SecureLLM: Using Compositionality to Build Provably Secure Language Models for Private, Sensitive, and Secret Data

Abdulrahman Alabdulkareem,Christian M Arnold,Yerim Lee,Pieter M Feenstra,Boris Katz,Andrei Barbu
2024-06-14
Abstract:Traditional security mechanisms isolate resources from users who should not access them. We reflect the compositional nature of such security mechanisms back into the structure of LLMs to build a provably secure LLM; that we term SecureLLM. Other approaches to LLM safety attempt to protect against bad actors or bad outcomes, but can only do so to an extent making them inappropriate for sensitive data. SecureLLM blends access security with fine-tuning methods. Each data silo has associated with it a separate fine-tuning and a user has access only to the collection of fine-tunings that they have permission for. The model must then perform on compositional tasks at the intersection of those data silos with the combination of those individual fine-tunings. While applicable to any task like document QA or making API calls, in this work we concern ourselves with models that learn the layouts of new SQL databases to provide natural-language-to-SQL translation capabilities. Existing fine-tuning composition methods fail in this challenging environment, as they are not well-equipped for handling compositional tasks. Compositionality remains a challenge for LLMs. We contribute both a difficult new compositional natural-language-to-SQL translation task and a new perspective on LLM security that allows models to be deployed to secure environments today.
Computation and Language,Cryptography and Security
What problem does this paper attempt to address?
### Problems the Paper Attempts to Solve The paper "SecureLLM: Constructing Provably Secure Language Models Using Compositionality to Handle Private, Sensitive, and Confidential Data" attempts to address the security issues of language models when dealing with sensitive information. Specifically, traditional security mechanisms prevent unauthorized user access by isolating resources, but these methods have limitations when handling sensitive data and cannot provide sufficient security guarantees. **Main Issues Include:** 1. **Information Leakage**: Existing language models may be induced to reveal information that should not be disclosed, answer questions that should not be answered, expose training data and prompts, and execute API calls that should not be executed. 2. **Lack of Provable Security**: Current methods can only provide a certain degree of security protection but cannot offer provable security guarantees, which is insufficient for handling sensitive data. 3. **Challenges of Compositional Tasks**: Existing fine-tuning methods perform poorly when dealing with compositional tasks, especially those requiring reasoning across multiple data silos. **Solutions:** - **SecureLLM**: By reflecting the compositional nature of access control into the structure of the language model, a provably secure language model is constructed. Each data silo has an independent fine-tuned model, and users can only access the combination of fine-tuned models for the data silos they have permission to access. - **Compositional Fine-Tuning Methods**: Introducing new compositional fine-tuning methods that perform well in handling compositional tasks across data silos, effectively addressing complex tasks such as natural language to SQL translation. Through these methods, SecureLLM can handle sensitive data without leaking unauthorized information, providing provable security guarantees.