Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities

نویسندگان

چکیده

Abstract Classical machine learning modeling demands considerable computing power for internal calculations and training with big data in a reasonable amount of time. In recent years, clouds provide services to facilitate this process, but it introduces new security threats breaches. Modern encryption techniques ensure are considered as the best option protect stored transit from an unauthorized third-party. However, decryption process is necessary when must be processed or analyzed, falling into initial problem vulnerability. Fully Homomorphic Encryption (FHE) holy grail cryptography. It allows non-trustworthy third-party resource encrypted information without disclosing confidential data. paper, we analyze fundamental concepts FHE, practical implementations, state-of-the-art approaches, limitations, advantages, disadvantages, potential applications, development tools focusing on neural networks. FHE demonstrates remarkable progress. current literature homomorphic networks almost exclusively addressed by practitioners looking suitable implementations. still lacks comprehensive more thorough reviews. We focus privacy-preserving cryptosystems targeted at identifying solutions, open issues, challenges, opportunities, research directions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Preserving using Homomorphic Encryption

In the recent time, privacy preserving has been studied extensively, because of the extensive explosion of sensitive information. Privacy preserving is one of the important areas that aim to provide security for secret information from unsolicited or unsanctioned disclosure. This has triggered the development of much privacy preserving technique using encryption algorithm. This work will presen...

متن کامل

Privacy preserving biometrics using partially homomorphic encryption

We will look into privacy preserving biometrics using the example of a fingerprint reader and partially homomorphic encryption. Therefore we will cover the basics necessary to understand the discussed subject, partially homomorphic encryption and fingerprint based authentication, as well as showing a concrete protocol and its implications on performance and security of the system. While securit...

متن کامل

Privacy preserving record linkage using homomorphic encryption

The bloom filter method for privacy preserving record linkage [24] has been shown to be both efficient, and provide equivalent linkage quality to that achievable with unencoded identifiers [23]. However in some situations, the bloom filter method may be vulnerable to frequency attacks, which could potentially leak identifying information [18]. In this paper we extend the bloom filter protocol t...

متن کامل

A Privacy-Preserving GWAS Computation with Homomorphic Encryption

The continuous decline in the cost of DNA sequencing has contributed both positive and negative feelings in the academia and research community. It has now become possible to harvest large amounts of genetic data, which researches believe their study will help improve preventive and personalised healthcare, better understanding of diseases and response to treatments. However, there are more inf...

متن کامل

Privacy-Preserving Ridge Regression with only Linearly-Homomorphic Encryption

Linear regression with 2-norm regularization (i.e., ridge regression) is an important statistical technique that models the relationship between some explanatory values and an outcome value using a linear function. In many applications (e.g., predictive modelling in personalized health-care), these values represent sensitive data owned by several different parties who are unwilling to share the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Peer-to-peer Networking and Applications

سال: 2021

ISSN: ['1936-6442', '1936-6450']

DOI: https://doi.org/10.1007/s12083-021-01076-8