Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 575-580.doi: 10.11896/jsjkx.211100155

• Information Security • Previous Articles     Next Articles

Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving

WANG Jian   

  1. College of Computer and Information Engineering,Henan University of Economics and Law,Zhengzhou 450000,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:WANG Jian,born in 1981,Ph.D.His main research interests include privacy preserving and data protection.
  • Supported by:
    Science and Technology Research Project of Henan Provincial Department of Science and Technology(222102210289).

Abstract: Back-propagation neural network learning algorithms based on privacy preserving are widely used in medical diagnosis,bioinformatics,intrusion detection,homeland security and other fields.The common of these applications is that all of them need to extract patterns and predict trends from a large number of complex data.In these applications,how to protect the privacy of sensitive data and personal information from disclosure is an important issue.At present,the vast majority of existing back-propagation neural network learning algorithms don't consider how to protect the data privacy in the process of learning.This paper proposes a back propagation neural network algorithm based on privacy-preserving,which is suitable for horizontally partitioned data.In the construction process of neural networks,it is need to compute network weight vector for the training sample set.To ensure the private information of neural network learning model can not be leaked,the weight vector will be assigned to all participants,so that each participant owns a part of private values of weight vector.In the calculation of neurons,we use secure multiparty computation,thus ensuring the middle and final values of the neural network weight vector are secure and will not be leaked.Finally,the constructed learning model will be securely shared by all participants,and each participant can use the model to predict the corresponding output for their respective target data.Experimental results show that the proposed algorithm has advantages over the traditional non-privacy protection algorithm in execution time and accuracy error.

Key words: Neural network, Privacy leakage, Privacy preserving, Secure multiparty computation

CLC Number: 

  • TP183
[1] WANG J,WANG L.A new anonymity-based protocol preserving privacy based cloud environment[J].Computer Modelling and New Technologies,2014,18(9):139-144.
[2] WILAMOWSKI B M.Neural network architectures and learning algorithms[J].Industrial Electronics Magazine,2009,3(4):56-63.
[3] FRYE R C,RIETMAN E A,WONG C C.Back-propagationlearning and nonidealities in analog neural network hardware[J].IEEE Trans on Neural Networks,1991,2(1):110-117.
[4] BARNI M,ORLANDI C,PIVA A.A privacy-preserving protocol for neural-network-based computation[C]//Proceedings of ACM MM&Sec'06.Geneva,Switzerland:ACM,2006:146-151.
[5] WAN L,NG W K,HAN S,et al.Privacy-preservation for gradient descent methods[C]//Proceedings of ACM SIGKDD' 07.New York:ACM,2007:775-783.
[6] SECRETAN J,GEORGIOPOULOS M,CASTRO J.A privacy preserving probabilistic neural network for horizontally partitioned databases[C]//Proceedings of IEEE IJCNN'07.Orlando,FL:IEEE,2007:1554-1559.
[7] CRAVEN M P,CURTIS K M,HAYES-GILL B R.Frequency division multiplexing in analogue neural network[J].Electro-nics Letters,1991,27(11):918-920.
[8] HUANG L,FENG D G,LIAN Y F,et al.Artificial-neural-network-based DDoS defense effectiveness evaluation[J].Journal of Computer Research and Development,2013,50(10):2100-2108.
[9] KODA M.Neural network learning based on stochastic sensitivity analysis[J].IEEE Trans on Cybernetics,1997,27(1):132-135.
[10] LI D L,LU D T,KONG X Y,et al.Implicit surfaces based on BP neural networks[J].Journal of Computer Research and Development,2007,44(3):467-472.
[11] ABHISHEK K,KUMAR A,RANJAN R,et al.A rainfall prediction model using artificial neural network[C]//Proceedings of IEEE ICSGRC'12.Shah Alam,Selangor:IEEE,2012:82-87.
[12] PASCAL P.Public-key cryptosystems based on composite degree residuosity classes[J].Lecture Notes in Computer Scien-ce,1999,1592(1):223-238.
[13] DHAKAR R S,GUPTA A K,SHARMA P.Modified RSA encryption algorithm[C]//Proceedings of IEEE ACCT'12.Rohtak,Haryana:IEEE,2012:426-429.
[14] ORLANDI C,PIVA A,BARNI M.Oblivious neural networkcomputing via homomorphic encryption[J].Journal of Information Security,2007,20(7):105-110.
[15] SAMET S,MIRI A.Privacy preserving ID3 using gini index over horizontally partitioned data[C]//Proceedings of IEEE AICCSA'08.Doha:IEEE,2008:645-651.
[16] CANETTI R.Security and composition of multiparty crypto-graphic protocols[J].Journal of Cryptology,2000,13(l):143-202.
[17] RANE S,SUN W,VETRO A.Secure function evaluation based on secret sharing and homomorphic encryption[C]//Procee-dings of IEEE CCAC'09.Monticello,IL:IEEE,2009:827-834.
[18] LINDA O,VOLLMER T,MANIC M.Neural network based intrusion detection system for critical infrastructures[C]//Proceedings of IEEE IJCNN'09.Atlanta,GA:IEEE,2009:1827-1834.
[19] RAFIQ M A,ROY N K,GHOSH B C.Three algorithms for learning artificial neural network:A comparison for induction motor flux estimation[C]//Proceedings of IEEE ICCIT '09.Dhaka:IEEE,2009:355-360.
[20] ADHIKARI S P,HYONGSUK K,BUDHATHOKI R K.A circuit-based learning architecture for multilayer neural networks with memristor bridge synapses[J].IEEE Transaction on Circuits and Systems,2015,62(1):215-223.
[21] SHEIKH S.Arabic-urdu script recognition through mouse:An implementation using artificial neural network[C]//Proceedings of IEEE ITNG'10.Las Vegas,NV:IEEE,2010:307-310.
[22] STEPHEN I,GALLANT.Neural network learning and expert systems [M].Massachusetts:MIT Press,1993.
[23] ZHAN J,MATWIN S.A crypto-based approach to privacy-preserving collaborative data mining[C]//Proceedings of IEEE ICDM'06.Hong Kong:IEEE,2006:546-550.
[1] ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63.
[2] ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161.
[3] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[4] TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305.
[5] WANG Run-an, ZOU Zhao-nian. Query Performance Prediction Based on Physical Operation-level Models [J]. Computer Science, 2022, 49(8): 49-55.
[6] CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85.
[7] ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119.
[8] YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236.
[9] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[10] QI Xiu-xiu, WANG Jia-hao, LI Wen-xiong, ZHOU Fan. Fusion Algorithm for Matrix Completion Prediction Based on Probabilistic Meta-learning [J]. Computer Science, 2022, 49(7): 18-24.
[11] YANG Bing-xin, GUO Yan-rong, HAO Shi-jie, Hong Ri-chang. Application of Graph Neural Network Based on Data Augmentation and Model Ensemble in Depression Recognition [J]. Computer Science, 2022, 49(7): 57-63.
[12] ZHANG Ying-tao, ZHANG Jie, ZHANG Rui, ZHANG Wen-qiang. Photorealistic Style Transfer Guided by Global Information [J]. Computer Science, 2022, 49(7): 100-105.
[13] DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119.
[14] LIU Yue-hong, NIU Shao-hua, SHEN Xian-hao. Virtual Reality Video Intraframe Prediction Coding Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(7): 127-131.
[15] XU Ming-ke, ZHANG Fan. Head Fusion:A Method to Improve Accuracy and Robustness of Speech Emotion Recognition [J]. Computer Science, 2022, 49(7): 132-141.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!