Multi-key privacy-preserving deep learning in cloud computing

Future Generation Computer Systems - Tập 74 - Trang 76-85 - 2017
Ping Li1, Jin Li1, Zhengan Huang1, Tong Li2, Chong Gao1, Siu‐Ming Yiu3, Kai Chen4
1School of Computational Science & Education Software, Guangzhou University, 510006, Guangzhou, PR China
2College of Computer & Control Engineering, Nankai University, 300071, Tianjin, PR China
3Department of Computer Science, the University of Hong Kong, Hong Kong, PR China
4Institute of Information Engineering, Chinese Academy of Sciences, Beijing, PR China

Tóm tắt

Từ khóa


Tài liệu tham khảo

Chang, 2015, Towards a big data system disaster recovery in a private cloud, Ad Hoc Networks, 35, 65, 10.1016/j.adhoc.2015.07.012

Wang, 2016, ABE with improved auxiliary input for big data security, J. Comput. System Sci.

O. Goldreich, Secure multi-party computation. Manuscript. Preliminary version, 1998, pp. 86–97.

López-Alt, 2012, On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption, 1219

Mukherjee, 2016, Two round multiparty computation via multi-key FHE, 735

P. Mukherjee, P, D. Wichs, Two Round MPC from LWE via Multi-Key FHE. IACR Cryptology ePrint Archive, 2015, p. 345.

E. Bresson, D. Catalano, D. Pointcheval, A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications, in: Advances in Cryptology-ASIACRYPT 2003, 2003, pp. 37–54.

C. Gentry, Fully homomorphic encryption using ideal lattices, in: Symposium on the Theory of Computing, 2009.

Chan, 2015, PCANet: A simple deep learning baseline for image classification?, IEEE Trans. Image Process., 24, 5017, 10.1109/TIP.2015.2475625

A. Graves, A.R. Mohamed, G. Hinton, Speech recognition with deep recurrent neural networks. in: ICASSP, 2013.

Hinton, 2012, Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups, Signal Process. Mag., 29, 82, 10.1109/MSP.2012.2205597

Liang, 2015, Integrative data analysis of multi-platform cancer data with a multimodal deep learning approach, IEEE/ACM Trans. Comput. Biol. Bioinf. (TCBB), 12, 928, 10.1109/TCBB.2014.2377729

Hinton, 2006, Reducing the dimensionality of data with neural networks, Science, 313, 504, 10.1126/science.1127647

Chang, 2016, Towards achieving data security with the cloud computing adoption framework, IEEE Trans. Serv. Comput., 9, 138, 10.1109/TSC.2015.2491281

Chang, 2016, Cloud computing adoption framework: A security framework for business clouds, Future Gener. Comput. Syst., 57, 24, 10.1016/j.future.2015.09.031

Sun, 2016, User-defined privacy location-sharing system in mobile online social networks, J. Netw. Comput. Appl.

Sun, 2016, L2P2: A location-label based approach for privacy preserving in LBS, Future Gener. Comput. Syst.

Li, 2014, Secure deduplication with efficient and reliable convergent key management, IEEE Trans. Parallel Distrib. Syst., 25, 1615, 10.1109/TPDS.2013.284

Li, 2015, A hybrid cloud approach for secure authorized deduplication, IEEE Trans. Parallel Distrib. Syst., 26, 1206, 10.1109/TPDS.2014.2318320

Li, 2015, Secure distributed deduplication systems with improved reliability, IEEE Trans. Comput., 64, 3569, 10.1109/TC.2015.2401017

Aggarwal, 2008, A general survey of privacy-preserving data mining models and algorithms, 11

Ren, 2016, Secure searching on cloud storage enhanced by homomorphic indexing, Future Gener. Comput. Syst., 10.1016/j.future.2016.03.013

Evfimievski, 2009, 1

Vijayakumar, 2016, Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks, Future Gener. Comput. Syst.

W. Du, Y. Han, S. Chen, Privacy-preserving multivariate statistical analysis: Linear regression and classification, in: SDM, 2004, Vol. 4, pp. 222–233.

Jagannathan, 2005, Privacy-preserving distributed k-means clustering over arbitrarily partitioned data, 593

Graepel, 2012, ML confidential: Machine learning on encrypted data, 1

D. Agrawal, R. Srikant, Privacy-preserving data mining, in: Proc. ACM Conf. Manage. Data, 2000, pp. 439–450.

Li, 2016, Differential privacy: From theory to practice, Synth. Lect. Inf. Secur. Privacy Trust, 8, 1

Zhang, 2017, Dynamic differential privacy for ADMM-based distributed classification learning, IEEE Trans. Inf. Forensics Secur., 12, 10.1109/TIFS.2016.2607691

Abadi, 2016, Deep learning with differential privacy, 308

Shokri, 2015, Privacy-preserving deep learning, 1310

Chen, 2009, Privacy-preserving back-propagation neural network learning, IEEE Trans. Neural Netw., 20, 1554, 10.1109/TNN.2009.2026902

Bansal, 2011, Privacy preserving back-propagation neural network learning over arbitrarily partitioned data, Neural Comput. Appl., 20, 143, 10.1007/s00521-010-0346-z

N. Schlitter, A protocol for privacy preserving neural network learning on horizontally partitioned data, in: PSD, 2008.

Yuan, 2015, Privacy preserving back-propagation neural network learning made practical with cloud computing, IEEE Trans. Parallel Distrib. Syst., 25, 212, 10.1109/TPDS.2013.18

D. Boneh, E.J. Goh, K. Nissim, Evaluating 2-dnf formulas on ciphertexts, in: Proceedings of the Second International Conference on Theory of Cryptography, TCC05, Berlin, Heidelberg, 2005, pp. 325–341.

Zhang, 2016, Privacy preserving deep computation model on cloud for big data feature learning, IEEE Trans. Comput., 65, 1351, 10.1109/TC.2015.2470255

Brakerski, 2012, (Leveled) fully homomorphic encryption without bootstrapping, 309

A. Mirhoseini, A.R. Sadeghi, F. Koushanfar, CryptoML: Secure outsourcing of big data machine learning applications. 2016.

Goldwasser, 1984, Probabilistic encryption, J. Comput. System Sci., 28, 270, 10.1016/0022-0000(84)90070-9