Privacy-preserving back-propagation and extreme learning machine algorithms

Neural network systems are highly capable of deriving knowledge from complex data, and they are used to extract patterns and trends which are otherwise hidden in many applications. Preserving the privacy of sensitive data and individuals' information is a major challenge in many of these applications. One of the most popular algorithms in neural network learning systems is the back-propagation (BP) algorithm, which is designed for single-layer and multi-layer models and can be applied to continuous data and differentiable activation functions. Another recently introduced learning technique is the extreme learning machine (ELM) algorithm. Although it works only on single-layer models, ELM can out-perform the BP algorithm by reducing the communication required between parties in the learning phase. In this paper, we present new privacy-preserving protocols for both the BP and ELM algorithms when data is horizontally and vertically partitioned among several parties. These new protocols, which preserve the privacy of both the input data and the constructed learning model, can be applied to online incoming records and/or batch learning. Furthermore, the final model is securely shared among all parties, who can use it jointly to predict the corresponding output for their target data.

[1]  J. Nadal,et al.  Learning in feedforward layered networks: the tiling algorithm , 1989 .

[2]  Benjamin C. M. Fung,et al.  Privacy-preserving data publishing for cluster analysis , 2009, Data Knowl. Eng..

[3]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[4]  William H. Beyer,et al.  CRC standard mathematical tables , 1976 .

[5]  Li Wan,et al.  Privacy-preservation for gradient descent methods , 2007, KDD '07.

[6]  Stefanos Gritzalis,et al.  Accurate and large-scale privacy-preserving data mining using the election paradigm , 2009, Data Knowl. Eng..

[7]  Jin-Long Wang,et al.  An Incremental Algorithm for Mining Privacy-Preserving Frequent Itemsets , 2006, 2006 International Conference on Machine Learning and Cybernetics.

[8]  Sheng Zhong,et al.  Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data , 2011, Neural Computing and Applications.

[9]  Gregory F. Cooper,et al.  The ALARM Monitoring System: A Case Study with two Probabilistic Inference Techniques for Belief Networks , 1989, AIME.

[10]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[11]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[12]  Chris Clifton,et al.  Privacy-Preserving Decision Trees over Vertically Partitioned Data , 2005, DBSec.

[13]  Stephen I. Gallant,et al.  Neural network learning and expert systems , 1993 .

[14]  Moni Naor,et al.  Oblivious transfer and polynomial evaluation , 1999, STOC '99.

[15]  D. Serre Matrices: Theory and Applications , 2002 .

[16]  Murat Kantarcioglu,et al.  Formal anonymity models for efficient privacy-preserving joins , 2009, Data Knowl. Eng..

[17]  Michael Georgiopoulos,et al.  A Privacy Preserving Probabilistic Neural Network for Horizontally Partitioned Databases , 2007, 2007 International Joint Conference on Neural Networks.

[18]  Mauro Barni,et al.  A privacy-preserving protocol for neural-network-based computation , 2006, MM&Sec '06.

[19]  Luis Orozco-Barbosa,et al.  Privacy Preserving k-Means Clustering in Multi-Party Environment , 2007, SECRYPT.

[20]  William E. Winkler,et al.  Multiplicative Noise for Masking Continuous Data , 2001 .

[21]  Chi-Jen Lu,et al.  Oblivious polynomial evaluation and oblivious neural learning , 2005, Theor. Comput. Sci..

[22]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2000, Journal of Cryptology.

[23]  K. S. Banerjee Generalized Inverse of Matrices and Its Applications , 1973 .

[24]  Philip S. Yu,et al.  Privacy-Preserving Singular Value Decomposition , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[25]  Sheng Zhong,et al.  Privacy-Preserving Backpropagation Neural Network Learning , 2009, IEEE Transactions on Neural Networks.

[26]  Ali Miri,et al.  Privacy preserving ID3 using Gini Index over horizontally partitioned data , 2008, 2008 IEEE/ACS International Conference on Computer Systems and Applications.

