: https://github.com/facebookresearch/CrypTen#how-crypten-works


• Opacus: https://ai.facebook.com/blog/introducing-opacus-a-high-speed-library-for-training-pytorch-mo
with-differential-privacy/


• Opacus Tutorials: https://opacus.ai/tutorials/


• Papers w/ Code- FL task: https://paperswithcode.com/task/federated-learning


• OpenMined for Covid-19 Apps: https://blog.openmined.org/providing-opensource-privacy-for-covid19/


• Udacity Course: https://www.udacity.com/course/secure-and-private-ai--ud185


• Private AI Series, OpenMined: https://courses.openmined.org/


• Active Federated Learning Paper: https://arxiv.org/pdf/1909.12641.pdf


• Fair Resource allocation in FL: https://arxiv.org/pdf/1905.10497.pdf


• Ditto: Fair & Robust FL through Personalization: https://arxiv.org/pdf/2012.04221.pdf


• Resilient: Failure resilient inference: https://arxiv.org/pdf/2002.07386.pdf


• Owkin: https://owkin.com/
CTO Connection 2021
QUESTIONS?


Contact:


Email: gchauhan@fb.com


Linkedin: https://www.linkedin.com/in/geetachauhan/
CTO Connections 2021
T H A N K Y O U
Big thanks to Brian Knott, Dzmitry Huba, Selena Chan, Ilya Mironov, Laurens Van Der
Maaten, Davide Testuggine, Joe Spisak, Shauna Keller, Christian Keller for inputs

More Related Content

What's hot

Big Brother Vs. Big Data: Privacy-Preserving Threat Analytics at Scale
Big Brother Vs. Big Data: Privacy-Preserving Threat Analytics at ScaleBig Brother Vs. Big Data: Privacy-Preserving Threat Analytics at Scale
Big Brother Vs. Big Data: Privacy-Preserving Threat Analytics at ScaleChester Parrott
 
Streaming Hypothesis Reasoning - William Smith, Jan 2016
Streaming Hypothesis Reasoning - William Smith, Jan 2016Streaming Hypothesis Reasoning - William Smith, Jan 2016
Streaming Hypothesis Reasoning - William Smith, Jan 2016Seattle DAML meetup
 
Streaming HYpothesis REasoning
Streaming HYpothesis REasoningStreaming HYpothesis REasoning
Streaming HYpothesis REasoningWilliam Smith
 
How Graph Technology is Changing AI
How Graph Technology is Changing AIHow Graph Technology is Changing AI
How Graph Technology is Changing AIDatabricks
 
Explain Yourself: Why You Get the Recommendations You Do
Explain Yourself: Why You Get the Recommendations You DoExplain Yourself: Why You Get the Recommendations You Do
Explain Yourself: Why You Get the Recommendations You DoDatabricks
 
Singapore International Cyberweek 2020
Singapore International Cyberweek 2020Singapore International Cyberweek 2020
Singapore International Cyberweek 2020Abhik Roychoudhury
 
Deep learning: challenges and applications
Deep learning: challenges and  applicationsDeep learning: challenges and  applications
Deep learning: challenges and applicationsAboul Ella Hassanien
 
Graph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityGraph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityTigerGraph
 
A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...
A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...
A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...Databricks
 
Genetic algorithm based key generation for fully homomorphic encryption
Genetic algorithm based key generation for fully homomorphic encryptionGenetic algorithm based key generation for fully homomorphic encryption
Genetic algorithm based key generation for fully homomorphic encryptionMajedahAlkharji
 
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 ClassificationUsing Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 ClassificationTigerGraph
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyeSAT Journals
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualeSAT Publishing House
 
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1TigerGraph
 
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityUsing Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityTigerGraph
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
 
Large-Scale Malicious Domain Detection with Spark AI
Large-Scale Malicious Domain Detection with Spark AILarge-Scale Malicious Domain Detection with Spark AI
Large-Scale Malicious Domain Detection with Spark AIDatabricks
 
BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6Rod Soto
 
A Cloud-Based Lab Management and Analytics Software for Triangulated Human-Ce...
A Cloud-Based Lab Management and Analytics Software for Triangulated Human-Ce...A Cloud-Based Lab Management and Analytics Software for Triangulated Human-Ce...
A Cloud-Based Lab Management and Analytics Software for Triangulated Human-Ce...Pierre-Majorique Léger
 

What's hot (19)

Big Brother Vs. Big Data: Privacy-Preserving Threat Analytics at Scale
Big Brother Vs. Big Data: Privacy-Preserving Threat Analytics at ScaleBig Brother Vs. Big Data: Privacy-Preserving Threat Analytics at Scale
Big Brother Vs. Big Data: Privacy-Preserving Threat Analytics at Scale
 
Streaming Hypothesis Reasoning - William Smith, Jan 2016
Streaming Hypothesis Reasoning - William Smith, Jan 2016Streaming Hypothesis Reasoning - William Smith, Jan 2016
Streaming Hypothesis Reasoning - William Smith, Jan 2016
 
Streaming HYpothesis REasoning
Streaming HYpothesis REasoningStreaming HYpothesis REasoning
Streaming HYpothesis REasoning
 
How Graph Technology is Changing AI
How Graph Technology is Changing AIHow Graph Technology is Changing AI
How Graph Technology is Changing AI
 
Explain Yourself: Why You Get the Recommendations You Do
Explain Yourself: Why You Get the Recommendations You DoExplain Yourself: Why You Get the Recommendations You Do
Explain Yourself: Why You Get the Recommendations You Do
 
Singapore International Cyberweek 2020
Singapore International Cyberweek 2020Singapore International Cyberweek 2020
Singapore International Cyberweek 2020
 
Deep learning: challenges and applications
Deep learning: challenges and  applicationsDeep learning: challenges and  applications
Deep learning: challenges and applications
 
Graph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: CybersecurityGraph Gurus Episode 22: Cybersecurity
Graph Gurus Episode 22: Cybersecurity
 
A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...
A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...
A Distributed Deep Learning Approach for the Mitosis Detection from Big Medic...
 
Genetic algorithm based key generation for fully homomorphic encryption
Genetic algorithm based key generation for fully homomorphic encryptionGenetic algorithm based key generation for fully homomorphic encryption
Genetic algorithm based key generation for fully homomorphic encryption
 
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 ClassificationUsing Graph Algorithms for Advanced Analytics - Part 5 Classification
Using Graph Algorithms for Advanced Analytics - Part 5 Classification
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 
Transmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visualTransmission of cryptic text using rotational visual
Transmission of cryptic text using rotational visual
 
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
Graph Gurus Episode 26: Using Graph Algorithms for Advanced Analytics Part 1
 
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 CentralityUsing Graph Algorithms for Advanced Analytics - Part 2 Centrality
Using Graph Algorithms for Advanced Analytics - Part 2 Centrality
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
 
Large-Scale Malicious Domain Detection with Spark AI
Large-Scale Malicious Domain Detection with Spark AILarge-Scale Malicious Domain Detection with Spark AI
Large-Scale Malicious Domain Detection with Spark AI
 
BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6
 
A Cloud-Based Lab Management and Analytics Software for Triangulated Human-Ce...
A Cloud-Based Lab Management and Analytics Software for Triangulated Human-Ce...A Cloud-Based Lab Management and Analytics Software for Triangulated Human-Ce...
A Cloud-Based Lab Management and Analytics Software for Triangulated Human-Ce...
 

