Convolutional neural network model over encrypted data based on functional encryption

被引:0
|
作者
Wang C. [1 ]
Li J. [1 ]
Xu J. [1 ]
机构
[1] Software College, Northeastern University, Shenyang
来源
基金
中国国家自然科学基金;
关键词
convolutional neural network; encrypted data; functional encryption; privacy protection;
D O I
10.11959/j.issn.1000-436x.2024050
中图分类号
学科分类号
摘要
Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models. However, the computational and communication overhead caused by the above schemes would reduce system efficiency. Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption. Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs. Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer. Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels. Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security. © 2024 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:50 / 65
页数:15
相关论文
共 33 条
  • [1] KUMAR R, JOSHI S, DWIVEDI A., CNN-SSPSO: a hybrid and optimized CNN approach for peripheral blood cell image recognition and classification, International Journal of Pattern Recognition and Artificial Intelligence, 35, 5, (2021)
  • [2] PRASETYO M L, WIBOWO A T, RIDWAN M, Et al., Face recognition using the convolutional neural network for barrier gate system, International Journal of Interactive Mobile Technologies (IJIM), 15, 10, pp. 138-153, (2021)
  • [3] WAN C X, LI B., Financial causal sentence recognition based on BERT-CNN text classification, The Journal of Supercomputing, 78, 5, pp. 6503-6527, (2022)
  • [4] YANG X A, CHEN J, HE K, Et al., Efficient privacy-preserving inference outsourcing for convolutional neural networks, IEEE Transactions on Information Forensics and Security, 18, pp. 4815-4829, (2023)
  • [5] FALCETTA A, ROVERI M., Privacy-preserving deep learning with homomorphic encryption: an introduction, IEEE Computational Intelligence Magazine, 17, 3, pp. 14-25, (2022)
  • [6] HUANG K, LIU X M, FU S J, Et al., A lightweight privacy-preserving CNN feature extraction framework for mobile sensing, IEEE Transactions on Dependable and Secure Computing, 18, 3, pp. 1441-1455, (2021)
  • [7] ZHU Z W, HUANG R W., Secure multi-party computing protocol based on efficient fully homomorphic encryption, Computer Science, 49, 11, pp. 345-350, (2022)
  • [8] ABADI M, CHU A, GOODFELLOW I, Et al., Deep learning with differential privacy, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 308-318, (2016)
  • [9] HUANG X X, GUAN J, ZHANG B, Et al., Differentially private convolutional neural networks with adaptive gradient descent, Proceedings of the 2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC), pp. 642-648, (2019)
  • [10] ALMUTAIRI N, COENEN F, DURES K., K-means clustering using homomorphic encryption and an updatable distance matrix: secure third party data clustering with limited data owner interaction, Proceedings of the International Conference on Big Data Analytics and Knowledge Discovery, pp. 274-285, (2017)