Skip to main content
Erschienen in: Neural Computing and Applications 1/2011

01.02.2011 | Original Article

Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data

verfasst von: Ankur Bansal, Tingting Chen, Sheng Zhong

Erschienen in: Neural Computing and Applications | Ausgabe 1/2011

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Neural networks have been an active research area for decades. However, privacy bothers many when the training dataset for the neural networks is distributed between two parties, which is quite common nowadays. Existing cryptographic approaches such as secure scalar product protocol provide a secure way for neural network learning when the training dataset is vertically partitioned. In this paper, we present a privacy preserving algorithm for the neural network learning when the dataset is arbitrarily partitioned between the two parties. We show that our algorithm is very secure and leaks no knowledge (except the final weights learned by both parties) about other party’s data. We demonstrate the efficiency of our algorithm by experiments on real world data.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Fußnoten
1
Object corresponds to a row in database in this paper
 
Literatur
1.
Zurück zum Zitat Agrawal D, Srikant R (2000) Privacy preserving data mining. In Proceedings of the ACM SIGMOD, pp 439–450 Agrawal D, Srikant R (2000) Privacy preserving data mining. In Proceedings of the ACM SIGMOD, pp 439–450
3.
Zurück zum Zitat Barni M, Orlandi C, Piva A (2006) A privacy-preserving protocol for neural-network-based computation. In: Proceeding of the 8th workshop on multimedia and security, pp 146–151 Barni M, Orlandi C, Piva A (2006) A privacy-preserving protocol for neural-network-based computation. In: Proceeding of the 8th workshop on multimedia and security, pp 146–151
5.
Zurück zum Zitat Chen T, Zhong S (2009) Privacy preserving back-propagation neural network learning. IEEE Trans Neural Netw 20(10):1554–1564CrossRef Chen T, Zhong S (2009) Privacy preserving back-propagation neural network learning. IEEE Trans Neural Netw 20(10):1554–1564CrossRef
6.
Zurück zum Zitat ElGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472MATHCrossRefMathSciNet ElGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472MATHCrossRefMathSciNet
7.
Zurück zum Zitat Cranor LF (ed) (1999) Special issue. Internet Priv Commun ACM 42(2) Cranor LF (ed) (1999) Special issue. Internet Priv Commun ACM 42(2)
9.
Zurück zum Zitat Goldreich O, Micali S, Wigderson A (1987) How to play ANY mental game. In: Proceedings of annual ACM conference on theory of computing, pp 218–229 Goldreich O, Micali S, Wigderson A (1987) How to play ANY mental game. In: Proceedings of annual ACM conference on theory of computing, pp 218–229
11.
Zurück zum Zitat Jagannathan G, Wright RN (2005) Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the ACM SIGKDD, pp 593–599 Jagannathan G, Wright RN (2005) Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the ACM SIGKDD, pp 593–599
12.
Zurück zum Zitat Kantarcioglu M, Clifton C (2004) Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans Knowl Data Eng 16(9):1026–1037 Kantarcioglu M, Clifton C (2004) Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans Knowl Data Eng 16(9):1026–1037
13.
Zurück zum Zitat Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: Proceedings of the 20th annual international cryptology conference on advances in cryptology, pp 36–54 Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: Proceedings of the 20th annual international cryptology conference on advances in cryptology, pp 36–54
14.
Zurück zum Zitat Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitioned data. In: The eighth ACM SIGKDD international conference on knowledge discovery and data mining, pp 639–644 Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitioned data. In: The eighth ACM SIGKDD international conference on knowledge discovery and data mining, pp 639–644
15.
Zurück zum Zitat Wan L, Ng WK, Han S, Lee VCS (2007) Privacy-preservation for gradient descent methods. In: Proceedings of ACM SIGKDD, pp 775–783 Wan L, Ng WK, Han S, Lee VCS (2007) Privacy-preservation for gradient descent methods. In: Proceedings of ACM SIGKDD, pp 775–783
16.
Zurück zum Zitat Wright R, Yang Z (2004) Privacy preserving Bayesian network structure computation on distributed heterogeneous data. In: Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining, pp 713–718 Wright R, Yang Z (2004) Privacy preserving Bayesian network structure computation on distributed heterogeneous data. In: Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining, pp 713–718
17.
Zurück zum Zitat Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science, pp 160–164 Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science, pp 160–164
18.
Zurück zum Zitat Yang Z, Zhong S, Wright R (2005) Privacy-preserving classification of customer data without loss of accuracy. In: Proceedings of the 5th SIAM international conference on data mining (SDM) Yang Z, Zhong S, Wright R (2005) Privacy-preserving classification of customer data without loss of accuracy. In: Proceedings of the 5th SIAM international conference on data mining (SDM)
Metadaten
Titel
Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data
verfasst von
Ankur Bansal
Tingting Chen
Sheng Zhong
Publikationsdatum
01.02.2011
Verlag
Springer-Verlag
Erschienen in
Neural Computing and Applications / Ausgabe 1/2011
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-010-0346-z

Weitere Artikel der Ausgabe 1/2011

Neural Computing and Applications 1/2011 Zur Ausgabe