Similar to Building AI with Security and Privacy in mind

Secure Your Data with Virtual Data Fabric (ASEAN)
Secure Your Data with Virtual Data Fabric (ASEAN)Secure Your Data with Virtual Data Fabric (ASEAN)
Secure Your Data with Virtual Data Fabric (ASEAN)Denodo
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudInside Analysis
 
Future of Data Strategy
Future of Data StrategyFuture of Data Strategy
Future of Data StrategyDenodo
 
Maciej Marek (Philip Morris International) - The Tools of The Trade
Maciej Marek (Philip Morris International) - The Tools of The TradeMaciej Marek (Philip Morris International) - The Tools of The Trade
Maciej Marek (Philip Morris International) - The Tools of The TradeCodiax
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in CloudMphasis
 
EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019iExec
 
Denodo DataFest 2017: Conquering the Edge with Data Virtualization
Denodo DataFest 2017: Conquering the Edge with Data VirtualizationDenodo DataFest 2017: Conquering the Edge with Data Virtualization
Denodo DataFest 2017: Conquering the Edge with Data VirtualizationDenodo
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...LeMeniz Infotech
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKUlf Mattsson
 
Neo4j GraphTour New York_ State of the State_Amit Chaudhry Neo4j
Neo4j GraphTour New York_ State of the State_Amit Chaudhry Neo4jNeo4j GraphTour New York_ State of the State_Amit Chaudhry Neo4j
Neo4j GraphTour New York_ State of the State_Amit Chaudhry Neo4jNeo4j
 
Quicker Insights and Sustainable Business Agility Powered By Data Virtualizat...
Quicker Insights and Sustainable Business Agility Powered By Data Virtualizat...Quicker Insights and Sustainable Business Agility Powered By Data Virtualizat...
Quicker Insights and Sustainable Business Agility Powered By Data Virtualizat...Denodo
 
DCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHUREDCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHUREDCDNA
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET Journal
 
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)Denodo
 
Greg Brown - Intel Big Data & Cloud Summit 2013
Greg Brown - Intel Big Data & Cloud Summit 2013Greg Brown - Intel Big Data & Cloud Summit 2013
Greg Brown - Intel Big Data & Cloud Summit 2013IntelAPAC
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Denodo
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019Ulf Mattsson
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance InstituteHenrique Centieiro
 

Similar to Building AI with Security and Privacy in mind (20)

Secure Your Data with Virtual Data Fabric (ASEAN)
Secure Your Data with Virtual Data Fabric (ASEAN)Secure Your Data with Virtual Data Fabric (ASEAN)
Secure Your Data with Virtual Data Fabric (ASEAN)
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the CloudBridging the Gap: Analyzing Data in and Below the Cloud
Bridging the Gap: Analyzing Data in and Below the Cloud
 
Future of Data Strategy
Future of Data StrategyFuture of Data Strategy
Future of Data Strategy
 
Maciej Marek (Philip Morris International) - The Tools of The Trade
Maciej Marek (Philip Morris International) - The Tools of The TradeMaciej Marek (Philip Morris International) - The Tools of The Trade
Maciej Marek (Philip Morris International) - The Tools of The Trade
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
 
EthCon Korea 28 May 2019
EthCon Korea 28 May 2019EthCon Korea 28 May 2019
EthCon Korea 28 May 2019
 
Denodo DataFest 2017: Conquering the Edge with Data Virtualization
Denodo DataFest 2017: Conquering the Edge with Data VirtualizationDenodo DataFest 2017: Conquering the Edge with Data Virtualization
Denodo DataFest 2017: Conquering the Edge with Data Virtualization
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...Decentralized access control with anonymous authentication of data stored in ...
Decentralized access control with anonymous authentication of data stored in ...
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Protecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UKProtecting data privacy in analytics and machine learning ISACA London UK
Protecting data privacy in analytics and machine learning ISACA London UK
 
Neo4j GraphTour New York_ State of the State_Amit Chaudhry Neo4j
Neo4j GraphTour New York_ State of the State_Amit Chaudhry Neo4jNeo4j GraphTour New York_ State of the State_Amit Chaudhry Neo4j
Neo4j GraphTour New York_ State of the State_Amit Chaudhry Neo4j
 
Quicker Insights and Sustainable Business Agility Powered By Data Virtualizat...
Quicker Insights and Sustainable Business Agility Powered By Data Virtualizat...Quicker Insights and Sustainable Business Agility Powered By Data Virtualizat...
Quicker Insights and Sustainable Business Agility Powered By Data Virtualizat...
 
DCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHUREDCD INTERNET 2015 BROCHURE
DCD INTERNET 2015 BROCHURE
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
Simplifying Data Governance and Security with a Logical Data Fabric (ASEAN)
 
Greg Brown - Intel Big Data & Cloud Summit 2013
Greg Brown - Intel Big Data & Cloud Summit 2013Greg Brown - Intel Big Data & Cloud Summit 2013
Greg Brown - Intel Big Data & Cloud Summit 2013
 
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
Your Data is Waiting. What are the Top 5 Trends for Data in 2022? (ASEAN)
 
What i learned at gartner summit 2019
What i learned at gartner summit 2019What i learned at gartner summit 2019
What i learned at gartner summit 2019
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 

More from geetachauhan

Profiling PyTorch for Efficiency & Sustainability
Profiling PyTorch for Efficiency & SustainabilityProfiling PyTorch for Efficiency & Sustainability
Profiling PyTorch for Efficiency & Sustainabilitygeetachauhan
 
Building AI with Security Privacy in Mind
Building AI with Security Privacy in MindBuilding AI with Security Privacy in Mind
Building AI with Security Privacy in Mindgeetachauhan
 
Scaling AI in production using PyTorch
Scaling AI in production using PyTorchScaling AI in production using PyTorch
Scaling AI in production using PyTorchgeetachauhan
 
Decentralized AI: Convergence of AI + Blockchain
Decentralized AI: Convergence of AI + Blockchain Decentralized AI: Convergence of AI + Blockchain
Decentralized AI: Convergence of AI + Blockchain geetachauhan
 
Decentralized AI: Convergence of Blockchain + AI
Decentralized AI: Convergence of Blockchain + AIDecentralized AI: Convergence of Blockchain + AI
Decentralized AI: Convergence of Blockchain + AIgeetachauhan
 
Decentralized AI: Convergence of Blockchain + AI
Decentralized AI: Convergence of Blockchain + AIDecentralized AI: Convergence of Blockchain + AI
Decentralized AI: Convergence of Blockchain + AIgeetachauhan
 
Deep learning for medical imaging
Deep learning for medical imagingDeep learning for medical imaging
Deep learning for medical imaginggeetachauhan
 
Deep learning for FinTech
Deep learning for FinTechDeep learning for FinTech
Deep learning for FinTechgeetachauhan
 
NIPS - Deep learning @ Edge using Intel's NCS
NIPS - Deep learning @ Edge using Intel's NCSNIPS - Deep learning @ Edge using Intel's NCS
NIPS - Deep learning @ Edge using Intel's NCSgeetachauhan
 
Best Practices for On-Demand HPC in Enterprises
Best Practices for On-Demand HPC in EnterprisesBest Practices for On-Demand HPC in Enterprises
Best Practices for On-Demand HPC in Enterprisesgeetachauhan
 
Deep learning @ Edge using Intel's Neural Compute Stick
Deep learning @ Edge using Intel's Neural Compute StickDeep learning @ Edge using Intel's Neural Compute Stick
Deep learning @ Edge using Intel's Neural Compute Stickgeetachauhan
 
Distributed deep learning optimizations for Finance
Distributed deep learning optimizations for FinanceDistributed deep learning optimizations for Finance
Distributed deep learning optimizations for Financegeetachauhan
 
Distributed deep learning optimizations - AI WithTheBest
Distributed deep learning optimizations - AI WithTheBestDistributed deep learning optimizations - AI WithTheBest
Distributed deep learning optimizations - AI WithTheBestgeetachauhan
 
Distributed deep learning optimizations
Distributed deep learning optimizationsDistributed deep learning optimizations
Distributed deep learning optimizationsgeetachauhan
 
