Enhancing Cloud Security through Efficient Polynomial Approximations for Homomorphic Evaluation of Neural Network Activation Functions

被引:0
|
作者
Pulido-Gaytani, Bernardo [1 ]
Tchernykh, Andrei [1 ,4 ]
Babenko, Mikhail [2 ,4 ]
Cortes-Mendoza, Jorge M. [3 ]
Gonzalez-Velez, Horacio [3 ]
Avetisyan, Arutyun [4 ]
机构
[1] CICESE Res Ctr, Ensenada, Baja California, Mexico
[2] North Caucasus Fed Univ, Stavropol, Russia
[3] Natl Coll Ireland, Dublin, Ireland
[4] RAS, Inst Syst Programming, Moscow, Russia
关键词
cloud security; homomorphic encryption; neural networks; polynomial approximation; privacy-preserving; RELIABILITY;
D O I
10.1109/CCGridW63211.2024.00011
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Current security cloud practices can successfully protect stored data and data in transit, but they do not keep the same protection during data processing. The data value extraction requires decryption, creating critical exposure points. As a result, privacy-preserving techniques are emerging as a crucial consideration in cloud computing. The homomorphic processing of machine learning models in the cloud represents a central challenge. The activation function is fundamental in constructing a privacy-preserving Neural Network (NN) with Homomorphic Encryption (HE). Standard activation functions require operations not supported by HE, so it is necessary to find cryptographically compatible replacement functions to operate over encrypted data. Multiple approaches address the limitation of function compatibility with polynomial approximation. These functions should exhibit a trade-off between complexity and accuracy, limiting the efficiency of conventional approximation techniques. The current literature on polynomial approximation of NN activation functions still lacks a thorough review. In this paper, we comprehensively review the standard activation functions of modern NN models and current polynomial approximation approaches. We highlight fundamental features to consider in the activation function and the approximation technique to operate over encrypted data.
引用
收藏
页码:42 / 49
页数:8
相关论文
共 32 条
  • [21] A Large-Scale Study of Activation Functions in Modern Deep Neural Network Architectures for Efficient Convergence
    Rasamoelina, Andrinandrasana David
    Cik, Ivan
    Sincak, Peter
    Mach, Marian
    Hruska, Lukas
    INTELIGENCIA ARTIFICIAL-IBEROAMERICAN JOURNAL OF ARTIFICIAL INTELLIGENCE, 2022, 25 (70): : 95 - 109
  • [22] Enhancing project evaluation and review technique simulation through artificial neural network-based input modeling
    Lu, M
    JOURNAL OF CONSTRUCTION ENGINEERING AND MANAGEMENT-ASCE, 2002, 128 (05): : 438 - 445
  • [23] Shapes of non-monotonous activation functions in chaotic neural network associative memory model and its evaluation
    Obayashi, Masanao
    Omiya, Rie
    Kuremoto, Takashi
    Kobayashi, Kunikazu
    IEEJ Transactions on Electronics, Information and Systems, 2006, 126 (11) : 1401 - 1405
  • [24] Adaptive activation Functions with Deep Kronecker Neural Network optimized with Bear Smell Search Algorithm for preventing MANET Cyber security attacks
    Shanmugham, E. V. R. M. Kalaimani
    Dhatchnamurthy, Saravanan
    Pakkiri, Prabbu Sankar
    Garg, Neha
    NETWORK-COMPUTATION IN NEURAL SYSTEMS, 2024,
  • [25] Dynamic network security leveraging efficient CoviNet with granger causality-inspired graph neural networks for data compression in cloud IoT Devices
    Begum, M. Baritha
    Yogeshwaran, A.
    Nagarajan, N. R.
    Rajalakshmi, P.
    KNOWLEDGE-BASED SYSTEMS, 2025, 309
  • [26] Performance evaluation of machine learning algorithms and impact of activation functions in artificial neural network classifier for bearing fault diagnosis
    Rayjade, Ganesh
    Bhagure, Amit
    Kushare, Prashant B.
    Bhandare, Ramesh
    Matsagar, Vilas
    Chaudhary, Ashitosh
    JOURNAL OF VIBRATION AND CONTROL, 2024,
  • [27] Enhancing signal-to-noise ratio in active laser imaging under cloud and fog conditions through combined matched filtering and neural network
    Cui, Chengshuai
    Zhang, Zijing
    Wang, Hongyang
    Zhao, Yuan
    FRONTIERS IN PHYSICS, 2024, 12
  • [28] Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security
    V. Balamurugan
    R. Karthikeyan
    B. Sundaravadivazhagan
    Robin Cyriac
    Wireless Networks, 2023, 29 : 523 - 537
  • [29] Enhanced Elman spike neural network based fractional order discrete Tchebyshev encryption fostered big data analytical method for enhancing cloud data security
    Balamurugan, V.
    Karthikeyan, R.
    Sundaravadivazhagan, B.
    Cyriac, Robin
    WIRELESS NETWORKS, 2023, 29 (02) : 523 - 537
  • [30] Enhancing postural balance assessment through neural network-based lower-limb muscle strength evaluation with reduced markers
    Chen, Jianhan
    Huang, Yueshan
    Li, Runfeng
    Wu, Hancong
    Ke, Jin
    Liu, Chengrang
    Lao, Yonghua
    COMPUTER METHODS IN BIOMECHANICS AND BIOMEDICAL ENGINEERING, 2024,