Skip to main content

2019 | OriginalPaper | Buchkapitel

Privacy-Preserving All Convolutional Net Based on Homomorphic Encryption

verfasst von : Wenchao Liu, Feng Pan, Xu An Wang, Yunfei Cao, Dianhua Tang

Erschienen in: Advances in Network-Based Information Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Machine learning servers with mass storage and computing power is an ideal platform to store, manage, and analyze data and support decision-making. However, the main issue is providing security and privacy to the data, as the data is stored in a public way. Recently, homomorphic data encryption has been proposed as a solution due to its capabilities in performing computations over encrypted data. In this paper, we proposed an encrypted all convolutional net that transformed traditional all convolutional net into a net based on homomorphic encryption. This scheme allows different data holders to send their encrypted data to cloud service, complete predictions, and return them in encrypted form as the cloud service provider does not have a secret key. Therefore, the cloud service provider and others cannot get unencrypted raw data. When applied to the MNIST database, privacy-preserving all convolutional based on homomorphic encryption predict efficiently, accurately and with privacy protection.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504–507 (2006)MathSciNetCrossRef Hinton, G.E., Salakhutdinov, R.R.: Reducing the dimensionality of data with neural networks. Science 313(5786), 504–507 (2006)MathSciNetCrossRef
2.
Zurück zum Zitat Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems, pp. 1097–1105. Curran Associates Inc. (2012) Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: International Conference on Neural Information Processing Systems, pp. 1097–1105. Curran Associates Inc. (2012)
3.
Zurück zum Zitat Girshick, R., Donahue, J., Darrell, T., et al.: Rich feature hierarchies for accurate object detection and semantic segmentation. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 580–587. IEEE Computer Society (2014) Girshick, R., Donahue, J., Darrell, T., et al.: Rich feature hierarchies for accurate object detection and semantic segmentation. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 580–587. IEEE Computer Society (2014)
4.
Zurück zum Zitat He, K., Zhang, X., Ren, S., et al.: Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans. Pattern Anal. Mach. Intell. 37(9), 1904–1916 (2014)CrossRef He, K., Zhang, X., Ren, S., et al.: Spatial pyramid pooling in deep convolutional networks for visual recognition. IEEE Trans. Pattern Anal. Mach. Intell. 37(9), 1904–1916 (2014)CrossRef
5.
Zurück zum Zitat Szegedy, C., Liu, W., Jia, Y., et al.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–9 (2015) Szegedy, C., Liu, W., Jia, Y., et al.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 1–9 (2015)
6.
Zurück zum Zitat Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: Computer Science (2014) Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale image recognition. In: Computer Science (2014)
7.
Zurück zum Zitat Springenberg, J.T., Dosovitskiy, A., Brox, T., et al.: Striving for simplicity: the all convolutional net. Eprint Arxiv (2014) Springenberg, J.T., Dosovitskiy, A., Brox, T., et al.: Striving for simplicity: the all convolutional net. Eprint Arxiv (2014)
8.
Zurück zum Zitat Barni, M., Orlandi, C., Piva, A.: A privacy-preserving protocol for neural-network-based computation. In: The Workshop on Multimedia and Security, pp. 146–151. DBLP (2006) Barni, M., Orlandi, C., Piva, A.: A privacy-preserving protocol for neural-network-based computation. In: The Workshop on Multimedia and Security, pp. 146–151. DBLP (2006)
9.
Zurück zum Zitat Orlandi, C., Piva, A., Barni, M.: Oblivious neural network computing via homomorphic encryption. EURASIP J. Inf. Secur. 2007(1), 1–11 (2007) Orlandi, C., Piva, A., Barni, M.: Oblivious neural network computing via homomorphic encryption. EURASIP J. Inf. Secur. 2007(1), 1–11 (2007)
10.
Zurück zum Zitat Xie, P., Bilenko, M., Finley, T., et al.: Crypto-nets: neural networks over encrypted data. In: Computer Science (2014) Xie, P., Bilenko, M., Finley, T., et al.: Crypto-nets: neural networks over encrypted data. In: Computer Science (2014)
11.
Zurück zum Zitat Dowlin, N., Ran, G.B., Laine, K., et al.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: Radio and Wireless Symposium, pp. 76–78. IEEE (2016) Dowlin, N., Ran, G.B., Laine, K., et al.: CryptoNets: applying neural networks to encrypted data with high throughput and accuracy. In: Radio and Wireless Symposium, pp. 76–78. IEEE (2016)
12.
Zurück zum Zitat Chabanne, H., de Wargny, A., Milgram, J., et al.: Privacy-preserving classification on deep neural network. In: IACR Cryptology ePrint Archive, 2017, p. 35 (2017) Chabanne, H., de Wargny, A., Milgram, J., et al.: Privacy-preserving classification on deep neural network. In: IACR Cryptology ePrint Archive, 2017, p. 35 (2017)
13.
Zurück zum Zitat Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097–1105 (2012) Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems, pp. 1097–1105 (2012)
14.
Zurück zum Zitat Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, vol. 9, no. 4, pp. 169–178 (2009) Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC 2009, vol. 9, no. 4, pp. 169–178 (2009)
15.
Zurück zum Zitat Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the Advances in Cryptology—EUROCRYPT 1999, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999. DBLP, pp. 223–238 (1999) Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of the Advances in Cryptology—EUROCRYPT 1999, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, 2–6 May 1999. DBLP, pp. 223–238 (1999)
16.
Zurück zum Zitat Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1984)MathSciNetCrossRef Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1984)MathSciNetCrossRef
17.
Zurück zum Zitat Gu, C.: New Fully Homomorphic Encryption without Bootstrapping (2011) Gu, C.: New Fully Homomorphic Encryption without Bootstrapping (2011)
19.
Zurück zum Zitat Ioffe, S., Szegedy, C.: Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift, pp. 448–456 (2015) Ioffe, S., Szegedy, C.: Batch Normalization: Accelerating Deep Network Training by Reducing Internal Covariate Shift, pp. 448–456 (2015)
Metadaten
Titel
Privacy-Preserving All Convolutional Net Based on Homomorphic Encryption
verfasst von
Wenchao Liu
Feng Pan
Xu An Wang
Yunfei Cao
Dianhua Tang
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-98530-5_66