SlideShare a Scribd company logo
1 of 28
Introduction
Literature review
Contributions
Models and assumptions
Technique preliminaries
Proposed scheme
Performance evaluation
Conclusion
References
3
CONTENTS
Neural networks.
Back-propogation.
Improves the accuracy.
Joint/Collaborative learning.
4
INTRODUCTION
Challenges:
 To protect each participant’s private data set and
intermediate results.
 The computation/ communication cost introduced to
each participant shall be affordable.
 For collaborative training, training data is arbitrarily
partitioned.
5
INTRODUCTION(Contd..)
Provides privacy preservation for multiparty .
Collaborative BPN network learning over arbitrarily
partitioned data.
Guarantees privacy and efficiency.
Support multiparty secure scalar product.
Allow decryption of arbitrary large messages.
6
CONTRIBUTONS
 System Model:
 Trusted authority.
 The participating parties ( data owner).
 The cloud servers ( or cloud).
 Security Model:
7
MODELS AND ASSUMPTIONS
 Arbitrarily Partitioned Data
 Z parties (Z > 2 ) : Ps , 1 ≤ s ≤ Z.
 Database D with N rows : {DB1,DB2, ….. DBN}.
 Each row DBv ,1 ≤ v ≤ N has m attributes {xv
1 , xv
2 , xv
3 …..
xv
m}.
 DBv = DBv
1 U DBv
2 U DBv
3 U ….. U DBv
z .
 Each DBv, Ps has ts
v attributes.
8
TECHNIQUE PRELIMINARIES
 BACK –PROPOGATION NEURAL NETWORK LEARNING
9
TECHNIQUE PRELIMINARIES(Contd..)
 BGN Homomorphic Encryption
 Operations on plaintexts to be performed on their
respective cipher texts.
 Public-key “doubly homomorphic” encryption
scheme(called “BGN” for short).
 One multiplication and unlimited number of additions.
 Given ciphertexts C(m1) , C(m2) and C(m^1), C(m^2 ), one
can compute C(m1 m^1 + m2m^2) without knowing the
plaintext.
10
TECHNIQUE PRELIMINARIES(Contd..)
 PROBLEM STATEMENT
 3 layer (a-b-c configuration) neural network .
 N samples for learning data set .
 Arbitrary partitioned into Z( Z≥2) subsets.
 SCHEME OVERVIEW
 Each party encrypt her/his input data set.
 Participants upload the encrypted data to cloud.
 Cloud servers perform the operations.
 Secret sharing algorithm.
11
PROPOSED SCHEME
 PRIVACY PRESERVING MULTIPARTY NEURAL
NETWORK LEARNING
12
PROPOSED SCHEME(Contd..)
13
PROPOSED SCHEME(Contd..)
 SECURE SCALAR PRODUCTION AND ADDITION WITH
CLOUD
Algorithm 3: Secure Scalar Product and Addition
 Key Generation.
 Encryption.
 Secure Scalar Product.
 Secure Addition.
 Decryption.
14
PROPOSED SCHEME(Contd..)
 SECURE SHARING OF SCALAR PRODUCT AND SUM
15
PROPOSED SCHEME(Contd..)
 APPROXIMATION OF ACTIVATION FUNCTION
16
PROPOSED SCHEME(Contd..)
 Experimental Evaluation
 Experiment Setup
• Amazon EC2 cloud.
• 10 nodes with 8-core 2.93-GHz Intel Xeon CPU.
• 8-GB memory.
• Testing data sets(Iris,kr-vs-kp,diabetes).
17
PERFORMANCE EVALUATION
 EXPERIMENTAL RESULT
18
PERFORMANCE EVALUATION(Contd..)
 EXPERIMENTAL RESULT (Contd..)
19
PERFORMANCE EVALUATION(Contd..)
 EXPERIMENTAL RESULT (Contd..)
20
PERFORMANCE EVALUATION(Contd..)
 EXPERIMENTAL RESULT (Contd..)
21
PERFORMANCE EVALUATION(Contd..)
 EXPERIMENTAL RESULT (Contd..)
22
PERFORMANCE EVALUATION(Contd..)
 EXPERIMENTAL RESULT (Contd..)
23
PERFORMANCE EVALUATION(Contd..)
 EXPERIMENTAL RESULT (Contd..)
24
PERFORMANCE EVALUATION(Contd..)
 ACCURACY ANALYSIS
 Accuracy loss in approximation of activation function.
 Maclaurin series used – accuracy can be adjusted by
modifying number of series terms.
25
PERFORMANCE EVALUATION(Contd..)
Secure and practical multiparty BPN network learning.
Cost independent of number of parties.
Scalable efficient and secure.
26
CONCLUSION
1) N. Schlitter A Protocol for Privacy Preserving Neural
Network Learning on Horizontal Partitioned Data, Proc.
Privacy Statistics in Databases (PSD ’08), Sept. 2008
2) T. Chen and S. Zhong, Privacy-Preserving
Backpropagation Neural Network Learning,IEEE Trans.
Neural Network, vol. 20, no. 10, Oct. 2000,pp. 1554-1564
3) A. Bansal, T. Chen, and S. Zhong, Privacy Preserving
Back-Propagation Neural Network Learning over
Arbitrarily Parti-tioned Data,Neural Computing
Applications,vol. 20, no. 1, Feb. 2011, pp. 143-150,
4) D. Boneh, E.-J. Goh, and K. Nissim, Evaluating 2-DNF
Formulas on Ciphertexts,Proc. Second Int’l Conf. Theory
of Cryptography (TCC ’05), pp. 325-341, 2005.
27
REFERENCES
THANK YOU

More Related Content

What's hot

Object classification using CNN & VGG16 Model (Keras and Tensorflow)
Object classification using CNN & VGG16 Model (Keras and Tensorflow) Object classification using CNN & VGG16 Model (Keras and Tensorflow)
Object classification using CNN & VGG16 Model (Keras and Tensorflow) Lalit Jain
 
[AI07] Revolutionizing Image Processing with Cognitive Toolkit
[AI07] Revolutionizing Image Processing with Cognitive Toolkit[AI07] Revolutionizing Image Processing with Cognitive Toolkit
[AI07] Revolutionizing Image Processing with Cognitive Toolkitde:code 2017
 
Teach a neural network to read handwriting
Teach a neural network to read handwritingTeach a neural network to read handwriting
Teach a neural network to read handwritingVipul Kaushal
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networkstheijes
 
gSkeletonClu - Revealing density-based clustering structure from the core-con...
gSkeletonClu - Revealing density-based clustering structure from the core-con...gSkeletonClu - Revealing density-based clustering structure from the core-con...
gSkeletonClu - Revealing density-based clustering structure from the core-con...Danilo Oliveira
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingbutest
 
PPTX_FileSavedAsOnBoxNet_23
PPTX_FileSavedAsOnBoxNet_23PPTX_FileSavedAsOnBoxNet_23
PPTX_FileSavedAsOnBoxNet_23Quickoffice Test
 
Neural network image recognition
Neural network image recognitionNeural network image recognition
Neural network image recognitionOleksii Sekundant
 
Distributed Deep Learning Using Java on the Client and in the Cloud
Distributed Deep Learning Using Java on the Client and in the CloudDistributed Deep Learning Using Java on the Client and in the Cloud
Distributed Deep Learning Using Java on the Client and in the CloudData Science Leuven
 
Convolutional neural network
Convolutional neural networkConvolutional neural network
Convolutional neural networkItachi SK
 
Artificial Neural Network and Multi-Response Optimization in Reliability Meas...
Artificial Neural Network and Multi-Response Optimization in Reliability Meas...Artificial Neural Network and Multi-Response Optimization in Reliability Meas...
Artificial Neural Network and Multi-Response Optimization in Reliability Meas...inventionjournals
 
Feed forward neural network for sine
Feed forward neural network for sineFeed forward neural network for sine
Feed forward neural network for sineijcsa
 
TensorFlow Tutorial Part2
TensorFlow Tutorial Part2TensorFlow Tutorial Part2
TensorFlow Tutorial Part2Sungjoon Choi
 
Secure data aggregation technique for wireless
Secure data aggregation technique for wirelessSecure data aggregation technique for wireless
Secure data aggregation technique for wirelessjpstudcorner
 
