skip to main content
10.1145/3140649.3140655acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

Privacy-preserving Machine Learning in Cloud

Published:03 November 2017Publication History

ABSTRACT

Machine learning algorithms based on deep neural networks (NN) have achieved remarkable results and are being extensively used in different domains. On the other hand, with increasing growth of cloud services, several Machine Learning as a Service (MLaaS) are offered where training and deploying machine learning models are performed on cloud providers' infrastructure. However, machine learning algorithms require access to raw data which is often privacy sensitive and can create potential security and privacy risks. To address this issue, we develop new techniques to provide solutions for applying deep neural network algorithms to the encrypted data. In this paper, we show that it is feasible and practical to train neural networks using encrypted data and to make encrypted predictions, and also return the predictions in an encrypted form. We demonstrate applicability of the proposed techniques and evaluate its performance. The empirical results show that it provides accurate privacy-preserving training and classification.

References

  1. Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. [n. d.]. Deep Learning with Differential Privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). ACM, New York, NY, USA, 308--318.Google ScholarGoogle Scholar
  2. Louis J. M. Aslett, Pedro M. Esperança, and Chris C. Holmes. 2015. Encrypted statistical machine learning: new privacy preserving methods. CoRR Vol. abs/1508.06845 (2015).Google ScholarGoogle Scholar
  3. L. J. M. Aslett, P. M. Esperança, and C. C. Holmes. 2015. A review of homomorphic encryption and software tools for encrypted statistical machine learning. Technical Report. University of Oxford.Google ScholarGoogle Scholar
  4. Raphael Bost, Raluca Ada Popa, Stephen Tu, and Shafi Goldwasser. 2015. Machine Learning Classification over Encrypted Data 22nd Annual Network and Distributed System Security Symposium, NDSS, San Diego, California, USA.Google ScholarGoogle Scholar
  5. Nathan Dowlin, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2015. Manual for Using Homomorphic Encryption for Bioinformatics. Technical Report MSR-TR-2015-87.Google ScholarGoogle Scholar
  6. Nathan Dowlin, Ran Gilad-Bachrach, Kim Laine, Kristin Lauter Michael Naehrig, and John Wernsing. 2016. CryptoNets: Applying Neural Networks to Encrypted Data with High Throughput and Accuracy. Technical Report MSR-TR-2016-3.Google ScholarGoogle Scholar
  7. Google 2017. Google Prediction API. (2017). https://cloud.google.com/prediction/Google ScholarGoogle Scholar
  8. Thore Graepel, Kristin Lauter, and Michael Naehrig. 2013. ML Confidential: Machine Learning on Encrypted Data Proceedings of the 15th International Conference on Information Security and Cryptology (ICISC'12). Springer-Verlag.Google ScholarGoogle Scholar
  9. Shai Halevi and Victor Shoup 2014. Algorithms in HElib Advances in Cryptology - CRYPTO - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, Proceedings, Part I. 554--571.Google ScholarGoogle Scholar
  10. Ehsan Hesamifard, Hassan Takabi, and Mehdi Ghasemi. 2016. CryptoDL: Towards Deep Learning over Encrypted Data Annual Computer Security Applications Conference (ACSAC).Google ScholarGoogle Scholar
  11. Naveed Islam, William Puech, Khizar Hayat, and Robert Brouzet. 2011. Application of Homomorphism to Secure Image Sharing. Optics Communications Vol. 284, 19 (Sept. 2011), 4412--4429. Google ScholarGoogle ScholarCross RefCross Ref
  12. Ersatz Labs. 2017. Ersatz. (2017). http://www.ersatzlabs.com/Google ScholarGoogle Scholar
  13. Yann LeCun and Corinna Cortes. 2010. MNIST handwritten digit database. (2010). http://yann.lecun.com/exdb/mnist/Google ScholarGoogle Scholar
  14. M. Lichman. 2013. UCI Machine Learning Repository. (2013). http://archive.ics.uci.edu/mlGoogle ScholarGoogle Scholar
  15. Microsft. 2017. Microsoft Azure Machine Learning. (2017). https://azure.microsoft.com/en-us/services/machine-learning/Google ScholarGoogle Scholar
  16. P. Mohassel and Y. Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning 2017 IEEE Symposium on Security and Privacy (SP). 19--38.Google ScholarGoogle Scholar
  17. Reza Shokri and Vitaly Shmatikov. 2015. Privacy-Preserving Deep Learning. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15). 1310--1321.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Hassan Takabi, Ehsan Hesamifard, and Mehdi Ghasemi. 2016. Privacy Preserving Multi-party Machine Learning with Homomorphic Encryption Private Multi-Party Machine Learning, NIPS 2016 Workshop.Google ScholarGoogle Scholar
  19. Turi. 2017. GraphLab. (2017). http://www.select.cs.cmu.edu/code/graphlab/Google ScholarGoogle Scholar
  20. Pengtao Xie, Misha Bilenko, Tom Finley, Ran Gilad-Bachrach, Kristin E. Lauter, and Michael Naehrig. 2014. Crypto-Nets: Neural Networks over Encrypted Data. CoRR Vol. abs/1412.6181 (2014).Google ScholarGoogle Scholar
  21. Yuan Xu. 2001. Orthogonal Polynomials of Several Variables. Encyclopedia of Mathematics and its Applications Vol. 81 (2001).Google ScholarGoogle Scholar
  22. J. Yuan and S. Yu. 2013. Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing Security and Privacy in Communication Networks: 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Springer Berlin Heidelberg, Berlin, Heidelberg, 292--309.Google ScholarGoogle Scholar

Index Terms

  1. Privacy-preserving Machine Learning in Cloud

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CCSW '17: Proceedings of the 2017 on Cloud Computing Security Workshop
        November 2017
        62 pages
        ISBN:9781450352048
        DOI:10.1145/3140649

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 November 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper

        Acceptance Rates

        Overall Acceptance Rate37of108submissions,34%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader