[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1161366.1161393acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

A privacy-preserving protocol for neural-network-based computation

Published: 26 September 2006 Publication History

Abstract

The problem of secure data processing by means of a neural network (NN) is addressed. Secure processing refers to the possibility that the NN owner does not get any knowledge about the processed data since they are provided to him in encrypted format. At the same time, the NN itself is protected, given that its owner may not be willing to disclose the knowledge embedded within it. Two different levels of protection are considered: according to the first one only the NN weights are protected, whereas the second level also permits to protect the node activation functions. An efficient way of implementing the proposed protocol by means of some recently proposed multi-party computation techniques is described.

References

[1]
H. L. B. Goethals, S. Laur and T. Mielikainen. On secure scalar product computation for privacy-preserving data mining. In 7th ICISC, 2004.]]
[2]
R. Brinkman, J. M. Doumen, and W. Jonker. Using secret sharing for searching in encrypted data. In Proc. of Workshop on Secure Data Management in a Connected World (SDM 2004), Springer-Verlag LNCS 3178, pages 18--27, 2004.]]
[3]
D. Chaum, C. Crépeau, and I. Damgård. Multiparty unconditionally secure protocols. In STOC '88: Proceedings of the twentieth annual ACM symposium on Theory of computing, pages 11--19, New York, NY, USA, 1988. ACM Press.]]
[4]
I. Damgård and M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In Public Key Cryptography, pages 119--136, 2001.]]
[5]
W. Du and M. J. Atallah. Privacy-preserving statistical analysis. In Proceedings of the 17th Annual Computer Security Applications Conference, pages 102--110, New Orleans, Louisiana, USA, December 10-14 2001.]]
[6]
O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game or a completeness theorem for protocols with honest majority. In STOC, pages 218--229. ACM, 1987.]]
[7]
G. Jagannathan, K. Pillaipakkamnatt, and R. Wright. A new privacy-preserving distributed k-clustering algorithm. In 2006 SIAM International Conference on Data Mining (SDM, Bethesda, Maryland, April 20-22 2006.]]
[8]
M. Johnson, P. Ishwar, V. Prabhakaran, D. Schonberg, and K. Ramchandran. On compressing encrypted data. IEEE Trans. on Signal Processing, 52(10):2992--3006, October 2004.]]
[9]
M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. In 31th Annual Symposium on Theory of Computer Science (STOC), pages 245--254, Atlanta, GA, May 1-4 1999.]]
[10]
P. Pailler. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Eurocrypt'99, Lecture Notes is Computer Science vol. 1592, pages 223--238. Springer-Verlag, 1999.]]
[11]
P. Ravikumar, W. Cohen, and S. Fienberg. A secure protocol for computing string distance metrics. In Workshop on Privacy and Security Aspects of Data Mining, Brighton, UK, November 1 2004.]]
[12]
D. X. Song, D. Wagner, and A. Perrig. Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE symposium on Security and Privacy (S&P 2000), 2000.]]
[13]
W. Du and M. J. Atallah. Privacy-preserving cooperative scientific computations. In 14th IEEE Computer Security Foundations Workshop, pages 273--282, Nova Scotia, Canada, June 11-13 2001.]]
[14]
R. Wright and Z. Yang. Privacy-preserving bayesian network structure computation on distributed heterogeneous data. In KDD'04: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 713--718, New York, NY, USA, 2004. ACM Press.]]
[15]
A. C. Yao. Protocols for secure computations. In Proceedings of Twenty-third IEEE Symposium on Foundations of Computer Science, pages 160--164, Chicago, Illinois, November 1982.]]

Cited By

View all
  • (2024)Toward Practical Threshold FHE: Low Communication, Computation and InteractionProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690861(5107-5109)Online publication date: 2-Dec-2024
  • (2024)SecDM: A Secure and Lossless Human Mobility Prediction SystemIEEE Transactions on Services Computing10.1109/TSC.2024.335829217:4(1793-1805)Online publication date: Jul-2024
  • (2024)Fregata: Fast Private Inference With Unified Secure Two-Party ProtocolsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.344432719(8472-8484)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '06: Proceedings of the 8th workshop on Multimedia and security
September 2006
244 pages
ISBN:1595934936
DOI:10.1145/1161366
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 September 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. neural networks
  2. privacy-preserving computation

Qualifiers

  • Article

Conference

MM&Sec '06
Sponsor:
MM&Sec '06: Multimedia and Security Workshop
September 26 - 27, 2006
Geneva, Switzerland

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)42
  • Downloads (Last 6 weeks)5
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Toward Practical Threshold FHE: Low Communication, Computation and InteractionProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690861(5107-5109)Online publication date: 2-Dec-2024
  • (2024)SecDM: A Secure and Lossless Human Mobility Prediction SystemIEEE Transactions on Services Computing10.1109/TSC.2024.335829217:4(1793-1805)Online publication date: Jul-2024
  • (2024)Fregata: Fast Private Inference With Unified Secure Two-Party ProtocolsIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.344432719(8472-8484)Online publication date: 2024
  • (2024)On the Economics of Adversarial Machine LearningIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.337982919(4670-4685)Online publication date: 2024
  • (2024)A Multi-Modal Vertical Federated Learning Framework Based on Homomorphic EncryptionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.334099419(1826-1839)Online publication date: 2024
  • (2024)Global Model Privacy Protection Mechanism in Federated Learning2024 International Conference on Information Networking (ICOIN)10.1109/ICOIN59985.2024.10572139(398-402)Online publication date: 17-Jan-2024
  • (2024)PP-Stream: Toward High-Performance Privacy-Preserving Neural Network Inference via Distributed Stream Processing2024 IEEE 40th International Conference on Data Engineering (ICDE)10.1109/ICDE60146.2024.00123(1492-1505)Online publication date: 13-May-2024
  • (2024)Privacy-Preserving Sentiment Analysis Using Homomorphic Encryption and Attention MechanismsApplied Cryptography and Network Security Workshops10.1007/978-3-031-61489-7_6(84-100)Online publication date: 29-Jun-2024
  • (2023)A Homomorphic Encryption Framework for Privacy-Preserving Spiking Neural NetworksInformation10.3390/info1410053714:10(537)Online publication date: 1-Oct-2023
  • (2023)A Study on Quantized Parameters for Protection of a Model and Its Inference InputJournal of Information Processing10.2197/ipsjjip.31.66731(667-678)Online publication date: 2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media