Cloud Roundtable at Microsoft Switzerland
Cloud Roundtable at Microsoft Switzerland Cloud Roundtable at Microsoft Switzerland
Cloud Roundtable at Microsoft Switzerland mictc
 
IRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations SystemsIRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations SystemsIRJET Journal
 
Recognizing hand-written digits with Synaptic.js
Recognizing hand-written digits with Synaptic.jsRecognizing hand-written digits with Synaptic.js
Recognizing hand-written digits with Synaptic.jsAapo Kiiso
 

What's hot (20)

Object classification using CNN & VGG16 Model (Keras and Tensorflow)
Object classification using CNN & VGG16 Model (Keras and Tensorflow) Object classification using CNN & VGG16 Model (Keras and Tensorflow)
Object classification using CNN & VGG16 Model (Keras and Tensorflow)
 
[AI07] Revolutionizing Image Processing with Cognitive Toolkit
[AI07] Revolutionizing Image Processing with Cognitive Toolkit[AI07] Revolutionizing Image Processing with Cognitive Toolkit
[AI07] Revolutionizing Image Processing with Cognitive Toolkit
 
IT Report
IT ReportIT Report
IT Report
 
Teach a neural network to read handwriting
Teach a neural network to read handwritingTeach a neural network to read handwriting
Teach a neural network to read handwriting
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
 
gSkeletonClu - Revealing density-based clustering structure from the core-con...
gSkeletonClu - Revealing density-based clustering structure from the core-con...gSkeletonClu - Revealing density-based clustering structure from the core-con...
gSkeletonClu - Revealing density-based clustering structure from the core-con...
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
N ns 1
N ns 1N ns 1
N ns 1
 
PPTX_FileSavedAsOnBoxNet_23
PPTX_FileSavedAsOnBoxNet_23PPTX_FileSavedAsOnBoxNet_23
PPTX_FileSavedAsOnBoxNet_23
 
Neural network image recognition
Neural network image recognitionNeural network image recognition
Neural network image recognition
 
Distributed Deep Learning Using Java on the Client and in the Cloud
Distributed Deep Learning Using Java on the Client and in the CloudDistributed Deep Learning Using Java on the Client and in the Cloud
Distributed Deep Learning Using Java on the Client and in the Cloud
 
Convolutional neural network
Convolutional neural networkConvolutional neural network
Convolutional neural network
 
Artificial Neural Network and Multi-Response Optimization in Reliability Meas...
Artificial Neural Network and Multi-Response Optimization in Reliability Meas...Artificial Neural Network and Multi-Response Optimization in Reliability Meas...
Artificial Neural Network and Multi-Response Optimization in Reliability Meas...
 
Feed forward neural network for sine
Feed forward neural network for sineFeed forward neural network for sine
Feed forward neural network for sine
 
Long Zhou - 2017 - Neural System Combination for Machine Transaltion
Long Zhou - 2017 -  Neural System Combination for Machine TransaltionLong Zhou - 2017 -  Neural System Combination for Machine Transaltion
Long Zhou - 2017 - Neural System Combination for Machine Transaltion
 
TensorFlow Tutorial Part2
TensorFlow Tutorial Part2TensorFlow Tutorial Part2
TensorFlow Tutorial Part2
 
Secure data aggregation technique for wireless
Secure data aggregation technique for wirelessSecure data aggregation technique for wireless
Secure data aggregation technique for wireless
 
Cloud Roundtable at Microsoft Switzerland
Cloud Roundtable at Microsoft Switzerland Cloud Roundtable at Microsoft Switzerland
Cloud Roundtable at Microsoft Switzerland
 
IRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations SystemsIRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
IRJET-AI Neural Network Disaster Recovery Cloud Operations Systems
 
Recognizing hand-written digits with Synaptic.js
Recognizing hand-written digits with Synaptic.jsRecognizing hand-written digits with Synaptic.js
Recognizing hand-written digits with Synaptic.js
 

Viewers also liked (9)

Neural networks
Neural networksNeural networks
Neural networks
 
Propagation effects: Reverb
Propagation effects: ReverbPropagation effects: Reverb
Propagation effects: Reverb
 
Propagation of Sound
Propagation of SoundPropagation of Sound
Propagation of Sound
 
Neural Networks: Least Mean Square (LSM) Algorithm
Neural Networks: Least Mean Square (LSM) AlgorithmNeural Networks: Least Mean Square (LSM) Algorithm
Neural Networks: Least Mean Square (LSM) Algorithm
 
sound
soundsound
sound
 
CBSE Class IX Sciense Physics Sound
CBSE Class IX Sciense Physics SoundCBSE Class IX Sciense Physics Sound
CBSE Class IX Sciense Physics Sound
 
Physics Sounds.
Physics Sounds.Physics Sounds.
Physics Sounds.
 
underwater acoustic propogation channels
underwater acoustic propogation channelsunderwater acoustic propogation channels
underwater acoustic propogation channels
 
Properties of Sound
Properties of SoundProperties of Sound
Properties of Sound
 

Similar to PRIVACY PRESERVING BACK-PROPOGATION NEURAL NETWORK LEARNING MADE PRACTICAL WITH CLOUD COMPUTING

An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...IJMER
 
A TALE of DATA PATTERN DISCOVERY IN PARALLEL
A TALE of DATA PATTERN DISCOVERY IN PARALLELA TALE of DATA PATTERN DISCOVERY IN PARALLEL
A TALE of DATA PATTERN DISCOVERY IN PARALLELJenny Liu
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageIJMER
 
Software-Defined Simulations for Continuous Development of Cloud and Data Cen...
Software-Defined Simulations for Continuous Development of Cloud and Data Cen...Software-Defined Simulations for Continuous Development of Cloud and Data Cen...
Software-Defined Simulations for Continuous Development of Cloud and Data Cen...Pradeeban Kathiravelu, Ph.D.
 
Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...dhanarajp
 
Processing Large Datasets for ADAS Applications using Apache Spark
Processing Large Datasets for ADAS Applications using Apache SparkProcessing Large Datasets for ADAS Applications using Apache Spark
Processing Large Datasets for ADAS Applications using Apache SparkDatabricks
 
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & Alluxio
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & AlluxioUltra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & Alluxio
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & AlluxioAlluxio, Inc.
 
USENIX NSDI 2016 (Session: Resource Sharing)
USENIX NSDI 2016 (Session: Resource Sharing)USENIX NSDI 2016 (Session: Resource Sharing)
USENIX NSDI 2016 (Session: Resource Sharing)Ryousei Takano
 
Secure and efficient skyline queries on encrypted data
Secure and efficient skyline queries on encrypted dataSecure and efficient skyline queries on encrypted data
Secure and efficient skyline queries on encrypted dataJAYAPRAKASH JPINFOTECH
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationIRJET Journal
 
seed block algorithm
seed block algorithmseed block algorithm
seed block algorithmDipak Badhe
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET Journal
 
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...Nikhil Jain
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in CloudIRJET Journal
 
Microsoft Azure in HPC scenarios
Microsoft Azure in HPC scenariosMicrosoft Azure in HPC scenarios
Microsoft Azure in HPC scenariosmictc
 
TensorFlow 16: Building a Data Science Platform
TensorFlow 16: Building a Data Science Platform TensorFlow 16: Building a Data Science Platform
TensorFlow 16: Building a Data Science Platform Seldon
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...IGEEKS TECHNOLOGIES
 
Towards a Unified Data Analytics Optimizer with Yanlei Diao
Towards a Unified Data Analytics Optimizer with Yanlei DiaoTowards a Unified Data Analytics Optimizer with Yanlei Diao
Towards a Unified Data Analytics Optimizer with Yanlei DiaoDatabricks
 

Similar to PRIVACY PRESERVING BACK-PROPOGATION NEURAL NETWORK LEARNING MADE PRACTICAL WITH CLOUD COMPUTING (20)

An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud ...
 
