Privacy-preserving multikey computing framework for encrypted data in the cloud

Abstract Preparing large amounts of training data is the key to the success of machine learning. Due to the public’s concern about individual privacy, different techniques are proposed to achieve privacy preserving machine learning. Homomorphic encryption enables calculation on encrypted data in the cloud. However, current schemes either focus on single key or a specific algorithm. Cooperation between different institutions is quite common in this era of big data. Encrypting data from different institutions under one single key is a risk to data privacy. Moreover, constructing secure scheme for a specific machine learning algorithm lacks universality. Based on an additively homomorphic encryption supporting one multiplication, we propose a general multikey computing framework to execute common arithmetic operations on encrypted data such as addition, multiplication, comparison, sorting, division and etc. Our scheme can be used to run different machine learning algorithms. Our scheme is proven to be secure against semi-honest attackers and the experimental evaluations demonstrate the practicality of our computing framework.

[1]  Michael Naehrig,et al.  Manual for Using Homomorphic Encryption for Bioinformatics , 2017, Proceedings of the IEEE.

[2]  Foundations of Cryptography: Frontmatter , 2004 .

[3]  Yongsoo Song,et al.  Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference , 2019, IACR Cryptol. ePrint Arch..

[4]  Meikang Qiu,et al.  Cloud Infrastructure Resource Allocation for Big Data Applications , 2018, IEEE Transactions on Big Data.

[5]  Lucian Mihai Itu,et al.  Applying Deep Neural Networks over Homomorphic Encrypted Medical Data , 2020, Comput. Math. Methods Medicine.

[6]  Ximeng Liu,et al.  An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys , 2016, IEEE Transactions on Information Forensics and Security.

[7]  Siu-Ming Yiu,et al.  Privacy-preserving verifiable elastic net among multiple institutions in the cloud , 2018, J. Comput. Secur..

[8]  Baocang Wang,et al.  Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing , 2020, Secur. Commun. Networks.

[9]  Meikang Qiu,et al.  A Case Study of Sensor Data Collection and Analysis in Smart City: Provenance in Smart Food Supply Chain , 2013, Int. J. Distributed Sens. Networks.

[10]  Meikang Qiu,et al.  Who Moved My Data? Privacy Protection in Smartphones , 2017, IEEE Communications Magazine.

[11]  Dario Fiore,et al.  Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data , 2015, CCS.

[12]  Shen Su,et al.  Block-DEF: A secure digital evidence framework using blockchain , 2019, Inf. Sci..

[13]  Ming-Syan Chen,et al.  Secure support vector machines outsourcing with random linear transformation , 2014, Knowledge and Information Systems.

[14]  Ming Li,et al.  A tale of two clouds: Computing on data encrypted under multiple keys , 2014, 2014 IEEE Conference on Communications and Network Security.

[15]  Donald Ervin Knuth,et al.  The Art of Computer Programming , 1968 .

[16]  Zhihui Lu,et al.  All-Or-Nothing data protection for ubiquitous communication: Challenges and perspectives , 2019, Inf. Sci..

[17]  Laurence T. Yang,et al.  A survey on deep learning for big data , 2018, Inf. Fusion.

[18]  Emmanuel Bresson,et al.  A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications , 2003, ASIACRYPT.

[19]  Siu-Ming Yiu,et al.  Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery , 2017, DBSec.

[20]  Mei-Ling Shyu,et al.  A Survey on Deep Learning , 2018, ACM Comput. Surv..

[21]  Meikang Qiu,et al.  Public Vehicles for Future Urban Transportation , 2016, IEEE Transactions on Intelligent Transportation Systems.

[22]  Jian Liu,et al.  Efficient Privacy-Preserving Building Blocks in Cloud Environments under Multiple Keys , 2017, J. Inf. Sci. Eng..

[23]  Kim-Kwang Raymond Choo,et al.  Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases , 2017, J. Comput. Syst. Sci..

[24]  Peter Rindal,et al.  ABY3: A Mixed Protocol Framework for Machine Learning , 2018, IACR Cryptol. ePrint Arch..

[25]  Michael Naehrig,et al.  CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.

[26]  Keke Gai,et al.  Intelligent cryptography approach for secure distributed big data storage in cloud computing , 2017, Inf. Sci..

[27]  Stefan Katzenbeisser,et al.  Efficiently Outsourcing Multiparty Computation Under Multiple Keys , 2013, IEEE Transactions on Information Forensics and Security.

[28]  Philip S. Yu,et al.  Differentially Private Data Publishing and Analysis: A Survey , 2017, IEEE Transactions on Knowledge and Data Engineering.

[29]  Kim-Kwang Raymond Choo,et al.  Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases , 2016, IEEE Transactions on Information Forensics and Security.

[30]  Meikang Qiu,et al.  Enabling Cloud Computing in Emergency Management Systems , 2014, IEEE Cloud Computing.

[31]  Chen Li,et al.  Comments on “An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys” , 2018, IEEE Transactions on Information Forensics and Security.

[32]  Vinod Vaikuntanathan,et al.  On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption , 2012, STOC '12.

[33]  Qiang Yang,et al.  Federated Machine Learning , 2019, ACM Trans. Intell. Syst. Technol..

[34]  Meikang Qiu,et al.  An Empirical Study of Web Interface Design on Small Display Devices , 2004, IEEE/WIC/ACM International Conference on Web Intelligence (WI'04).

[35]  Meikang Qiu,et al.  Jamming ACK Attack to Wireless Networks and a Mitigation Approach , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.