[27]  Ron Kohavi,et al.  Scaling Up the Accuracy of Naive-Bayes Classifiers: A Decision-Tree Hybrid , 1996, KDD.

[28]  Chee Kheong Siew,et al.  Extreme learning machine: Theory and applications , 2006, Neurocomputing.

[29]  Philip S. Yu,et al.  On static and dynamic methods for condensation-based privacy-preserving data mining , 2008, TODS.

[30]  Yücel Saygin,et al.  Distributed privacy preserving k-means clustering with additive secret sharing , 2008, PAIS '08.

[31]  Chris Clifton,et al.  Defining Privacy for Data Mining , 2002 .

[32]  I.S. Isa,et al.  Suitable MLP Network Activation Functions for Breast Cancer and Thyroid Disease Detection , 2010, 2010 Second International Conference on Computational Intelligence, Modelling and Simulation.

[33]  Bart Goethals,et al.  On Private Scalar Product Computation for Privacy-Preserving Data Mining , 2004, ICISC.

[34]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[35]  Yücel Saygin,et al.  Privacy preserving clustering on horizontally partitioned data , 2007, Data Knowl. Eng..

[36]  Yücel Saygin,et al.  Recent advances in preserving privacy when mining data , 2008, Data Knowl. Eng..

[37]  Christian Lebiere,et al.  The Cascade-Correlation Learning Architecture , 1989, NIPS.

[38]  Stephen I. Gallant,et al.  Perceptron-based learning algorithms , 1990, IEEE Trans. Neural Networks.

[39]  Chris Clifton,et al.  A secure distributed framework for achieving k-anonymity , 2006, The VLDB Journal.

[40]  Taneli Mielikäinen,et al.  Cryptographically private support vector machines , 2006, KDD '06.

[41]  Ran Canetti,et al.  Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.

[42]  Chris Clifton,et al.  Privacy-preserving distributed mining of association rules on horizontally partitioned data , 2004, IEEE Transactions on Knowledge and Data Engineering.

[43]  Li Guang,et al.  A Privacy Preserving Neural Network Learning Algorithm for Horizontally Partitioned Databases , 2010 .

[44]  John Hawkins,et al.  The applicability of recurrent neural networks for biological sequence analysis , 2005, IEEE/ACM Transactions on Computational Biology and Bioinformatics.

[45]  Andrew Beng Jin Teoh,et al.  Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[46]  Mauro Barni,et al.  Oblivious Neural Network Computing via Homomorphic Encryption , 2007, EURASIP J. Inf. Secur..

[47]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 2, Basic Applications , 2004 .

[48]  Xin Yao,et al.  A New Constructive Algorithm for Architectural and Functional Adaptation of Artificial Neural Networks , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[49]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[50]  Jaideep Vaidya,et al.  Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data , 2006, SAC.

[51]  Li Liu,et al.  The applicability of the perturbation based privacy preserving data mining for real-world data , 2008, Data Knowl. Eng..

[52]  Rakesh Agrawal,et al.  Privacy-preserving data mining , 2000, SIGMOD 2000.

[53]  Stan Matwin,et al.  Privacy-Preserving Collaborative Association Rule Mining , 2005, DBSec.

[54]  David W. Lewis,et al.  Matrix theory , 1991 .

[55]  Murat Kantarcioglu,et al.  Privacy-preserving data mining in the malicious model , 2008, Int. J. Inf. Comput. Secur..

[56]  David J. Spiegelhalter,et al.  Local computations with probabilities on graphical structures and their application to expert systems , 1990 .

[57]  A. Miri,et al.  Privacy-preserving protocols for perceptron learning algorithm in neural networks , 2008, 2008 4th International IEEE Conference Intelligent Systems.

[58]  Shigenobu Kobayashi,et al.  Large-scale k-means clustering with user-centric privacy-preservation , 2010, Knowledge and Information Systems.

[59]  Shangteng Huang,et al.  Data privacy protection in multi-party clustering , 2008, Data Knowl. Eng..