Protecting Privacy of Users in Brain-Computer Interface Applications

Machine learning (ML) is revolutionizing research and industry. Many ML applications rely on the use of large amounts of personal data for training and inference. Among the most intimate exploited data sources is electroencephalogram (EEG) data, a kind of data that is so rich with information that application developers can easily gain knowledge beyond the professed scope from unprotected EEG signals, including passwords, ATM PINs, and other intimate data. The challenge we address is how to engage in meaningful ML with EEG data while protecting the privacy of users. Hence, we propose cryptographic protocols based on secure multiparty computation (SMC) to perform linear regression over EEG signals from many users in a fully privacy-preserving (PP) fashion, i.e., such that each individual’s EEG signals are not revealed to anyone else. To illustrate the potential of our secure framework, we show how it allows estimating the drowsiness of drivers from their EEG signals as would be possible in the unencrypted case, and at a very reasonable computational cost. Our solution is the first application of commodity-based SMC to EEG data, as well as the largest documented experiment of secret sharing-based SMC in general, namely, with 15 players involved in all the computations.

[1]  Rafael Dowsley,et al.  Cryptography Based on Correlated Data: Foundations and Practice , 2016 .

[2]  Xiaodong Lin,et al.  Secure Regression on Distributed Databases , 2005 .

[3]  S. Makeig,et al.  Lapses in alertness: coherence of fluctuations in performance and EEG spectrum. , 1993, Electroencephalography and clinical neurophysiology.

[4]  Christian Mühl,et al.  Guessing what ' s on your mind : Using the N 400 in Brain Computer Interfaces , 2010 .

[5]  Yoshinori Aono,et al.  Fast and Secure Linear Regression and Biometric Authentication with Security Update , 2015, IACR Cryptol. ePrint Arch..

[6]  Howard Jay Chizeck,et al.  App Stores for the Brain : Privacy and Security in Brain-Computer Interfaces , 2015, IEEE Technology and Society Magazine.

[7]  Benny Pinkas,et al.  FairplayMP: a system for secure multi-party computation , 2008, CCS.

[8]  Dan Bogdanov,et al.  Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.

[9]  Wenliang Du,et al.  Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.

[10]  Farinaz Koushanfar,et al.  Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications , 2018, IACR Cryptol. ePrint Arch..

[11]  Cuntai Guan,et al.  Brain-computer-interface-based intervention re-normalizes brain functional network topology in children with attention deficit/hyperactivity disorder , 2018, Translational Psychiatry.

[12]  Yuan-Pin Lin,et al.  Selective Transfer Learning for EEG-Based Drowsiness Detection , 2015, 2015 IEEE International Conference on Systems, Man, and Cybernetics.

[13]  Jing Wang,et al.  Predicting the brain activation pattern associated with the propositional content of a sentence: Modeling neural representations of events and states , 2017, Human brain mapping.

[14]  Bhavani M. Thuraisingham,et al.  Securing Data Analytics on SGX with Randomization , 2017, ESORICS.

[15]  Donald Beaver,et al.  Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.

[16]  Goichiro Hanaoka,et al.  Information-theoretically secure oblivious polynomial evaluation in the commodity-based model , 2014, International Journal of Information Security.

[17]  Vitaly Shmatikov,et al.  Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[18]  Jeroen van de Graaf,et al.  Unconditionally Secure, Universally Composable Privacy Preserving Linear Algebra , 2016, IEEE Transactions on Information Forensics and Security.

[19]  Jerome P. Reiter,et al.  Privacy-Preserving Analysis of Vertically Partitioned Data Using Secure Matrix Products , 2009 .

[20]  Maryam Gholami Doborjeh,et al.  Attentional Bias Pattern Recognition in Spiking Neural Networks from Spatio-Temporal EEG Data , 2018, Cognitive Computation.

[21]  Anat Paskin-Cherniavsky,et al.  On the Power of Correlated Randomness in Secure Computation , 2013, TCC.

