Skip to main content

2020 | OriginalPaper | Buchkapitel

BUNET: Blind Medical Image Segmentation Based on Secure UNET

verfasst von : Song Bian, Xiaowei Xu, Weiwen Jiang, Yiyu Shi, Takashi Sato

Erschienen in: Medical Image Computing and Computer Assisted Intervention – MICCAI 2020

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The strict security requirements placed on medical records by various privacy regulations become major obstacles in the age of big data. To ensure efficient machine learning as a service schemes while protecting data confidentiality, in this work, we propose blind UNET (BUNET), a secure protocol that implements privacy-preserving medical image segmentation based on the UNET architecture. In BUNET, we efficiently utilize cryptographic primitives such as homomorphic encryption and garbled circuits (GC) to design a complete secure protocol for the UNET neural architecture. In addition, we perform extensive architectural search in reducing the computational bottleneck of GC-based secure activation protocols with high-dimensional input data. In the experiment, we thoroughly examine the parameter space of our protocol, and show that we can achieve up to 14x inference time reduction compared to the-state-of-the-art secure inference technique on a baseline architecture with negligible accuracy degradation.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
2.
Zurück zum Zitat Bian, S., Jiang, W., Lu, Q., Shi, Y., Sato, T.: NASS: Optimizing secure inference via neural architecture search. arXiv preprint arXiv:2001.11854 (2020) Bian, S., Jiang, W., Lu, Q., Shi, Y., Sato, T.: NASS: Optimizing secure inference via neural architecture search. arXiv preprint arXiv:​2001.​11854 (2020)
3.
Zurück zum Zitat Bian, S., Wang, T., Hiromoto, M., Shi, Y., Sato, T.: ENSEI: Efficient secure inference via frequency-domain homomorphic convolution for privacy-preserving visual recognition (2020) Bian, S., Wang, T., Hiromoto, M., Shi, Y., Sato, T.: ENSEI: Efficient secure inference via frequency-domain homomorphic convolution for privacy-preserving visual recognition (2020)
5.
Zurück zum Zitat Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theory (TOCT) 6(3), 13 (2014)MathSciNetMATH Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theory (TOCT) 6(3), 13 (2014)MathSciNetMATH
6.
Zurück zum Zitat Brutzkus, A., Gilad-Bachrach, R., Elisha, O.: Low latency privacy preserving inference. In: International Conference on Machine Learning, pp. 812–821 (2019) Brutzkus, A., Gilad-Bachrach, R., Elisha, O.: Low latency privacy preserving inference. In: International Conference on Machine Learning, pp. 812–821 (2019)
7.
Zurück zum Zitat Cardona, A., et al.: An integrated micro-and macroarchitectural analysis of the drosophila brain by computer-assisted serial section electron microscopy. PLoS Biol. 8(10), e1000502 (2010) Cardona, A., et al.: An integrated micro-and macroarchitectural analysis of the drosophila brain by computer-assisted serial section electron microscopy. PLoS Biol. 8(10), e1000502 (2010)
10.
Zurück zum Zitat Drolet, B.C., Marwaha, J.S., Hyatt, B., Blazar, P.E., Lifchez, S.D.: Electronic communication of protected health information: privacy, security, and hipaa compliance. J. Hand Surg. 42(6), 411–416 (2017)CrossRef Drolet, B.C., Marwaha, J.S., Hyatt, B., Blazar, P.E., Lifchez, S.D.: Electronic communication of protected health information: privacy, security, and hipaa compliance. J. Hand Surg. 42(6), 411–416 (2017)CrossRef
11.
Zurück zum Zitat Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive 2012, 144 (2012) Fan, J., Vercauteren, F.: Somewhat practical fully homomorphic encryption. IACR Cryptology ePrint Archive 2012, 144 (2012)
14.
Zurück zum Zitat Hoffman, S., Podgurski, A.: Securing the hipaa security rule. J. Internet Law, Spring, 06–26 (2007) Hoffman, S., Podgurski, A.: Securing the hipaa security rule. J. Internet Law, Spring, 06–26 (2007)
15.
Zurück zum Zitat Juvekar, C., et al.: Gazelle: a low latency framework for secure neural network inference. arXiv preprint arXiv:1801.05507 (2018) Juvekar, C., et al.: Gazelle: a low latency framework for secure neural network inference. arXiv preprint arXiv:​1801.​05507 (2018)
17.
Zurück zum Zitat Liu, J., et al.: Oblivious neural network predictions via MinioNN transformations. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, pp. 619–631. ACM (2017) Liu, J., et al.: Oblivious neural network predictions via MinioNN transformations. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, pp. 619–631. ACM (2017)
18.
Zurück zum Zitat Mohassel, P., et al.: Secureml: a system for scalable privacy-preserving machine learning. In: Proceedings of Security and Privacy (SP), pp. 19–38. IEEE (2017) Mohassel, P., et al.: Secureml: a system for scalable privacy-preserving machine learning. In: Proceedings of Security and Privacy (SP), pp. 19–38. IEEE (2017)
20.
21.
Zurück zum Zitat Prados, F., Ashburner, J., Blaiotta, C., Brosch, T., Carballido-Gamio, J., Cardoso, M.J., Conrad, B.N., Datta, E., Dávid, G., De Leener, B., et al.: Spinal cord grey matter segmentation challenge. Neuroimage 152, 312–329 (2017)CrossRef Prados, F., Ashburner, J., Blaiotta, C., Brosch, T., Carballido-Gamio, J., Cardoso, M.J., Conrad, B.N., Datta, E., Dávid, G., De Leener, B., et al.: Spinal cord grey matter segmentation challenge. Neuroimage 152, 312–329 (2017)CrossRef
22.
Zurück zum Zitat Riazi, M.S., Samragh, M., Chen, H., Laine, K., Lauter, K.E., Koushanfar, F.: Xonn: Xnor-based oblivious deep neural network inference. IACR Cryptology ePrint Archive 2019, 171 (2019) Riazi, M.S., Samragh, M., Chen, H., Laine, K., Lauter, K.E., Koushanfar, F.: Xonn: Xnor-based oblivious deep neural network inference. IACR Cryptology ePrint Archive 2019, 171 (2019)
24.
Zurück zum Zitat Rouhani, B.D., et al.: Deepsecure: Scalable provably-secure deep learning. In: Proceedings of DAC, pp. 1–6. IEEE (2018) Rouhani, B.D., et al.: Deepsecure: Scalable provably-secure deep learning. In: Proceedings of DAC, pp. 1–6. IEEE (2018)
26.
Zurück zum Zitat Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, 1982. SFCS 2008, pp. 160–164. IEEE (1982) Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, 1982. SFCS 2008, pp. 160–164. IEEE (1982)
Metadaten
Titel
BUNET: Blind Medical Image Segmentation Based on Secure UNET
verfasst von
Song Bian
Xiaowei Xu
Weiwen Jiang
Yiyu Shi
Takashi Sato
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-59713-9_59

Premium Partner