ABSTRACT
Machine learning algorithms based on deep neural networks (NN) have achieved remarkable results and are being extensively used in different domains. On the other hand, with increasing growth of cloud services, several Machine Learning as a Service (MLaaS) are offered where training and deploying machine learning models are performed on cloud providers' infrastructure. However, machine learning algorithms require access to raw data which is often privacy sensitive and can create potential security and privacy risks. To address this issue, we develop new techniques to provide solutions for applying deep neural network algorithms to the encrypted data. In this paper, we show that it is feasible and practical to train neural networks using encrypted data and to make encrypted predictions, and also return the predictions in an encrypted form. We demonstrate applicability of the proposed techniques and evaluate its performance. The empirical results show that it provides accurate privacy-preserving training and classification.
- Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. [n. d.]. Deep Learning with Differential Privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). ACM, New York, NY, USA, 308--318.Google Scholar
- Louis J. M. Aslett, Pedro M. Esperança, and Chris C. Holmes. 2015. Encrypted statistical machine learning: new privacy preserving methods. CoRR Vol. abs/1508.06845 (2015).Google Scholar
- L. J. M. Aslett, P. M. Esperança, and C. C. Holmes. 2015. A review of homomorphic encryption and software tools for encrypted statistical machine learning. Technical Report. University of Oxford.Google Scholar
- Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser. 2015. Machine Learning Classification over Encrypted Data 22nd Annual Network and Distributed System Security Symposium, NDSS, San Diego, California, USA.Google Scholar
- Nathan Dowlin, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2015. Manual for Using Homomorphic Encryption for Bioinformatics. Technical Report MSR-TR-2015-87.Google Scholar
- Nathan Dowlin, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. Technical Report MSR-TR-2016-3.Google Scholar
- Google 2017. Google Prediction API. (2017). https://cloud.google.com/prediction/Google Scholar
- Thore Graepel, Kristin Lauter, and Michael Naehrig. 2013. ML Confidential: Machine Learning on Encrypted Data Proceedings of the 15th International Conference on Information Security and Cryptology (ICISC'12). Springer-Verlag.Google Scholar
- Shai Halevi and Victor Shoup 2014. Algorithms in HElib Advances in Cryptology - CRYPTO - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, Proceedings, Part I. 554--571.Google Scholar
- Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. 2016. CryptoDL: Towards Deep Learning over Encrypted Data Annual Computer Security Applications Conference (ACSAC).Google Scholar
- Naveed Islam, William Puech, Khizar Hayat, and Robert Brouzet. 2011. Application of Homomorphism to Secure Image Sharing. Optics Communications Vol. 284, 19 (Sept. 2011), 4412--4429. Google ScholarCross Ref
- Ersatz Labs. 2017. Ersatz. (2017). http://www.ersatzlabs.com/Google Scholar
- Yann LeCun and Corinna Cortes. 2010. MNIST handwritten digit database. (2010). http://yann.lecun.com/exdb/mnist/Google Scholar
- M. Lichman. 2013. UCI Machine Learning Repository. (2013). http://archive.ics.uci.edu/mlGoogle Scholar
- Microsft. 2017. Microsoft Azure Machine Learning. (2017). https://azure.microsoft.com/en-us/services/machine-learning/Google Scholar
- P. Mohassel and Y. Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning 2017 IEEE Symposium on Security and Privacy (SP). 19--38.Google Scholar
- Reza Shokri and Vitaly Shmatikov. 2015. Privacy-Preserving Deep Learning. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15). 1310--1321.Google ScholarDigital Library
- Hassan Takabi, Ehsan Hesamifard, and Mehdi Ghasemi. 2016. Privacy Preserving Multi-party Machine Learning with Homomorphic Encryption Private Multi-Party Machine Learning, NIPS 2016 Workshop.Google Scholar
- Turi. 2017. GraphLab. (2017). http://www.select.cs.cmu.edu/code/graphlab/Google Scholar
- Pengtao Xie, Misha Bilenko, Tom Finley, Ran Gilad-Bachrach, Kristin E. Lauter, and Michael Naehrig. 2014. Crypto-Nets: Neural Networks over Encrypted Data. CoRR Vol. abs/1412.6181 (2014).Google Scholar
- Yuan Xu. 2001. Orthogonal Polynomials of Several Variables. Encyclopedia of Mathematics and its Applications Vol. 81 (2001).Google Scholar
- J. Yuan and S. Yu. 2013. Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing Security and Privacy in Communication Networks: 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Springer Berlin Heidelberg, Berlin, Heidelberg, 292--309.Google Scholar
Index Terms
- Privacy-preserving Machine Learning in Cloud
Recommendations
Privacy-preserving machine learning with multiple data providers
AbstractWith the fast development of cloud computing, more and more data storage and computation are moved from the local to the cloud, especially the applications of machine learning and data analytics. However, the cloud servers are run by a ...
Highlights- To protect data privacy, multiple parties encrypt their data under their own public key of double decryption algorithm, before outsourcing it to cloud for ...
Survey on Privacy-Preserving Machine Learning Protocols
Machine Learning for Cyber SecurityAbstractMachine learning, especially deep learning, is a hot research field in academia, and it is revolutionizing industry. However, the privacy-preserving problems are not solved. In this paper, we investigate the privacy-preserving technology in ...
Preserving data privacy in machine learning systems
AbstractThe wide adoption of Machine Learning to solve a large set of real-life problems came with the need to collect and process large volumes of data, some of which are considered personal and sensitive, raising serious concerns about data protection. ...
Comments