Subscribe

Issue No.01 - Jan. (2014 vol.25)

pp: 212-221

Jiawei Yuan , University of Arkansas at Little Rock, Little Rock

Shucheng Yu , University of Arkansas at Little Rock, Little Rock

DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.18

ABSTRACT

To improve the accuracy of learning result, in practice multiple parties may collaborate through conducting joint Back-Propagation neural network learning on the union of their respective data sets. During this process no party wants to disclose her/his private data to others. Existing schemes supporting this kind of collaborative learning are either limited in the way of data partition or just consider two parties. There lacks a solution that allows two or more parties, each with an arbitrarily partitioned data set, to collaboratively conduct the learning. This paper solves this open problem by utilizing the power of cloud computing. In our proposed scheme, each party encrypts his/her private data locally and uploads the ciphertexts into the cloud. The cloud then executes most of the operations pertaining to the learning algorithms over ciphertexts without knowing the original private data. By securely offloading the expensive operations to the cloud, we keep the computation and communication costs on each party minimal and independent to the number of participants. To support flexible operations over ciphertexts, we adopt and tailor the BGN "doubly homomorphic" encryption algorithm for the multiparty setting. Numerical analysis and experiments on commodity cloud show that our scheme is secure, efficient, and accurate.

INDEX TERMS

Data privacy, Neural networks, Approximation algorithms, Encryption, Algorithm design and analysis, Feeds,computation outsource, Privacy reserving, learning, neural network, back-propagation, cloud computing

CITATION

Jiawei Yuan, Shucheng Yu, "Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing",

*IEEE Transactions on Parallel & Distributed Systems*, vol.25, no. 1, pp. 212-221, Jan. 2014, doi:10.1109/TPDS.2013.18REFERENCES

- [1] "The Health Insurance Portability and Accountability Act of Privacy and Security Rules," http://www.hhs.gov/ocrprivacy, 2013.
- [2] "National Standards to Protect the Privacy of Personal Health Information," http://www.hhs.gov/ocr/hipaafinalreg.html , 2013.
- [3] M. Abramowitz and I.A. Stegun,
Handbook of Mathematical Functions: With Formulas, Graphs, and Mathematics Tables, DoverBooks on Mathematics. Dover, 1964.- [4] A. Bansal, T. Chen, and S. Zhong, "Privacy Preserving Back-Propagation Neural Network Learning over Arbitrarily Partitioned Data,"
Neural Computing Applications, vol. 20, no. 1, pp. 143-150, Feb. 2011.- [5] D. Boneh, E.-J. Goh, and K. Nissim, "Evaluating 2-DNF Formulas on Ciphertexts,"
Proc. Second Int'l Conf. Theory of Cryptography (TCC '05), pp. 325-341, 2005.- [6] T. Chen and S. Zhong, "Privacy-Preserving Backpropagation Neural Network Learning,"
IEEE Trans. Neural Network, vol. 20, no. 10, pp. 1554-1564, Oct. 2009.- [7] L. Cun, B. Boser, J.S. Denker, D. Henderson, R.E. Howard, W. Hubbard, and L.D. Jackel, "Handwritten Digit Recognition with a Back-Propagation Network,"
Proc. Advances in Neural Information Processing Systems, pp. 396-404, 1990.- [8] S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, "Over-Encryption: Management of Access Control Evolution on Outsourced Data,"
Proc. 33rd Int'l Conf. Very Large Data Bases (VLDB '07), pp. 123-134, 2007.- [9] T. El Gamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,"
Proc. Advances in Cryptology (CRYPTO '85), pp. 10-18, 1985.- [10] S.E. Fahlman,
Faster-Learning Variations on Back-Propagation: An Empirical Study, pp. 38-51. Morgan Kaufmann, 1988.- [11] K. Flouri, B. Beferull-lozano, and P. Tsakalides, "Training a SVM-Based Classifier in Distributed Sensor Networks,"
Proc. 14th European Signal Processing Conf., pp. 1-5, 2006.- [12] A. Frank and A. Asuncion,
UCI Machine Learning Repository, 2010.- [13] R. Grossman and Y. Gu, "Data Mining Using High Performance Data Clouds: Experimental Studies Using Sector and Sphere,"
Proc. 14th ACM Int'l Conf. Knowledge Discovery and Data Mining (SIGKDD '08), pp. 920-927, 2008.- [14] R.L. Grossman, "The Case for Cloud Computing,"
IT Professional, vol. 11, no. 2, pp. 23-27, Mar. 2009.- [15] A. Inc.,
Amazon Elastic Compute Cloud (Amazon EC2), Amazon Inc., http://aws.amazon.com/ec2#pricing, 2008.- [16] R. Law, "Back-Propagation Learning in Improving the Accuracy of Neural Network-Based Tourism Demand Forecasting,"
Tourism Management, vol. 21, no. 4, pp. 331-340, 2000.- [17] A.J. Menezes, P.C.V. Oorschot, S.A. Vanstone, and R.L. Rivest,
Handbook of Applied Cryptography. CRC Press, 1997.- [18] D.E. Rumelhart, G.E. Hinton, and R.J. Williams, "Learning Internal Representations by Error Propagation,"
Parallel Distributed Processing: Explorations in the Microstructure of Cognition, vol. 1, pp. 318-362, MIT Press, 1986.- [19] N. Schlitter, "A Protocol for Privacy Preserving Neural Network Learning on Horizontal Partitioned Data,"
Proc. Privacy Statistics in Databases (PSD '08), Sept. 2008.- [20] S. Stolfo, A.L.P.S. Tselepis, A.L. Prodromidis, S. Tselepis, W. Lee, D.W. Fan, and P.K. Chan, "JAM: Java Agents for Meta-Learning over Distributed Databases,"
Proc. Third Int'l Conf. Knowledge Discovery and Data Mining, pp. 74-81, 1997.- [21] B. Yang, Y.-d. Wang, and X.-h. Su, "Research and Design of Distributed Neural Networks with Chip Training Algorithm,"
Proc. First Int'l Conf. Advances in Natural Computation (ICNC '05)- Vol. Part I, pp. 213-216, 2005.- [22] A.C. Yao, "Protocols for Secure Computations,"
Proc. 23rd Ann. Symp. Foundations of Computer Science (SFCS '82), pp. 160-164, 1982.- [23] J. Yuan and S. Yu, "Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing,"
Proc. Eighth Int'l ICST Conf. Security and Privacy in Comm. Networks (SecureComm '12), Sept. 2012.- [24] S. Zang and S. Zhong, "A Privacy-Preserving Algorithm for Distributed Training of Neural Network Ensembles,"
Neural Computing and Applications, vol. 22, no.1, pp. 269-282, 2013. |