Skip to main content
Top

2021 | OriginalPaper | Chapter

A Survey on Privacy-Preserving Machine Learning with Fully Homomorphic Encryption

Authors : Luis Bernardo Pulido-Gaytan, Andrei Tchernykh, Jorge M. Cortés-Mendoza, Mikhail Babenko, Gleb Radchenko

Published in: High Performance Computing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The secure and efficient processing of private information in the cloud computing paradigm is still an open issue. New security threats arise with the increasing volume of data into cloud storage, where cloud providers require high levels of trust, and data breaches are significant problems. Encrypting the data with conventional schemes is considered the best option to avoid security problems. However, a decryption process is necessary when the data must be processed, but it falls into the initial problem of data vulnerability. The user cannot operate on the data directly and must download it to perform the computations locally. In this context, Fully Homomorphic Encryption (FHE) is considered the holy grail of cryptography in order to solve cybersecurity problems, it allows a non-trustworthy third-party resource to blindly process encrypted information without disclosing confidential data. FHE is a valuable capability in a world of distributed computation and heterogeneous networking. In this survey, we present a comprehensive review of theoretical concepts, state-of-the-art, limitations, potential applications, and development tools in the domain of FHE. Moreover, we show the intersection of FHE and machine learning from a theoretical and a practical point of view and identify potential research directions to enrich Machine Learning as a Service, a new paradigm of cloud computing. Specifically, this paper aims to be a guide to researchers and practitioners interested in learning, applying, and extending knowledge in FHE over machine learning.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Player, R.: Parameter selection in lattice-based cryptography. Royal Holloway, University of London, Ph.D. Thesis (2017) Player, R.: Parameter selection in lattice-based cryptography. Royal Holloway, University of London, Ph.D. Thesis (2017)
3.
go back to reference Rivest, R.L., Dertouzos, M.L., Adleman, L.: On data banks and privacy homomorphisms. Found. Secur. Comput. 4, 160–179 (1978) Rivest, R.L., Dertouzos, M.L., Adleman, L.: On data banks and privacy homomorphisms. Found. Secur. Comput. 4, 160–179 (1978)
6.
go back to reference Minelli, M.: Fully homomorphic encryption for machine learning. PSL Research University, Ph.D. Thesis (2018) Minelli, M.: Fully homomorphic encryption for machine learning. PSL Research University, Ph.D. Thesis (2018)
7.
go back to reference Gentry, C.: A fully homomorphic encryption scheme. Stanford University, Ph.D. Thesis (2009) Gentry, C.: A fully homomorphic encryption scheme. Stanford University, Ph.D. Thesis (2009)
10.
go back to reference Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: IEEE 52nd Annual Symposium on Foundations of Computer Science, pp. 97–106 (2011) Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. In: IEEE 52nd Annual Symposium on Foundations of Computer Science, pp. 97–106 (2011)
11.
go back to reference Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference - ITCS 2012, pp. 309–325 (2012) Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference - ITCS 2012, pp. 309–325 (2012)
14.
go back to reference Rohloff, K., Cousins, D.B.: A Scalable implementation of fully homomorphic encryption built on NTRU. In: Böhme R., Brenner M., Moore T., Smith M. (eds.) Financial Cryptography and Data Security, FC 2014, pp. 221–234 (2014) Rohloff, K., Cousins, D.B.: A Scalable implementation of fully homomorphic encryption built on NTRU. In: Böhme R., Brenner M., Moore T., Smith M. (eds.) Financial Cryptography and Data Security, FC 2014, pp. 221–234 (2014)
17.
go back to reference Aslett, L.J.M., Esperança, P.M., Holmes, C.C.: A review of homomorphic encryption and software tools for encrypted statistical machine learning (2015) Aslett, L.J.M., Esperança, P.M., Holmes, C.C.: A review of homomorphic encryption and software tools for encrypted statistical machine learning (2015)
18.
go back to reference Armknecht, F., et al.: A guide to fully homomorphic encryption. IACR Cryptology ePrint Archive (2015) Armknecht, F., et al.: A guide to fully homomorphic encryption. IACR Cryptology ePrint Archive (2015)
19.
go back to reference Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW 2011, pp. 113–124 (2011) Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: 3rd ACM Workshop on Cloud Computing Security Workshop - CCSW 2011, pp. 113–124 (2011)
20.
go back to reference Archer, D., et al.: Applications of homomorphic encryption (2017) Archer, D., et al.: Applications of homomorphic encryption (2017)
23.
go back to reference Parmar, P.V., et al.: Survey of various homomorphic encryption algorithms and schemes. Int. J. Comput. Appl. 91(8), 26–32 (2014) Parmar, P.V., et al.: Survey of various homomorphic encryption algorithms and schemes. Int. J. Comput. Appl. 91(8), 26–32 (2014)
24.