A TALE of DATA PATTERN DISCOVERY IN PARALLEL
A TALE of DATA PATTERN DISCOVERY IN PARALLELA TALE of DATA PATTERN DISCOVERY IN PARALLEL
A TALE of DATA PATTERN DISCOVERY IN PARALLEL
 
An Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud StorageAn Efficient PDP Scheme for Distributed Cloud Storage
An Efficient PDP Scheme for Distributed Cloud Storage
 
Private datawarehouse queries
Private datawarehouse queriesPrivate datawarehouse queries
Private datawarehouse queries
 
Software-Defined Simulations for Continuous Development of Cloud and Data Cen...
Software-Defined Simulations for Continuous Development of Cloud and Data Cen...Software-Defined Simulations for Continuous Development of Cloud and Data Cen...
Software-Defined Simulations for Continuous Development of Cloud and Data Cen...
 
Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...Improving availability and reducing redundancy using deduplication of cloud s...
Improving availability and reducing redundancy using deduplication of cloud s...
 
Processing Large Datasets for ADAS Applications using Apache Spark
Processing Large Datasets for ADAS Applications using Apache SparkProcessing Large Datasets for ADAS Applications using Apache Spark
Processing Large Datasets for ADAS Applications using Apache Spark
 
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & Alluxio
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & AlluxioUltra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & Alluxio
Ultra Fast Deep Learning in Hybrid Cloud Using Intel Analytics Zoo & Alluxio
 
USENIX NSDI 2016 (Session: Resource Sharing)
USENIX NSDI 2016 (Session: Resource Sharing)USENIX NSDI 2016 (Session: Resource Sharing)
USENIX NSDI 2016 (Session: Resource Sharing)
 
Secure and efficient skyline queries on encrypted data
Secure and efficient skyline queries on encrypted dataSecure and efficient skyline queries on encrypted data
Secure and efficient skyline queries on encrypted data
 
Block-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplicationBlock-Level Message-Locked Encryption for Secure Large File De-duplication
Block-Level Message-Locked Encryption for Secure Large File De-duplication
 
seed block algorithm
seed block algorithmseed block algorithm
seed block algorithm
 
Jj3616251628
Jj3616251628Jj3616251628
Jj3616251628
 
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...IRJET -  	  A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
 
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
Second phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANC...
 
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
IRJET - Efficient and Verifiable Queries over Encrypted Data in Cloud
 
Microsoft Azure in HPC scenarios
Microsoft Azure in HPC scenariosMicrosoft Azure in HPC scenarios
Microsoft Azure in HPC scenarios
 
TensorFlow 16: Building a Data Science Platform
TensorFlow 16: Building a Data Science Platform TensorFlow 16: Building a Data Science Platform
TensorFlow 16: Building a Data Science Platform
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
 
Towards a Unified Data Analytics Optimizer with Yanlei Diao
Towards a Unified Data Analytics Optimizer with Yanlei DiaoTowards a Unified Data Analytics Optimizer with Yanlei Diao
Towards a Unified Data Analytics Optimizer with Yanlei Diao
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 

