Secure Multi-Party Computation for Personalized Human Activity Recognition

被引:6
作者
Melanson, David [1 ]
Maia, Ricardo [2 ]
Kim, Hee-Seok [1 ]
Nascimento, Anderson [1 ]
De Cock, Martine [1 ,3 ]
机构
[1] Univ Washington, Sch Engn & Technol, 1900 Commerce St, Tacoma, WA 98402 USA
[2] Univ Brasilia, Inst Exact Sci, Dept Comp Sci, BR-70910900 Brasilia, DF, Brazil
[3] Univ Ghent, Dept Appl Math Comp Sci & Stat, Krijgslaan 281 S9, B-9000 Ghent, Belgium
关键词
Transfer learning; Human activity recognition; Convolutional neural network; Secure multi-party computation; Cryptography; Privacy;
D O I
10.1007/s11063-023-11182-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Calibrating Human Activity Recognition (HAR) models to end-users with Transfer Learning (TL) often yields significant accuracy improvements. Such TL is by design done based on very personal data collected by sensors worn close to the human body. To protect the users' privacy, we therefore introduce Secure Multi-Party Computation (MPC) protocols for personalization of HAR models, and for secure activity recognition with the personalized models. Our MPC protocols do not require the end-users to reveal their sensitive data in an unencrypted manner, nor do they require the application developer to disclose their trained model parameters or any other sensitive or proprietary information with anyone in plaintext. Through experiments on HAR benchmark datasets, we demonstrate that our privacy-preserving solution yields the same accuracy gains as TL in-the-clear, i.e. when no measures to protect privacy are in place, and that our approach is fast enough for use in practice.
引用
收藏
页码:2127 / 2153
页数:27
相关论文
共 52 条
[1]  
Abspoel Mark, 2021, Proceedings on Privacy Enhancing Technologies, V2021, P167, DOI [10.2478/popets-2021-0010, 10.2478/popets-2021-0010]
[2]  
Adams Samuel, 2022, Proceedings on Privacy Enhancing Technologies, V2022, P205, DOI [10.2478/popets-2022-0042, 10.2478/popets-2022-0042]
[3]  
Adams Samuel., 2021, P 3 WORKSHOP PRIVACY, P53
[4]   Protecting Privacy of Users in Brain-Computer Interface Applications [J].
Agarwal, Anisha ;
Dowsley, Rafael ;
McKinney, Nicholas D. ;
Wu, Dongrui ;
Lin, Chin-Teng ;
De Cock, Martine ;
Nascimento, Anderson C. A. .
IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING, 2019, 27 (08) :1546-1555
[5]   QUOTIENT: Two-Party Secure Neural Network Training and Prediction [J].
Agrawal, Nitin ;
Shamsabadi, Ali Shahin ;
Kusner, Matt J. ;
Gascon, Adria .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :1231-1247
[6]   High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority [J].
Araki, Toshinori ;
Furukawa, Jun ;
Lindell, Yehuda ;
Nof, Ariel ;
Ohara, Kazuma .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :805-817
[7]   Human activity recognition from smart watch sensor data using a hybrid of principal component analysis and random forest algorithm [J].
Balli, Serkan ;
Sagbas, Ensar Arif ;
Peker, Musa .
MEASUREMENT & CONTROL, 2019, 52 (1-2) :37-45
[8]   Recognizing Daily and Sports Activities in Two Open Source Machine Learning Environments Using Body-Worn Sensor Units [J].
Barshan, Billur ;
Yuksek, Murat Cihan .
COMPUTER JOURNAL, 2014, 57 (11) :1649-1667
[9]  
Beaver Donald., 1997, STOC, V97, P446, DOI [DOI 10.1145/258533.258637, 10.1145/258533.258637]
[10]  
Carlini N, 2019, PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, P267