go back to reference Vaikuntanathan, V.: Computing blindfolded: new developments in fully homomorphic encryption. In: IEEE 52nd Annual Symposium on Foundations of Computer Science, Palm Springs, pp. 5–16 (2011) Vaikuntanathan, V.: Computing blindfolded: new developments in fully homomorphic encryption. In: IEEE 52nd Annual Symposium on Foundations of Computer Science, Palm Springs, pp. 5–16 (2011)
25.
go back to reference Sobitha Ahila, S., Shunmuganathan, K.L.: State of art in homomorphic encryption schemes. Int. J. Eng. Res. Appl. 4, 37–43 (2014) Sobitha Ahila, S., Shunmuganathan, K.L.: State of art in homomorphic encryption schemes. Int. J. Eng. Res. Appl. 4, 37–43 (2014)
26.
go back to reference Gentry, C.: Computing on the edge of chaos: structure and randomness in encrypted computation. In: Proceedings of the International Congress of Mathematicians (2014) Gentry, C.: Computing on the edge of chaos: structure and randomness in encrypted computation. In: Proceedings of the International Congress of Mathematicians (2014)
28.
go back to reference Hrestak, D., Picek, S.: Homomorphic encryption in the cloud. In: 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2014), pp. 1400–1404 (2014) Hrestak, D., Picek, S.: Homomorphic encryption in the cloud. In: 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2014), pp. 1400–1404 (2014)
29.
go back to reference Moore, C., O’Neill, M., Hanley, N., O’Sullivan, E.: Accelerating integer-based fully homomorphic encryption using Comba multiplication. In: IEEE Workshop on Signal Processing Systems, SiPS, pp. 1–6. IEEE (2014) Moore, C., O’Neill, M., Hanley, N., O’Sullivan, E.: Accelerating integer-based fully homomorphic encryption using Comba multiplication. In: IEEE Workshop on Signal Processing Systems, SiPS, pp. 1–6. IEEE (2014)
30.
go back to reference Hunt, T., Song, C., Shokri, R., Shmatikov, V., Witchel, E.: Chiron: privacy-preserving machine learning as a service (2018) Hunt, T., Song, C., Shokri, R., Shmatikov, V., Witchel, E.: Chiron: privacy-preserving machine learning as a service (2018)
31.
go back to reference Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. In: Network and Distributed System Security Symposium (2015) Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. In: Network and Distributed System Security Symposium (2015)
33.
go back to reference Dowlin, N., Gilad-Bachrach, R., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: 33rd International Conference on Machine Learning, pp. 201–210 (2016) Dowlin, N., Gilad-Bachrach, R., Laine, K., Lauter, K., Naehrig, M., Wernsing, J.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: 33rd International Conference on Machine Learning, pp. 201–210 (2016)
34.
go back to reference Chabanne, H., De Wargny, A., Milgram, J., Morel, C., Prouff, E.: Privacy-preserving classification on deep neural network (2017) Chabanne, H., De Wargny, A., Milgram, J., Morel, C., Prouff, E.: Privacy-preserving classification on deep neural network (2017)
35.
go back to reference Badawi, A.Al., et al.: The AlexNet moment for homomorphic encryption: HCNN, the first homomorphic CNN on encrypted data with GPUs (2018) Badawi, A.Al., et al.: The AlexNet moment for homomorphic encryption: HCNN, the first homomorphic CNN on encrypted data with GPUs (2018)
37.
go back to reference Takabi, H., Hesamifard, E., Ghasemi, M.: Privacy preserving multi-party machine learning with homomorphic encryption. In: 29th Annual Conference on Neural Information Processing Systems (2016) Takabi, H., Hesamifard, E., Ghasemi, M.: Privacy preserving multi-party machine learning with homomorphic encryption. In: 29th Annual Conference on Neural Information Processing Systems (2016)
43.
go back to reference Aono, Y., Hayashi, T., Phong, L.T., Wang, L.: Scalable and secure logistic regression via homomorphic encryption. In: 6th ACM Conference on Data and Application Security and Privacy - CODASPY 2016, pp. 142–144 (2016) Aono, Y., Hayashi, T., Phong, L.T., Wang, L.: Scalable and secure logistic regression via homomorphic encryption. In: 6th ACM Conference on Data and Application Security and Privacy - CODASPY 2016, pp. 142–144 (2016)
47.
go back to reference Chen, H., Laine, K., Player, R.: Simple Encrypted arithmetic library (2019) Chen, H., Laine, K., Player, R.: Simple Encrypted arithmetic library (2019)
48.
go back to reference Halevi, S., Shoup, V.: Design and implementation of a homomorphic-encryption library (2013) Halevi, S., Shoup, V.: Design and implementation of a homomorphic-encryption library (2013)
52.
go back to reference Boemer, F., Lao, Y., Cammarota, R., Wierzynski, C.: NGraph-HE: a graph compiler for deep learning on homomorphically encrypted data. In: Proceedings of the 16th ACM International Conference on Computing Frontiers, pp. 3–13 (2019) Boemer, F., Lao, Y., Cammarota, R., Wierzynski, C.: NGraph-HE: a graph compiler for deep learning on homomorphically encrypted data. In: Proceedings of the 16th ACM International Conference on Computing Frontiers, pp. 3–13 (2019)
Metadata
Title
A Survey on Privacy-Preserving Machine Learning with Fully Homomorphic Encryption
Authors
Luis Bernardo Pulido-Gaytan
Andrei Tchernykh
Jorge M. Cortés-Mendoza
Mikhail Babenko
Gleb Radchenko
Copyright Year
2021
DOI
https://doi.org/10.1007/978-3-030-68035-0_9

Premium Partner