Encrypted Data Learning and Prediction Using a BFV- based Cryptographic Convolutional Neural Network

被引:0
|
作者
Pan, Wei [1 ]
Sun, Zepei [1 ]
Sang, Huanyu [1 ]
Wang, Zihao [1 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci, Xian 710072, Peoples R China
来源
STUDIES IN INFORMATICS AND CONTROL | 2023年 / 32卷 / 01期
基金
中国国家自然科学基金;
关键词
Homomorphic encryption; Machine learning; Privacy-preserving network; Convolutional neural network;
D O I
10.24846/v32i1y202304
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning services are widely used for big data, cloud computing, and distributed artificial intelligence applications. Multiple parties participating in the provision of these services may access the users' sensitive data because most machine learning models use and share plaintext directly. Therefore, it is necessary to utilize cryptographic mechanisms for protecting user privacy. Homomorphic encryption provides an important information security guarantee for machine learning models. However, the complexity of fully homomorphic encryption increases with the depth of neural networks. Especially with the increase in the number of ciphertext multiplications, the time and space costs will also raise exponentially. Using homomorphic encryption in order to protect the model and data security while ensuring the computational efficiency of the employed model over encrypted data is a challenging problem. This paper proposes a BFV-based cryptographic low-latency convolutional neural network (CLOL-CNN) for solving this problem. This new network model performs deep learning and prediction over encrypted data instead of sharing plaintext data. A series of optimization operations are elaborately presented and implemented, such as cryptographic batch normalization, polynomial approximation, cryptographic convolution, and full cryptographic connection. The performance of the proposed model is evaluated with regard to its accuracy and computational overhead obtained by employing deep learning for homomorphically encrypted data. The experiments were conducted on a MNIST image dataset. The obtained results demonstrated that the proposed model has a higher accuracy and a lower time cost than other models and that it is an effective privacy-preserving deep neural network.
引用
收藏
页码:37 / 48
页数:12
相关论文
共 50 条
  • [21] Big Data Analysis and Prediction System Based on Improved Convolutional Neural Network
    Du, Xuegong
    Cao, Xiaojun
    Zhang, Rui
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [22] A New Approach of Object Recognition in Encrypted Images using Convolutional Neural Network
    Tayari, Zina
    Hnana, Nasreddine
    Zaied, Mourad
    TWELFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2019), 2020, 11433
  • [23] A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing
    Qiu-yu Zhang
    Yu-zhou Li
    Ying-jie Hu
    Multimedia Tools and Applications, 2021, 80 : 1201 - 1221
  • [24] A retrieval algorithm for encrypted speech based on convolutional neural network and deep hashing
    Zhang, Qiu-yu
    Li, Yu-zhou
    Hu, Ying-jie
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (01) : 1201 - 1221
  • [25] Convolutional neural network learning for generic data classification
    Han, Huimei
    Li, Ying
    Zhu, Xingquan
    INFORMATION SCIENCES, 2019, 477 : 448 - 465
  • [26] Emotion Classification Based on Convolutional Neural Network Using Speech Data
    Vrebcevic, N.
    Mijic, I.
    Petrinovic, D.
    2019 42ND INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2019, : 1007 - 1012
  • [27] Traffic State Prediction using Convolutional Neural Network
    Toncharoen, Ratchanon
    Piantanakulchai, Mongkut
    2018 15TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2018, : 250 - 255
  • [28] Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network
    Yan Zhou
    Huiling Shi
    Yanling Zhao
    Wei Ding
    Jing Han
    Hongyang Sun
    Xianheng Zhang
    Chang Tang
    Wei Zhang
    Journal of Cloud Computing, 12
  • [29] Identification of encrypted and malicious network traffic based on one-dimensional convolutional neural network
    Zhou, Yan
    Shi, Huiling
    Zhao, Yanling
    Ding, Wei
    Han, Jing
    Sun, Hongyang
    Zhang, Xianheng
    Tang, Chang
    Zhang, Wei
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2023, 12 (01):
  • [30] Classification and recognition of encrypted EEG data based on neural network
    Liu, Yongshuang
    Huang, Haiping
    Xiao, Fu
    Malekian, Reza
    Wang, Wenming
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54