PRIVACY PRESERVING BACK-PROPOGATION NEURAL NETWORK LEARNING MADE PRACTICAL WITH CLOUD COMPUTING

  • 1.
  • 2.
  • 3. Introduction Literature review Contributions Models and assumptions Technique preliminaries Proposed scheme Performance evaluation Conclusion References 3 CONTENTS
  • 4. Neural networks. Back-propogation. Improves the accuracy. Joint/Collaborative learning. 4 INTRODUCTION
  • 5. Challenges:  To protect each participant’s private data set and intermediate results.  The computation/ communication cost introduced to each participant shall be affordable.  For collaborative training, training data is arbitrarily partitioned. 5 INTRODUCTION(Contd..)
  • 6. Provides privacy preservation for multiparty . Collaborative BPN network learning over arbitrarily partitioned data. Guarantees privacy and efficiency. Support multiparty secure scalar product. Allow decryption of arbitrary large messages. 6 CONTRIBUTONS
  • 7.  System Model:  Trusted authority.  The participating parties ( data owner).  The cloud servers ( or cloud).  Security Model: 7 MODELS AND ASSUMPTIONS
  • 8.  Arbitrarily Partitioned Data  Z parties (Z > 2 ) : Ps , 1 ≤ s ≤ Z.  Database D with N rows : {DB1,DB2, ….. DBN}.  Each row DBv ,1 ≤ v ≤ N has m attributes {xv 1 , xv 2 , xv 3 ….. xv m}.  DBv = DBv 1 U DBv 2 U DBv 3 U ….. U DBv z .  Each DBv, Ps has ts v attributes. 8 TECHNIQUE PRELIMINARIES
  • 9.  BACK –PROPOGATION NEURAL NETWORK LEARNING 9 TECHNIQUE PRELIMINARIES(Contd..)
  • 10.  BGN Homomorphic Encryption  Operations on plaintexts to be performed on their respective cipher texts.  Public-key “doubly homomorphic” encryption scheme(called “BGN” for short).  One multiplication and unlimited number of additions.  Given ciphertexts C(m1) , C(m2) and C(m^1), C(m^2 ), one can compute C(m1 m^1 + m2m^2) without knowing the plaintext. 10 TECHNIQUE PRELIMINARIES(Contd..)
  • 11.  PROBLEM STATEMENT  3 layer (a-b-c configuration) neural network .  N samples for learning data set .  Arbitrary partitioned into Z( Z≥2) subsets.  SCHEME OVERVIEW  Each party encrypt her/his input data set.  Participants upload the encrypted data to cloud.  Cloud servers perform the operations.  Secret sharing algorithm. 11 PROPOSED SCHEME
  • 12.  PRIVACY PRESERVING MULTIPARTY NEURAL NETWORK LEARNING 12 PROPOSED SCHEME(Contd..)
  • 14.  SECURE SCALAR PRODUCTION AND ADDITION WITH CLOUD Algorithm 3: Secure Scalar Product and Addition  Key Generation.  Encryption.  Secure Scalar Product.  Secure Addition.  Decryption. 14 PROPOSED SCHEME(Contd..)
  • 15.  SECURE SHARING OF SCALAR PRODUCT AND SUM 15 PROPOSED SCHEME(Contd..)
  • 16.  APPROXIMATION OF ACTIVATION FUNCTION 16 PROPOSED SCHEME(Contd..)
  • 17.  Experimental Evaluation  Experiment Setup • Amazon EC2 cloud. • 10 nodes with 8-core 2.93-GHz Intel Xeon CPU. • 8-GB memory. • Testing data sets(Iris,kr-vs-kp,diabetes). 17 PERFORMANCE EVALUATION
  • 19.  EXPERIMENTAL RESULT (Contd..) 19 PERFORMANCE EVALUATION(Contd..)
  • 20.  EXPERIMENTAL RESULT (Contd..) 20 PERFORMANCE EVALUATION(Contd..)
  • 21.  EXPERIMENTAL RESULT (Contd..) 21 PERFORMANCE EVALUATION(Contd..)
  • 22.  EXPERIMENTAL RESULT (Contd..) 22 PERFORMANCE EVALUATION(Contd..)
  • 23.  EXPERIMENTAL RESULT (Contd..) 23 PERFORMANCE EVALUATION(Contd..)
  • 24.  EXPERIMENTAL RESULT (Contd..) 24 PERFORMANCE EVALUATION(Contd..)
  • 25.  ACCURACY ANALYSIS  Accuracy loss in approximation of activation function.  Maclaurin series used – accuracy can be adjusted by modifying number of series terms. 25 PERFORMANCE EVALUATION(Contd..)
  • 26. Secure and practical multiparty BPN network learning. Cost independent of number of parties. Scalable efficient and secure. 26 CONCLUSION
  • 27. 1) N. Schlitter A Protocol for Privacy Preserving Neural Network Learning on Horizontal Partitioned Data, Proc. Privacy Statistics in Databases (PSD ’08), Sept. 2008 2) T. Chen and S. Zhong, Privacy-Preserving Backpropagation Neural Network Learning,IEEE Trans. Neural Network, vol. 20, no. 10, Oct. 2000,pp. 1554-1564 3) A. Bansal, T. Chen, and S. Zhong, Privacy Preserving Back-Propagation Neural Network Learning over Arbitrarily Parti-tioned Data,Neural Computing Applications,vol. 20, no. 1, Feb. 2011, pp. 143-150, 4) D. Boneh, E.-J. Goh, and K. Nissim, Evaluating 2-DNF Formulas on Ciphertexts,Proc. Second Int’l Conf. Theory of Cryptography (TCC ’05), pp. 325-341, 2005. 27 REFERENCES