Privacy-Preserving Machine Learning With Fully Homomorphic Encryption for Deep Neural Network

نویسندگان

چکیده

Fully homomorphic encryption (FHE) is a prospective tool for privacy-preserving machine learning (PPML). Several PPML models have been proposed based on various FHE schemes and approaches. Although are suitable as tools implementing models, previous FHE, such CryptoNet, SEALion, CryptoDL, limited to simple nonstandard types of models; they not proven be efficient accurate with more practical advanced datasets. Previous replaced non-arithmetic activation functions arithmetic instead adopting approximation methods did use bootstrapping, which enables continuous evaluations. Thus, could neither standard nor employ large numbers layers. In this work, we first implement the ResNet-20 model RNS-CKKS bootstrapping verify implemented CIFAR-10 dataset plaintext parameters. Instead replacing functions, state-of-the-art evaluate these ReLU Softmax, sufficient precision. Further, time, technique scheme in model, us an arbitrary deep encrypted data. We numerically that shows 98.43% identical results original non-encrypted The classification accuracy 92.43%±2.65%, quite close CNN (91.89%). It takes approximately 3 h inference dual Intel Xeon Platinum 8280 CPU (112 cores) 172 GB memory. believe opens possibility applying model.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Preserving Multi-party Machine Learning with Homomorphic Encryption

Privacy preserving multi-party machine learning approaches enable multiple parties to train a machine learning model from aggregate data while ensuring the privacy of their individual datasets is preserved. In this paper, we propose a privacy preserving multi-party machine learning approach based on homomorphic encryption where the machine learning algorithm of choice is deep neural networks. W...

متن کامل

Cloud Auditing: Privacy Preserving using Fully Homomorphic Encryption in TPA

Cloud computing is the future of the next generation architecture of IT solutions. Cloud provides computing resources on subscription basis over the internet. The Cloud data storage network includes a Third Party Auditor which has the power and capabilities that a client does not have. It is a trusted entity that has the access to, other than cloud and check on the exposed risk involved in clou...

متن کامل

Privacy Preserving using Homomorphic Encryption

In the recent time, privacy preserving has been studied extensively, because of the extensive explosion of sensitive information. Privacy preserving is one of the important areas that aim to provide security for secret information from unsolicited or unsanctioned disclosure. This has triggered the development of much privacy preserving technique using encryption algorithm. This work will presen...

متن کامل

Privacy preserving biometrics using partially homomorphic encryption

We will look into privacy preserving biometrics using the example of a fingerprint reader and partially homomorphic encryption. Therefore we will cover the basics necessary to understand the discussed subject, partially homomorphic encryption and fingerprint based authentication, as well as showing a concrete protocol and its implications on performance and security of the system. While securit...

متن کامل

Privacy preserving record linkage using homomorphic encryption

The bloom filter method for privacy preserving record linkage [24] has been shown to be both efficient, and provide equivalent linkage quality to that achievable with unencoded identifiers [23]. However in some situations, the bloom filter method may be vulnerable to frequency attacks, which could potentially leak identifying information [18]. In this paper we extend the bloom filter protocol t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2022

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2022.3159694