Multi-key privacy-preserving deep learning in cloud computing
Tóm tắt
Từ khóa
Tài liệu tham khảo
Chang, 2015, Towards a big data system disaster recovery in a private cloud, Ad Hoc Networks, 35, 65, 10.1016/j.adhoc.2015.07.012
Wang, 2016, ABE with improved auxiliary input for big data security, J. Comput. System Sci.
O. Goldreich, Secure multi-party computation. Manuscript. Preliminary version, 1998, pp. 86–97.
López-Alt, 2012, On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption, 1219
Mukherjee, 2016, Two round multiparty computation via multi-key FHE, 735
P. Mukherjee, P, D. Wichs, Two Round MPC from LWE via Multi-Key FHE. IACR Cryptology ePrint Archive, 2015, p. 345.
E. Bresson, D. Catalano, D. Pointcheval, A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications, in: Advances in Cryptology-ASIACRYPT 2003, 2003, pp. 37–54.
C. Gentry, Fully homomorphic encryption using ideal lattices, in: Symposium on the Theory of Computing, 2009.
Chan, 2015, PCANet: A simple deep learning baseline for image classification?, IEEE Trans. Image Process., 24, 5017, 10.1109/TIP.2015.2475625
A. Graves, A.R. Mohamed, G. Hinton, Speech recognition with deep recurrent neural networks. in: ICASSP, 2013.
Hinton, 2012, Deep neural networks for acoustic modeling in speech recognition: The shared views of four research groups, Signal Process. Mag., 29, 82, 10.1109/MSP.2012.2205597
Liang, 2015, Integrative data analysis of multi-platform cancer data with a multimodal deep learning approach, IEEE/ACM Trans. Comput. Biol. Bioinf. (TCBB), 12, 928, 10.1109/TCBB.2014.2377729
Hinton, 2006, Reducing the dimensionality of data with neural networks, Science, 313, 504, 10.1126/science.1127647
Chang, 2016, Towards achieving data security with the cloud computing adoption framework, IEEE Trans. Serv. Comput., 9, 138, 10.1109/TSC.2015.2491281
Chang, 2016, Cloud computing adoption framework: A security framework for business clouds, Future Gener. Comput. Syst., 57, 24, 10.1016/j.future.2015.09.031
Sun, 2016, User-defined privacy location-sharing system in mobile online social networks, J. Netw. Comput. Appl.
Sun, 2016, L2P2: A location-label based approach for privacy preserving in LBS, Future Gener. Comput. Syst.
Li, 2014, Secure deduplication with efficient and reliable convergent key management, IEEE Trans. Parallel Distrib. Syst., 25, 1615, 10.1109/TPDS.2013.284
Li, 2015, A hybrid cloud approach for secure authorized deduplication, IEEE Trans. Parallel Distrib. Syst., 26, 1206, 10.1109/TPDS.2014.2318320
Li, 2015, Secure distributed deduplication systems with improved reliability, IEEE Trans. Comput., 64, 3569, 10.1109/TC.2015.2401017
Aggarwal, 2008, A general survey of privacy-preserving data mining models and algorithms, 11
Ren, 2016, Secure searching on cloud storage enhanced by homomorphic indexing, Future Gener. Comput. Syst., 10.1016/j.future.2016.03.013
Evfimievski, 2009, 1
Vijayakumar, 2016, Computationally efficient privacy preserving anonymous mutual and batch authentication schemes for vehicular ad hoc networks, Future Gener. Comput. Syst.
W. Du, Y. Han, S. Chen, Privacy-preserving multivariate statistical analysis: Linear regression and classification, in: SDM, 2004, Vol. 4, pp. 222–233.
Jagannathan, 2005, Privacy-preserving distributed k-means clustering over arbitrarily partitioned data, 593
Graepel, 2012, ML confidential: Machine learning on encrypted data, 1
D. Agrawal, R. Srikant, Privacy-preserving data mining, in: Proc. ACM Conf. Manage. Data, 2000, pp. 439–450.
Li, 2016, Differential privacy: From theory to practice, Synth. Lect. Inf. Secur. Privacy Trust, 8, 1
Zhang, 2017, Dynamic differential privacy for ADMM-based distributed classification learning, IEEE Trans. Inf. Forensics Secur., 12, 10.1109/TIFS.2016.2607691
Abadi, 2016, Deep learning with differential privacy, 308
Shokri, 2015, Privacy-preserving deep learning, 1310
Chen, 2009, Privacy-preserving back-propagation neural network learning, IEEE Trans. Neural Netw., 20, 1554, 10.1109/TNN.2009.2026902
Bansal, 2011, Privacy preserving back-propagation neural network learning over arbitrarily partitioned data, Neural Comput. Appl., 20, 143, 10.1007/s00521-010-0346-z
N. Schlitter, A protocol for privacy preserving neural network learning on horizontally partitioned data, in: PSD, 2008.
Yuan, 2015, Privacy preserving back-propagation neural network learning made practical with cloud computing, IEEE Trans. Parallel Distrib. Syst., 25, 212, 10.1109/TPDS.2013.18
D. Boneh, E.J. Goh, K. Nissim, Evaluating 2-dnf formulas on ciphertexts, in: Proceedings of the Second International Conference on Theory of Cryptography, TCC05, Berlin, Heidelberg, 2005, pp. 325–341.
Zhang, 2016, Privacy preserving deep computation model on cloud for big data feature learning, IEEE Trans. Comput., 65, 1351, 10.1109/TC.2015.2470255
Brakerski, 2012, (Leveled) fully homomorphic encryption without bootstrapping, 309
A. Mirhoseini, A.R. Sadeghi, F. Koushanfar, CryptoML: Secure outsourcing of big data machine learning applications. 2016.