Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy 2019
DOI: 10.1145/3292006.3300044
|View full text |Cite
|
Sign up to set email alerts
|

Deep Neural Networks Classification over Encrypted Data

Abstract: Machine learning algorithms based on deep neural networks have achieved remarkable results and are being extensively used in different domains. However, the machine learning algorithms requires access to raw data which is often privacy sensitive. To address this issue, we develop new techniques to provide solutions for running deep neural networks over encrypted data. In this paper, we develop new techniques to adopt deep neural networks within the practical limitation of current homomorphic encryption schemes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
174
1
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 143 publications
(177 citation statements)
references
References 18 publications
1
174
1
1
Order By: Relevance
“…As ciphertext data are centralized to one single entity, it does not imply any communication bottleneck, as compared to SMPC. Although early work on HE [23] involves highly intensive computations, making the method infeasible for the machine learning algorithm, the recent subsequent schemes gave rise to a series of privacy-preserving machine learning solutions [24][25][26][27][28][29].…”
Section: Privacy-preserving Techniques For Machine Learningmentioning
confidence: 99%
“…As ciphertext data are centralized to one single entity, it does not imply any communication bottleneck, as compared to SMPC. Although early work on HE [23] involves highly intensive computations, making the method infeasible for the machine learning algorithm, the recent subsequent schemes gave rise to a series of privacy-preserving machine learning solutions [24][25][26][27][28][29].…”
Section: Privacy-preserving Techniques For Machine Learningmentioning
confidence: 99%
“…Thus, such additive homomorphic encryption-based methods in [1,2] are only applicable to simple machine learning algorithms such as decision tree and naive bayes. In Hesamifard's work [3],the fully homomorphic encryption is applied to perform deep neural networks over encrypted data, where the non-linear activation functions are approximated by polynomials. In secure multi-party computing (SMC), multiple parties collaborate to compute functions without revealing plain-text to other parties.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Several tools and methods have been developed to preserve the privacy in machine learning, such as homomorphic encryption [1][2][3], secure multi-party computing [4,5], differential privacy (DP) [6][7][8][9][10], compressive privacy [11][12][13][14][15]. Differential privacy-based methods aim at preventing leaking individual information caused by queries.…”
Section: Introductionmentioning
confidence: 99%
“…To tackle the challenge of training a model over encrypted data in a simpler manner, in this paper, we propose a novel [3], [9], [10], [11], [12], [13], [14], [15] • • Covers All Homomorphic Encryption (HE) [2] •…”
Section: Introductionmentioning
confidence: 99%