Tensorflow IoT - 1 Wk coding challenge
Tensorflow IoT - 1 Wk coding challengeTensorflow IoT - 1 Wk coding challenge
Tensorflow IoT - 1 Wk coding challengegeetachauhan
 
Intel optimized tensorflow, distributed deep learning
Intel optimized tensorflow, distributed deep learningIntel optimized tensorflow, distributed deep learning
Intel optimized tensorflow, distributed deep learninggeetachauhan
 
Transfer learning for IoT
Transfer learning for IoTTransfer learning for IoT
Transfer learning for IoTgeetachauhan
 
Tensorflow for IoT
Tensorflow for IoTTensorflow for IoT
Tensorflow for IoTgeetachauhan
 
Build Secure IOT Solutions using Blockchain
Build Secure IOT Solutions using BlockchainBuild Secure IOT Solutions using Blockchain
Build Secure IOT Solutions using Blockchaingeetachauhan
 
Data Analytics in Real World (May 2016)
Data Analytics in Real World (May 2016)Data Analytics in Real World (May 2016)
Data Analytics in Real World (May 2016)geetachauhan
 

More from geetachauhan (20)

Profiling PyTorch for Efficiency & Sustainability
Profiling PyTorch for Efficiency & SustainabilityProfiling PyTorch for Efficiency & Sustainability
Profiling PyTorch for Efficiency & Sustainability
 
Building AI with Security Privacy in Mind
Building AI with Security Privacy in MindBuilding AI with Security Privacy in Mind
Building AI with Security Privacy in Mind
 
Scaling AI in production using PyTorch
Scaling AI in production using PyTorchScaling AI in production using PyTorch
Scaling AI in production using PyTorch
 
Decentralized AI: Convergence of AI + Blockchain
Decentralized AI: Convergence of AI + Blockchain Decentralized AI: Convergence of AI + Blockchain
Decentralized AI: Convergence of AI + Blockchain
 
Decentralized AI: Convergence of Blockchain + AI
Decentralized AI: Convergence of Blockchain + AIDecentralized AI: Convergence of Blockchain + AI
Decentralized AI: Convergence of Blockchain + AI
 
Decentralized AI: Convergence of Blockchain + AI
Decentralized AI: Convergence of Blockchain + AIDecentralized AI: Convergence of Blockchain + AI
Decentralized AI: Convergence of Blockchain + AI
 
Deep learning for medical imaging
Deep learning for medical imagingDeep learning for medical imaging
Deep learning for medical imaging
 
Deep learning for FinTech
Deep learning for FinTechDeep learning for FinTech
Deep learning for FinTech
 
NIPS - Deep learning @ Edge using Intel's NCS
NIPS - Deep learning @ Edge using Intel's NCSNIPS - Deep learning @ Edge using Intel's NCS
NIPS - Deep learning @ Edge using Intel's NCS
 
Best Practices for On-Demand HPC in Enterprises
Best Practices for On-Demand HPC in EnterprisesBest Practices for On-Demand HPC in Enterprises
Best Practices for On-Demand HPC in Enterprises
 
Deep learning @ Edge using Intel's Neural Compute Stick
Deep learning @ Edge using Intel's Neural Compute StickDeep learning @ Edge using Intel's Neural Compute Stick
Deep learning @ Edge using Intel's Neural Compute Stick
 
Distributed deep learning optimizations for Finance
Distributed deep learning optimizations for FinanceDistributed deep learning optimizations for Finance
Distributed deep learning optimizations for Finance
 
Distributed deep learning optimizations - AI WithTheBest
Distributed deep learning optimizations - AI WithTheBestDistributed deep learning optimizations - AI WithTheBest
Distributed deep learning optimizations - AI WithTheBest
 
Distributed deep learning optimizations
Distributed deep learning optimizationsDistributed deep learning optimizations
Distributed deep learning optimizations
 
Tensorflow IoT - 1 Wk coding challenge
Tensorflow IoT - 1 Wk coding challengeTensorflow IoT - 1 Wk coding challenge
Tensorflow IoT - 1 Wk coding challenge
 
