TY - GEN
T1 - Privacy preserving back-propagation learning made practical with cloud computing
AU - Yuan, Jiawei
AU - Yu, Shucheng
PY - 2013
Y1 - 2013
N2 - Back-propagation is an effective method for neural network learning. To improve the accuracy of the learning result, in practice multiple parties may want to collaborate by jointly executing the back-propagation algorithm on the union of their respective data sets. During this process no party wants to disclose her/his private data to others for privacy concerns. Existing schemes supporting this kind of collaborative learning just partially solve the problem by limiting the way of data partition or considering only two parties. There still lacks a solution for more general and practical settings wherein two or more parties, each with an arbitrarily partitioned data set, collaboratively conduct learning. In this paper, by utilizing the power of cloud computing, we solve this open problem with our proposed privacy preserving back-propagation algorithm, which is tailored for the setting of multiparty and arbitrarily partitioned data. In our proposed scheme, each party encrypts his/her private data locally and uploads the ciphertexts into the cloud. The cloud then executes most of the operations pertaining to the learning algorithms with ciphertexts but learns nothing about the original private data. By securely offloading the expensive operations to the cloud, we keep the local computation and communication costs on each party minimal and independent to the number of participants. To support flexible operations over ciphertexts, we adopt and tailor the BGN 'doubly homomorphic' encryption algorithm for the multiparty setting. Thorough analysis shows that our proposed scheme is secure, efficient and scalable.
AB - Back-propagation is an effective method for neural network learning. To improve the accuracy of the learning result, in practice multiple parties may want to collaborate by jointly executing the back-propagation algorithm on the union of their respective data sets. During this process no party wants to disclose her/his private data to others for privacy concerns. Existing schemes supporting this kind of collaborative learning just partially solve the problem by limiting the way of data partition or considering only two parties. There still lacks a solution for more general and practical settings wherein two or more parties, each with an arbitrarily partitioned data set, collaboratively conduct learning. In this paper, by utilizing the power of cloud computing, we solve this open problem with our proposed privacy preserving back-propagation algorithm, which is tailored for the setting of multiparty and arbitrarily partitioned data. In our proposed scheme, each party encrypts his/her private data locally and uploads the ciphertexts into the cloud. The cloud then executes most of the operations pertaining to the learning algorithms with ciphertexts but learns nothing about the original private data. By securely offloading the expensive operations to the cloud, we keep the local computation and communication costs on each party minimal and independent to the number of participants. To support flexible operations over ciphertexts, we adopt and tailor the BGN 'doubly homomorphic' encryption algorithm for the multiparty setting. Thorough analysis shows that our proposed scheme is secure, efficient and scalable.
KW - back-propagation
KW - cloud computing
KW - computation outsource
KW - learning
KW - neural network
KW - privacy reserving
UR - http://www.scopus.com/inward/record.url?scp=84874515740&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84874515740&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-36883-7_18
DO - 10.1007/978-3-642-36883-7_18
M3 - Conference contribution
AN - SCOPUS:84874515740
SN - 9783642368820
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
SP - 292
EP - 309
BT - Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Revised Selected Papers
T2 - 8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012
Y2 - 3 September 2012 through 5 September 2012
ER -