Homo-ELM: fully homomorphic extreme learning machine

Extreme learning machine (ELM) as a machine learning method has been successfully applied to many classification problems. However, when applying ELM to classification tasks on the encrypted data in cloud, the classification performance is extremely low. Due to the data encryption, ELM is hard to extract informative features from the encrypted data for correct classification. Moreover, the trained neural network is un-protected on the cloud environments, that makes cloud service highly risky to the attackers. In this paper, we propose a novel fully homomorphic ELM (Homo-ELM), which makes cloud searching tasks under a fully protected environment without compromising the privacy of users. To demonstrate the effectiveness of our approach, we conduct a comprehensive experiment on both cloud and local environments. The experiment results show that Homo-ELM can achieve high accuracy on the local environments as well as cloud environments than other machine learning methods.

[1]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[2]  Qiangfu Zhao,et al.  An ELM-Based Privacy Preserving Protocol for Implementing Aware Agents , 2017, 2017 3rd IEEE International Conference on Cybernetics (CYBCON).

[3]  Xia Liu,et al.  Is Extreme Learning Machine Feasible? A Theoretical Assessment (Part I) , 2015, IEEE Trans. Neural Networks Learn. Syst..

[4]  Qiangfu Zhao,et al.  An ELM-based privacy preserving protocol for cloud systems , 2016, 2016 IEEE Symposium Series on Computational Intelligence (SSCI).

[5]  Narasimhan Sundararajan,et al.  Online Sequential Fuzzy Extreme Learning Machine for Function Approximation and Classification Problems , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[6]  Wenfen Liu,et al.  Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption , 2018, IEEE Transactions on Cloud Computing.

[7]  Craig Gentry,et al.  (Leveled) Fully Homomorphic Encryption without Bootstrapping , 2014, ACM Trans. Comput. Theory.

[8]  Cong Wang,et al.  GELU-Net: A Globally Encrypted, Locally Unencrypted Deep Neural Network for Privacy-Preserved Learning , 2018, IJCAI.

[9]  Ali Miri,et al.  Privacy-preserving back-propagation and extreme learning machine algorithms , 2012, Data Knowl. Eng..

[10]  Fevzullah Temurtas,et al.  A Study on Neural Networks Using Taylor Series Expansion of Sigmoid Activation Function , 2004, ICCSA.

[11]  Yuansong Qiao,et al.  Chaotic Searchable Encryption for Mobile Cloud Storage , 2018, IEEE Transactions on Cloud Computing.

[12]  Guang-Bin Huang,et al.  ELM based smile detection using Distance Vector , 2018, Pattern Recognit..

[13]  Ran Wang,et al.  Noniterative Deep Learning: Incorporating Restricted Boltzmann Machine Into Multilayer Random Weight Neural Networks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[14]  Jacques Stern,et al.  A new public key cryptosystem based on higher residues , 1998, CCS '98.

[15]  Hai-Jun Rong,et al.  Aircraft recognition using modular extreme learning machine , 2014, Neurocomputing.

[16]  Ran Wang,et al.  Discovering the Relationship Between Generalization and Uncertainty by Incorporating Complexity of Classification , 2018, IEEE Transactions on Cybernetics.

[17]  SchmidhuberJürgen Deep learning in neural networks , 2015 .

[18]  Fuchun Sun,et al.  Efficient and Rapid Machine Learning Algorithms for Big Data and Dynamic Varying Systems , 2017, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[19]  Shiho Moriai,et al.  Privacy preserving extreme learning machine using additively homomorphic encryption , 2017, 2017 IEEE Symposium Series on Computational Intelligence (SSCI).

[20]  Craig Gentry,et al.  Fully Homomorphic Encryption over the Integers , 2010, EUROCRYPT.

[21]  Shiho Moriai,et al.  Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[22]  Jürgen Schmidhuber,et al.  Deep learning in neural networks: An overview , 2014, Neural Networks.

[23]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[24]  Victor C. S. Lee,et al.  TaxiRec: Recommending Road Clusters to Taxi Drivers Using Ranking-Based Extreme Learning Machines , 2018, IEEE Trans. Knowl. Data Eng..

[25]  Hongming Zhou,et al.  Extreme Learning Machine for Regression and Multiclass Classification , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[26]  Chi-Man Vong,et al.  Encrypted image classification based on multilayer extreme learning machine , 2017, Multidimens. Syst. Signal Process..

[27]  Sam Kwong,et al.  Incorporating Diversity and Informativeness in Multiple-Instance Active Learning , 2017, IEEE Transactions on Fuzzy Systems.

[28]  Geoffrey E. Hinton,et al.  Deep Learning , 2015, Nature.

[29]  Chaouki T. Abdallah,et al.  Probabilistic Optimization of Resource Distribution and Encryption for Data Storage in the Cloud , 2018, IEEE Transactions on Cloud Computing.

[30]  Chin-Laung Lei,et al.  Audit-Free Cloud Storage via Deniable Attribute-Based Encryption , 2018, IEEE Transactions on Cloud Computing.

[31]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[32]  Ferhat Özgür Çatak,et al.  CPP-ELM: Cryptographically Privacy-Preserving Extreme Learning Machine for Cloud Systems , 2018, Int. J. Comput. Intell. Syst..

[33]  Andreas Peter,et al.  A Survey of Provably Secure Searchable Encryption , 2014, ACM Comput. Surv..

[34]  Lily Rachmawati,et al.  Exploiting AIS Data for Intelligent Maritime Navigation: A Comprehensive Survey From Data to Methodology , 2016, IEEE Transactions on Intelligent Transportation Systems.

[35]  Xizhao Wang,et al.  A review on neural networks with random weights , 2018, Neurocomputing.

[36]  Chee Kheong Siew,et al.  Extreme learning machine: Theory and applications , 2006, Neurocomputing.

[37]  Qiang Yang,et al.  A Survey on Transfer Learning , 2010, IEEE Transactions on Knowledge and Data Engineering.

[38]  Amaury Lendasse,et al.  Advances in extreme learning machines (ELM2014) , 2011, Neurocomputing.

[39]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.