Intel optimized tensorflow, distributed deep learning
Intel optimized tensorflow, distributed deep learningIntel optimized tensorflow, distributed deep learning
Intel optimized tensorflow, distributed deep learning
 
Transfer learning for IoT
Transfer learning for IoTTransfer learning for IoT
Transfer learning for IoT
 
Tensorflow for IoT
Tensorflow for IoTTensorflow for IoT
Tensorflow for IoT
 
Build Secure IOT Solutions using Blockchain
Build Secure IOT Solutions using BlockchainBuild Secure IOT Solutions using Blockchain
Build Secure IOT Solutions using Blockchain
 
Data Analytics in Real World (May 2016)
Data Analytics in Real World (May 2016)Data Analytics in Real World (May 2016)
Data Analytics in Real World (May 2016)
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Building AI with Security and Privacy in mind

  • 1. 2 0 J U L Y 2 0 2 1 B U I L D I N G A I W I T H S E C U R I T Y A N D P R I V A C Y I N M I N D G E E T A C H A U H A N PyTorch Partner Engineering, Facebook AI @ C H A U H A N G
  • 2. CTO Connection 2021 A G E N D A 0 1 P R I V A C Y C H A L L E N G E S I N A I 0 2 P R I V A C Y P R E S E R V I N G M L 0 3 T O O L S & T E C H N I Q U E S 0 4 S T E P S F O R S T A R T I N G Y O U R J O U R N E Y
  • 3. CTO Connection 2021 Privacy Challenges in AI
  • 4. CTO Connection 2021 Centralized AI is like Closed Source of the 90s
  • 5. CTO Connection 2021 • Privacy Tradeoff between protecting data privacy and training AI/ML models • Tensions associated with data minimization and retention • Proliferation of AI/ML models: heighten lack of public understanding • As artificial intelligence evolves, it magnifies the ability to use information in ways that can intrude on privacy interests • Increasingly sensitive nature of data used for research raises other privacy challenges • Sourcing of data that is free of bias • PRIVACY CHALLENGES IN AI
  • 7. CTO Connection 2021 Privacy Preserving ML Techniques
  • 8. CTO Connection 2021 PRIVACY PRESERVING ML TECHNIQUES
  • 9. CTO Connection 2021 Data x Function f(.) Encrypted Data c Encrypted Output c' HOMOMORPHIC ENCRYPTION
  • 11. CTO Connection 2021 D I F F E R E N T I A L P R I V A C Y Promise, made by a data holder, or a curator, to a data subject: 
 “ You will not be affected, adversely or otherwise, by allowing your data to be used in any study or analysis, no matter what other studies, data sets, or information sources, are available ” ~ Cynthia Dwork
  • 12. CTO Connection 2021 D I F F E R E N T I A L P R I V A C Y ∀ D and D′ that di ff er in one person’s data ∀ x: ℙ[M(D) = x] ≤ exp(ε) ⋅ ℙ[M(D′) = x] + 𝛿 The distribution of the output M(D) on database D is (nearly) the same as M(D′), where D and D′ di ff er in one person’s contributions. Parameter ε quanti fi es information leakage Parameter 𝛿 gives some slack (ε, 𝛿 )
  • 13. CTO Connection 2021 Data corrupted with noise Function f(.) Data corrupted with noise D I F F E R E N T I A L P R I V A C Y
  • 14. CTO Connection 2021 Jointly compute function f(.) Random numbers Random numbers Trusted Third Party Jointly compute function f(.) Secret share of Data x Secret share of Data x SECURE MULTI-PARTY COMPUTATION
  • 15. CTO Connection 2021 B SECURE MULTI-PARTY COMPUTATION
  • 16. CTO Connection 2021 Function f(.) Data x Train / Evaluate ON DEVICE COMPUTATION
  • 17. CTO Connection 2021 Function f(.) in an enclave Encrypted Data c Data x Output and function attestation TRUSTED EXECUTION ENVIRONMENT
