SoK: Cryptography for Neural Networks
Autor: | Eleonora Ciceri, Sauro Vicini, Monir Azraoui, Orhan Ermis, Marie Paindavoine, Sébastien Canard, Ramy Masalha, Muhammad Bahram, Melek Önen, Beyza Bozdemir, Bastien Vialla, Boris Rozenberg, Marco Mosconi |
---|---|
Přispěvatelé: | Eurecom [Sophia Antipolis], IBM Haifa Research Lab (IBM HRL), IBM R&D Labs in Israel, Orange Labs [Caen], Orange Labs, ANR-19-P3IA-0002,3IA@cote d'azur,3IA Côte d'Azur(2019) |
Jazyk: | angličtina |
Rok vydání: | 2019 |
Předmět: |
Artificial neural network
business.industry Computer science Distributed computing Big data homomorphic encryption Homomorphic encryption Cryptography 0102 computer and information sciences 02 engineering and technology secure multiparty computation [INFO.INFO-NE]Computer Science [cs]/Neural and Evolutionary Computing [cs.NE] Encryption privacy neural networks 01 natural sciences [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] 010201 computation theory & mathematics 020204 information systems Server Scalability 0202 electrical engineering electronic engineering information engineering Secure multi-party computation business |
Zdroj: | Privacy and Identity Management. Data for Better Living: AI and Privacy 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers IFIP 2019, IFIP Summer School on Privacy and Identity Management IFIP 2019, IFIP Summer School on Privacy and Identity Management, Aug 2019, Brugg Windisch, Switzerland. ⟨10.1007/978-3-030-42504-3_5⟩ Privacy and Identity Management. Data for Better Living: AI and Privacy ISBN: 9783030425036 Privacy and Identity Management Privacy and Identity Management. Data for Better Living: AI and Privacy-14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers |
DOI: | 10.1007/978-3-030-42504-3_5⟩ |
Popis: | International audience; With the advent of big data technologies which bring better scalability and performance results, machine learning (ML) algorithms become affordable in several different applications and areas. The use of large volumes of data to obtain accurate predictions unfortunately come with a high cost in terms of privacy exposures. The underlying data are often personal or confidential and, therefore, need to be appropriately safeguarded. Given the cost of machine learning algorithms, these would need to be outsourced to third-party servers, and hence protection of the data becomes mandatory. While traditional data encryption solutions would not allow accessing the content of the data, these would, nevertheless, prevent third-party servers from executing the ML algorithms properly. The goal is, therefore, to come up with customized ML algorithms that would, by design, preserve the privacy of the processed data. Advanced cryptographic techniques such as fully homomorphic encryption or secure multi-party computation enable the execution of some operations over protected data and, therefore, can be considered as potential candidates for these algorithms. However, these techniques incur high computational and/or communication costs for some operations. In this paper, we propose a Systematization of Knowledge (SoK) whereby we analyze the tension between a particular ML technique, namely, neural networks (NN), and the characteristics of relevant cryptographic techniques. |
Databáze: | OpenAIRE |
Externí odkaz: |