Literature DB >> 31404438

Secure Outsourced Matrix Computation and Application to Neural Networks.

Xiaoqian Jiang1, Miran Kim1, Kristin Lauter2, Yongsoo Song3.   

Abstract

Homomorphic Encryption (HE) is a powerful cryptographic primitive to address privacy and security issues in outsourcing computation on sensitive data to an untrusted computation environment. Comparing to secure Multi-Party Computation (MPC), HE has advantages in supporting non-interactive operations and saving on communication costs. However, it has not come up with an optimal solution for modern learning frameworks, partially due to a lack of efficient matrix computation mechanisms. In this work, we present a practical solution to encrypt a matrix homomorphically and perform arithmetic operations on encrypted matrices. Our solution includes a novel matrix encoding method and an efficient evaluation strategy for basic matrix operations such as addition, multiplication, and transposition. We also explain how to encrypt more than one matrix in a single ciphertext, yielding better amortized performance. Our solution is generic in the sense that it can be applied to most of the existing HE schemes. It also achieves reasonable performance for practical use; for example, our implementation takes 9.21 seconds to multiply two encrypted square matrices of order 64 and 2.56 seconds to transpose a square matrix of order 64. Our secure matrix computation mechanism has a wide applicability to our new framework E2DM, which stands for encrypted data and encrypted model. To the best of our knowledge, this is the first work that supports secure evaluation of the prediction phase based on both encrypted data and encrypted model, whereas previous work only supported applying a plain model to encrypted data. As a benchmark, we report an experimental result to classify handwritten images using convolutional neural networks (CNN). Our implementation on the MNIST dataset takes 28.59 seconds to compute ten likelihoods of 64 input images simultaneously, yielding an amortized rate of 0.45 seconds per image.

Entities:  

Keywords:  Homomorphic encryption; machine learning; matrix computation; neural networks

Year:  2018        PMID: 31404438      PMCID: PMC6689419          DOI: 10.1145/3243734.3243837

Source DB:  PubMed          Journal:  Conf Comput Commun Secur        ISSN: 1543-7221


  5 in total

Review 1.  Deep learning for healthcare: review, opportunities and challenges.

Authors:  Riccardo Miotto; Fei Wang; Shuang Wang; Xiaoqian Jiang; Joel T Dudley
Journal:  Brief Bioinform       Date:  2018-11-27       Impact factor: 11.622

2.  A community assessment of privacy preserving techniques for human genomes.

Authors:  Xiaoqian Jiang; Yongan Zhao; Xiaofeng Wang; Bradley Malin; Shuang Wang; Lucila Ohno-Machado; Haixu Tang
Journal:  BMC Med Inform Decis Mak       Date:  2014-12-08       Impact factor: 2.796

3.  Secure Logistic Regression Based on Homomorphic Encryption: Design and Evaluation.

Authors:  Miran Kim; Yongsoo Song; Shuang Wang; Yuhou Xia; Xiaoqian Jiang
Journal:  JMIR Med Inform       Date:  2018-04-17

4.  Private genome analysis through homomorphic encryption.

Authors:  Miran Kim; Kristin Lauter
Journal:  BMC Med Inform Decis Mak       Date:  2015-12-21       Impact factor: 2.796

Review 5.  A community effort to protect genomic data sharing, collaboration and outsourcing.

Authors:  Shuang Wang; Xiaoqian Jiang; Haixu Tang; Xiaofeng Wang; Diyue Bu; Knox Carey; Stephanie Om Dyke; Dov Fox; Chao Jiang; Kristin Lauter; Bradley Malin; Heidi Sofia; Amalio Telenti; Lei Wang; Wenhao Wang; Lucila Ohno-Machado
Journal:  NPJ Genom Med       Date:  2017-10-27       Impact factor: 8.617

  5 in total
  5 in total

1.  On Outsourcing Artificial Neural Network Learning of Privacy-Sensitive Medical Data to the Cloud.

Authors:  Dimitrios Melissourgos; Hanzhi Gao; Chaoyi Ma; Shigang Chen; Samuel S Wu
Journal:  Proc Int Conf Tools Artif Intell TAI       Date:  2021-12-21

2.  cuSCNN: A Secure and Batch-Processing Framework for Privacy-Preserving Convolutional Neural Network Prediction on GPU.

Authors:  Yanan Bai; Quanliang Liu; Wenyuan Wu; Yong Feng
Journal:  Front Comput Neurosci       Date:  2021-12-23       Impact factor: 2.380

3.  Confidential machine learning on untrusted platforms: a survey.

Authors:  Sharma Sagar; Chen Keke
Journal:  Cybersecur (Singap)       Date:  2021-09-01

4.  Privacy-preserving breast cancer recurrence prediction based on homomorphic encryption and secure two party computation.

Authors:  Yongha Son; Kyoohyung Han; Yong Seok Lee; Jonghan Yu; Young-Hyuck Im; Soo-Yong Shin
Journal:  PLoS One       Date:  2021-12-20       Impact factor: 3.240

5.  Secure deep learning for distributed data against maliciouscentral server.

Authors:  Le Trieu Phong
Journal:  PLoS One       Date:  2022-08-01       Impact factor: 3.752

  5 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.