  • 18. CTO Connection 2021 F E D E R A T E D L E A R N I N G Federated Learning enables devices to collaboratively train global models with privacy by default
  • 21. CTO Connection 2021 Clients Server ... ⧖ ⧖ ⧖ ⧖ ⫐ Model weights and code Current model Current model distribution F E D E R A T E D L E A R N I N G
  • 23. CTO Connection 2021 Clients Server ... ⟳ ⟳ ⟳ ⧖ ➖ Model delta Focused collection, deltas are ephemeral Model update sharing F E D E R A T E D L E A R N I N G
  • 24. CTO Connection 2021 Clients Server ... ⟳ ⟳ ⟳ ⧖ ⟳ Weighted delta aggregation Σ Λ Optimizing current model using weighted delta Global model optimization F E D E R A T E D L E A R N I N G
  • 25. CTO Connection 2021 Clients Server ... ⟳ ⟳ ⟳ ⧖ ⟳ Monitor and snapshot progress Repeat until model converges Repeat until model converges F E D E R A T E D L E A R N I N G
  • 26. CTO Connection 2021 P R I V A C Y P R E S E R V I N G M L T E C H N I Q U E S Homomorphic Encryption • Encrypted data, encrypted computations • Zero-knowledge proof intermediate results • May leak information when output is revealed Differential Privacy • Low-probability guarantees on the output • Prevent linkages attacks Secure MPC • Zero-knowledge proof intermediate results • No information is leaked through the transcript of a computation • May leak information when other parties output is revealed On-device computation • Local data privacy • Limitations due to computation or memory on device • Reduced ability to aggregate data from multiple devices Trusted Execution Environments • Hardware isolated environment, Limited in memory • Securing data and models • Remote attestation Federated Learning • Decentralized, training takes longer, heterogenous • Aggregate data from multiple devices / datasets, without revealing data • Network transmission costs high for model downloads, gradient updates
  • 27. CTO Connection 2021 Training Server ... ⟳ ⟳ ⟳ Σ Λ Inference ... ⌃ ⌃ ⌃ Intermediate model state Encrypted model update Ephemeral model update Final model state Intermediate model state Can we improve? W H A T C A N B E S E E N ?
  • 28. CTO Connection 2021 E N D T O E N D P R I V A C Y P R E S E R V I N G S Y S T E M Federated Learning (FL) FL+ Secure Enclaves + DP + Secure Aggregation Device • Intermediate Model State • Still prone to remembering • Clients get the secure enclave private key • Client clips the model updates before adding random mask • Model with DP noise Server • Ephemeral Model Updates • Compromised server, can leak details • Logic for computing the sum of the masks and the DP noise inside Secure enclaves with attestation • Only-In-Aggregate Model Updates Network • Encrypted Model Updates • Randomly masked Encrypted Ephemeral Model Updates Developer • Intermediate Model State • Intermediate Model State with DP Consumer/World • Final Model State • Final Model State - Model with user level DP
  • 30. CTO Connection 2021 AI Broad Guidelines and Considerations PRIVACY BY DESIGN Opt-In vs. Opt-Out 
 Making opt-in the default approach. Data Minimization 
 Collecting only the data that is needed. Limited Data Retention Limiting the amount of time that data is kept. Transparency and Education 
 Ensure consumers are aware of processes that use their data. Privacy Review Boards Ensure consumer privacy is prioritized across the organization. Responsible 
 AI Principles 
 
 Committing AI development to principles that the company abides by.
  • 31. CTO Connection 2021 Understand Align Mitigate Monitor Measure Stakeholder conversations to find 
 consensus and outline measurement and mitigation plans Analyze model performance, 
 label bias, outcomes, and other relevant signals Address observed 
 issues in dataset, 
 models, policies, etc How might the product’s goals, its policy, and its implementation affect users from different subgroups? Identify contextual definitions of fairness Monitor effect of mitigations on 
 subgroups, and ensure fairness analysis holds as product adapts PRIVACY BY DESIGN
  • 33. CTO Connection 2021 CrypTen is a platform for research in machine learning + MPC •BGW + Beaver triples 
 •PyTorch-based 
 •reverse-mode autograd 
 •GPU support 
 •import torch  → import crypten as torch  
 •Designed to expose MPC in an API familiar to ML researchers that use PyTorch https://crypten.ai/
  • 34. CTO Connection 2021 Library that enables training PyTorch models with Di ff erential Privacy •PyTorch-based 
 •Instantiate Privacy Engine and attach to Optimizer 
 •Vectorized per-sample gradient computation that is 10x faster than microbatching 
 •Cryptographically safe pseudo-random number generator •Extensible API https://opacus.ai/
  • 35. CTO Connection 2021 “The mission of the OpenMined community is to create an accessible ecosystem of privacy tools and education. We do this by extending popular libraries like PyTorch with advanced techniques in cryptography and di ff erential privacy.” 
 
 “With OpenMined, people and organizations can host private datasets, allowing data scientists to train or query on data they "cannot see". The data owners retain complete control: data is never copied, moved, or shared.” Remote Execution, Encrypted Computation, Di ff erential Privacy PySyft, PyGrid, Duet, TenSEAL… https://www.openmined.org/
  • 36. CTO Connection 2021 OTHER INDUSTRY SOLUTIONS Private Federated Learning Azure Confidential Computing
  • 37. CTO Connection 2021 Getting Started Resources
  • 38. CTO Connection 2021 Level1: Just Starting • Intro course from courses.openmined.org • Simple sample with Con fi dential VMs Level2: Intermediate • Experiment with Server side FL, DP, Secure MPC • Use tools like OpenMined, Crypten, Opacus Level3: Advanced • Experiment with Secure Enclaves, combine multiple techniques • Experiment with On-device training for Decentralized Distributed ML Level4: Mature • Advanced techniques for large scale on-device training HSL, VSL • Sols for Adversarial attacks WHERE TO START YOUR JOURNEY?
  • 39. USE CASES + COVID-19 Sols + Cancer Research + Integrity (eg PhotoDNA project) + Federated AI across Enterprise Silos 
 + What problems will you solve?
  • 40. PAPERS WITH CODE •Reproducible Research - ArXiv integration •Datasets 
 •Federated Learning task https://paperswithcode.com/task/federated-learning
  • 41. REFERENCES • CrypTen: https://crypten.ai/ • CrypTen Tutorials: https://github.com/facebookresearch/CrypTen#how-crypten-works • Opacus: https://ai.facebook.com/blog/introducing-opacus-a-high-speed-library-for-training-pytorch-mo with-differential-privacy/ • Opacus Tutorials: https://opacus.ai/tutorials/ • Papers w/ Code- FL task: https://paperswithcode.com/task/federated-learning • OpenMined for Covid-19 Apps: https://blog.openmined.org/providing-opensource-privacy-for-covid19/ • Udacity Course: https://www.udacity.com/course/secure-and-private-ai--ud185 • Private AI Series, OpenMined: https://courses.openmined.org/ • Active Federated Learning Paper: https://arxiv.org/pdf/1909.12641.pdf • Fair Resource allocation in FL: https://arxiv.org/pdf/1905.10497.pdf • Ditto: Fair & Robust FL through Personalization: https://arxiv.org/pdf/2012.04221.pdf • Resilient: Failure resilient inference: https://arxiv.org/pdf/2002.07386.pdf • Owkin: https://owkin.com/
  • 42. CTO Connection 2021 QUESTIONS? Contact: Email: gchauhan@fb.com Linkedin: https://www.linkedin.com/in/geetachauhan/
  • 43. CTO Connections 2021 T H A N K Y O U Big thanks to Brian Knott, Dzmitry Huba, Selena Chan, Ilya Mironov, Laurens Van Der Maaten, Davide Testuggine, Joe Spisak, Shauna Keller, Christian Keller for inputs