PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication

Cloud-based Convolutional neural network (CNN) is a powerful tool for the healthcare center to provide health condition monitor service. Although the new service has future prospects in the medical, patient's privacy concerns arise because of the sensitivity of medical data. Prior works to address the concern have the following unresolved problems: 1) focus on data privacy but neglect to protect the privacy of the machine learning model itself; 2) introduce considerable communication costs for the CNN inference, which lowers the service quality of the cloud server. To push forward this area, we propose PE-HEALTH, a privacy-preserving health monitor framework that supports fully-encrypted CNN (both input data and model). In PE-HEALTH, the medical Internet of Things (IoT) sensor serves as the health condition data collector. For protecting patient privacy, the IoT sensor additively shares the collected data and uploads the shared data to the cloud server, which is efficient and suited to the energy-limited IoT sensor. To keep model privacy, PE-HEALTH allows the healthcare center to previously deploy, and then, use an encrypted CNN on the cloud server. During the CNN inference process, PE-HEALTH does not need the cloud servers to exchange any extra messages for operating the convolutional operation, which can greatly reduce the communication cost.

[1]  Payman Mohassel,et al.  SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[2]  Ximeng Liu,et al.  A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing , 2019, IEEE Transactions on Dependable and Secure Computing.

[3]  Dan Bogdanov,et al.  High-performance secure multi-party computation for data mining applications , 2012, International Journal of Information Security.

[4]  Dan Bogdanov,et al.  Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.

[5]  Farinaz Koushanfar,et al.  Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications , 2018, IACR Cryptol. ePrint Arch..

[6]  Michael Naehrig,et al.  CryptoNets: applying neural networks to encrypted data with high throughput and accuracy , 2016, ICML 2016.

[7]  Po Yang,et al.  Examining sensor-based physical activity recognition and monitoring for healthcare using Internet of Things: A systematic review , 2018, Journal of Biomedical Informatics.

[8]  Ian Goodfellow,et al.  Deep Learning with Differential Privacy , 2016, CCS.

[9]  Donald Beaver,et al.  Efficient Multiparty Protocols Using Circuit Randomization , 1991, CRYPTO.

[10]  Gonzalo Mateos,et al.  Health Monitoring and Management Using Internet-of-Things (IoT) Sensing with Cloud-Based Processing: Opportunities and Challenges , 2015, 2015 IEEE International Conference on Services Computing.

[11]  Yongsoo Song,et al.  Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference , 2019, IACR Cryptol. ePrint Arch..

[12]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[13]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[14]  Yao Lu,et al.  Oblivious Neural Network Predictions via MiniONN Transformations , 2017, IACR Cryptol. ePrint Arch..

[15]  Min Chen,et al.  SPHA: Smart Personal Health Advisor Based on Deep Analytics , 2018, IEEE Communications Magazine.

[16]  Jun Zhou,et al.  TSE-CNN: A Two-Stage End-to-End CNN for Human Activity Recognition , 2020, IEEE Journal of Biomedical and Health Informatics.

[17]  Toniann Pitassi,et al.  The Limits of Two-Party Differential Privacy , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.

[18]  Hannu Tenhunen,et al.  Internet of things for remote elderly monitoring: a study from user-centered perspective , 2017, J. Ambient Intell. Humaniz. Comput..

[19]  Nasser Kehtarnavaz,et al.  A Convolutional Neural Network-Based Sensor Fusion System for Monitoring Transition Movements in Healthcare Applications , 2018, 2018 IEEE 14th International Conference on Control and Automation (ICCA).

[20]  S. S. Patil,et al.  Early detection of grapes diseases using machine learning and IoT , 2016, International Conference on Cognitive Computing and Information Processing.

[21]  Helger Lipmaa,et al.  On the CCA1-Security of Elgamal and Damgård's Elgamal , 2010, Inscrypt.

[22]  Yuval Ishai,et al.  Breaking the Circuit Size Barrier for Secure Computation Under DDH , 2016, CRYPTO.

[23]  Michael Backes,et al.  MemGuard: Defending against Black-Box Membership Inference Attacks via Adversarial Examples , 2019, CCS.

[24]  Yuval Ishai,et al.  Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation , 2017, EUROCRYPT.

[25]  Chang Wen Chen,et al.  Prius: Hybrid Edge Cloud and Client Adaptation for HTTP Adaptive Streaming in Cellular Networks , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[26]  Pasi Liljeberg,et al.  Empowering Healthcare IoT Systems with Hierarchical Edge-Based Deep Learning , 2018, 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).

[27]  Jian Yu,et al.  EdgeCNN: A Hybrid Architecture for Agile Learning of Healthcare Data from IoT Devices , 2018, 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS).