• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Chen, Jialu (Chen, Jialu.) [1] | Zhou, Jun (Zhou, Jun.) [2] | Cao, Zhenfu (Cao, Zhenfu.) [3] | Vasilakos, Athanasios V. (Vasilakos, Athanasios V..) [4] | Dong, Xiaolei (Dong, Xiaolei.) [5] | Choo, Kim-Kwang Raymond (Choo, Kim-Kwang Raymond.) [6]

Indexed by:

EI

Abstract:

Machine learning, particularly the neural network (NN), is extensively exploited in dizzying applications. In order to reduce the burden of computing for resource-constrained clients, a large number of historical private datasets are required to be outsourced to the semi-trusted or malicious cloud for model training and evaluation. To achieve privacy preservation, most of the existing work either exploited the technique of public key fully homomorphic encryption (FHE) resulting in considerable computational cost and ciphertext expansion, or secure multiparty computation (SMC) requiring multiple rounds of interactions between user and cloud. To address these issues, in this article, a lightweight privacy-preserving model training and evaluation scheme LPTE for discretized NNs (DiNNs) is proposed. First, we put forward an efficient single key fully homomorphic data encapsulation mechanism (SFH-DEM) without exploiting public key FHE. Based on SFH-DEM, a series of atomic calculations over the encrypted domain, including multivariate polynomial, nonlinear activation function, gradient function, and maximum operations are devised as building blocks. Furthermore, a lightweight privacy-preserving model training and evaluation scheme LPTE for DiNNs is proposed, which can also be extended to convolutional NN. Finally, we give the formal security proofs for dataset privacy, model training privacy, and model evaluation privacy under the semi-honest environment and implement the experiment on real dataset MNIST for recognizing handwritten numbers in DiNN to demonstrate the high efficiency and accuracy of our proposed LPTE. © 2014 IEEE.

Keyword:

Character recognition Data encapsulation Function evaluation Large dataset Neural networks Public key cryptography

Community:

  • [ 1 ] [Chen, Jialu]Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai; 200062, China
  • [ 2 ] [Zhou, Jun]Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai; 200062, China
  • [ 3 ] [Cao, Zhenfu]Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai; 200062, China
  • [ 4 ] [Vasilakos, Athanasios V.]Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, Skellefteå; 93187, Sweden
  • [ 5 ] [Vasilakos, Athanasios V.]Department of Computer Science and Technology, Fuzhou University, Fuzhou; 350108, China
  • [ 6 ] [Dong, Xiaolei]Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai; 200062, China
  • [ 7 ] [Choo, Kim-Kwang Raymond]Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio; TX; 78249, United States

Reprint 's Address:

  • [zhou, jun]shanghai key laboratory of trustworthy computing, east china normal university, shanghai; 200062, china

Show more details

Related Keywords:

Related Article:

Source :

IEEE Internet of Things Journal

Year: 2020

Issue: 4

Volume: 7

Page: 2663-2678

9 . 4 7 1

JCR@2020

8 . 2 0 0

JCR@2023

ESI HC Threshold:149

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:120/10029183
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1