[22]  Sarvar Patel,et al.  Practical Secure Aggregation for Privacy-Preserving Machine Learning , 2017, IACR Cryptol. ePrint Arch..

[23]  Tao Xiang,et al.  Highly Efficient Linear Regression Outsourcing to a Cloud , 2014, IEEE Transactions on Cloud Computing.

[24]  Xiaodong Lin,et al.  Privacy preserving regression modelling via distributed computation , 2004, KDD.

[25]  Anderson C. A. Nascimento,et al.  Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation , 2019, IEEE Transactions on Dependable and Secure Computing.

[26]  Mariana Raykova,et al.  Privacy-Preserving Distributed Linear Regression on High-Dimensional Data , 2017, Proc. Priv. Enhancing Technol..

[27]  Anderson C. A. Nascimento,et al.  Efficient Unconditionally Secure Comparison and Privacy Preserving Machine Learning Classification Protocols , 2015, ProvSec.

[28]  Jeroen van de Graaf,et al.  A Two-Party Protocol with Trusted Initializer for Computing the Inner Product , 2010, WISA.

[29]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[30]  Howard Jay Chizeck,et al.  App stores for the brain: Privacy & security in Brain-Computer Interfaces , 2014, 2014 IEEE International Symposium on Ethics in Science, Technology and Engineering.

[31]  Donald Beaver,et al.  Precomputing Oblivious Transfer , 1995, CRYPTO.

[32]  Martine De Cock,et al.  Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data , 2015, AISec@CCS.

[33]  Ivan Damgård,et al.  Secure Multiparty Computation and Secret Sharing , 2015 .

[34]  Changde Du,et al.  Sharing deep generative representation for perceived image reconstruction from human brain activity , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[35]  InitializerRonald L. RivestLaboratory Unconditionally Secure Commitment and Oblivious Transfer Schemes Using Private Channels and a Trusted Initializer , 1999 .

[36]  Martine De Cock,et al.  Privacy-Preserving Scoring of Tree Ensembles: A Novel Framework for AI in Healthcare , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[37]  S. Fienberg,et al.  Secure multiple linear regression based on homomorphic encryption , 2011 .

[38]  Donald Beaver,et al.  One-Time Tables for Two-Party Computation , 1998, COCOON.

[39]  Ian Goodfellow,et al.  Deep Learning with Differential Privacy , 2016, CCS.

[40]  Chin-Teng Lin,et al.  Privacy-Preserving Linear Regression for Brain-Computer Interface Applications , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[41]  Kyle Nash,et al.  Neural Markers of Religious Conviction , 2009, Psychological science.

[42]  Stratis Ioannidis,et al.  Privacy-Preserving Ridge Regression on Hundreds of Millions of Records , 2013, 2013 IEEE Symposium on Security and Privacy.

[43]  Yunghsiang Sam Han,et al.  Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification , 2004, SDM.

[44]  Niall Holmes,et al.  Moving magnetoencephalography towards real-world applications with a wearable system , 2018, Nature.

[45]  Brent Lance,et al.  Driver Drowsiness Estimation From EEG Signals Using Online Weighted Adaptation Regularization for Regression (OwARR) , 2017, IEEE Transactions on Fuzzy Systems.

[46]  Octavian Catrina,et al.  Secure Computation with Fixed-Point Numbers , 2010, Financial Cryptography.

[47]  Philip S. Yu,et al.  A General Survey of Privacy-Preserving Data Mining Models and Algorithms , 2008, Privacy-Preserving Data Mining.

[48]  Goichiro Hanaoka,et al.  Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data , 2009, IACR Cryptol. ePrint Arch..

[49]  Ping Chen,et al.  Practical Secure Decision Tree Learning in a Teletreatment Application , 2014, Financial Cryptography.

[50]  Dawn Xiaodong Song,et al.  On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces , 2012, USENIX Security Symposium.