Non-interactive privacy-preserving neural network prediction

被引:42
作者
Ma, Xu [1 ,2 ]
Chen, Xiaofeng [1 ]
Zhang, Xiaoyu [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks ISN, Xian, Peoples R China
[2] Qufu Normal Univ, Sch Software, Qufu, Peoples R China
基金
中国国家自然科学基金;
关键词
Outsourcing computation; Homomorphic encryption; Neural network prediction; Privacy preservation; SECURE; COMPUTATION; DATABASE;
D O I
10.1016/j.ins.2018.12.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Neural network is a particular machine learning framework which has gained widespread popularity due to its superior performance in many applications, such as complex board games, face recognition and disease diagnosis. A new service paradigm which offers online neural-network-based prediction to clients is increasingly popular. Although the prediction service has clear benefits, serious privacy issues have also emerged from the clients' sensitive data and the neural network model itself. In this paper, we present a new outsourcing model for privacy-preserving neural network prediction under two non-colluding servers framework. In this model, the original neural network owner can securely outsource an existing neural network model to the two servers who will thereafter provide prediction service to the public users utilize encrypted input data. We propose the first fully non interactive privacy-preserving neural network prediction scheme. Extensive security and efficiency analysis demonstrate that the proposed scheme satisfies the security requirement of model privacy and data privacy, and highly efficient with respect to computation and communication overhead. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:507 / 519
页数:13
相关论文
共 38 条
[1]  
[Anonymous], 2017, IEEE T DEPENDABLE SE
[2]  
[Anonymous], 2013, P 25 INT C NEUR INF
[3]  
Barni M., 2006, P 8 WORKSH MULT SEC, P46
[4]  
Beaver D., 1997, 29 ACM STOC, P446, DOI DOI 10.1145/258533.258637
[5]  
Brickell J, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P498
[6]   Verifiable Computation over Large Database with Incremental Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Weng, Jian ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :3184-3195
[7]   New Publicly Verifiable Databases with Efficient Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Huang, Xinyi ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) :546-556
[8]   New Algorithms for Secure Outsourcing of Modular Exponentiations [J].
Chen, Xiaofeng ;
Li, Jin ;
Ma, Jianfeng ;
Tang, Qiang ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2386-2396
[9]   Identity-based chameleon hashing and signatures without key exposure [J].
Chen, Xiaofeng ;
Zhang, Fangguo ;
Susilo, Willy ;
Tian, Haibo ;
Li, Jin ;
Kim, Kwangjo .
INFORMATION SCIENCES, 2014, 265 :198-210
[10]  
Damgård I, 2001, LECT NOTES COMPUT SC, V1992, P119