Privacy-Preserving Neural Networks with Homomorphic Encryption: Challenges and Opportunities

Privacy-Preserving Neural Networks with Homomorphic Encryption: Challenges and Opportunities

Peer-to-Peer Networking and Applications https://doi.org/10.1007/s12083-021-01076-8 Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities Bernardo Pulido-Gaytan1 & Andrei Tchernykh1,2,3 & Jorge M. Cortés-Mendoza2 & Mikhail Babenko4 & Gleb Radchenko2 & Arutyun Avetisyan3 & Alexander Yu Drozdov5 Received: 29 July 2020 /Accepted: 13 January 2021 # The Author(s) 2021 Abstract Classical machine learning modeling demands considerable computing power for internal calculations and training with big data in a reasonable amount of time. In recent years, clouds provide services to facilitate this process, but it introduces new security threats of data breaches. Modern encryption techniques ensure security and are considered as the best option to protect stored data and data in transit from an unauthorized third-party. However, a decryption process is necessary when the data must be processed or analyzed, falling into the initial problem of data vulnerability. Fully Homomorphic Encryption (FHE) is considered the holy grail of cryptography. It allows a non-trustworthy third-party resource to process encrypted information without disclosing confidential data. In this paper, we analyze the fundamental concepts of FHE, practical implementations, state-of-the-art ap- proaches, limitations, advantages, disadvantages, potential applications, and development tools focusing on neural networks. In recent years, FHE development demonstrates remarkable progress. However, current literature in the homomorphic neural networks is almost exclusively addressed by practitioners looking for suitable implementations. It still lacks comprehensive and more thorough reviews. We focus on the privacy-preserving homomorphic encryption cryptosystems targeted at neural networks identifying current solutions, open issues, challenges, opportunities, and potential research directions. Keywords Cloud security . Homomorphic encryption . Machine learning . Neural networks . Privacy-preserving 1 Introduction infrastructure investment, just-in-time service provisioning, etc. However, it also brings security and privacy concerns, Cloud computing offers considerable benefits of availability, where data breaches are the top threat [1]. Sensitive informa- scalability, pricing, energy efficiency, almost zero upfront tion can be released, viewed, stolen, and used by an This article is part of the Topical Collection: Special Issue on Privacy- Preserving Computing Guest Editors: Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan and David S.L. Wei * Andrei Tchernykh Alexander Yu Drozdov [email protected] [email protected] Bernardo Pulido-Gaytan 1 CICESE Research Center, carr. Tijuana-Ensenada 3918, [email protected] 22860 Ensenada, BC, Mexico Jorge M. Cortés-Mendoza 2 South Ural State University, Prospekt Lenina 76, [email protected] 454080 Chelyabinsk, Russia Mikhail Babenko 3 Ivannikov Institute for System Programming, Alexander [email protected] Solzhenitsyn 25, Moscow 109004, Russia Gleb Radchenko 4 North-Caucasus Federal University, Kulakova 2, [email protected] 355029 Stavropol, Russia Arutyun Avetisyan 5 Moscow Institute of Physics and Technology, Institutskiy 9, [email protected] Dolgoprudny 141701, Russia Peer-to-Peer Netw. Appl. unauthorized third-party. Data outsourcing implies that the Network (NN) models via Homomorphic Encryption (NN- user delegates direct data control and its processing. The user HE) come to place. requires greater trust in Cloud Service Providers (CSP) be- In this paper, we consider the current state-of-art NN-HE cause dishonest behavior can compromise the data. In general, systems focusing on the followings aspects: new threats appear since more data is outsourced. Security and privacy are critical issues for preserving integ- & Latest issues related to the intersection of HE rity, reliability, and availability in a cloud computing environ- cryptosystems and NN models, and ways to overcome ment. Privacy and efficient data processing are important re- privacy and security threats arisen in present-day comput- search areas in the field of outsourcing computing. ing environments; Traditionally, encryption of confidential information was the & Fundamental concepts of NN-HE, main theoretical re- standard solution before the use of the cloud model. It may sults, capabilities, potential applications, and limitations, protect user data privacy from a non-trustworthy third-party, discussing their state-of-the-art and the state-of-the- but it cannot support effective ciphertext computing. practice; In this respect, data in use is a phase of the data life cycle in & Important compromises between theoretical models and modern data security practices that goes overlooked. their feasibility, showing tendencies of combining their Conventional cryptosystems successfully protect stored data potentialities; and data in transit but do not protect the data while decrypted & High-level and low-level tools, frameworks, interfaces, to be processed. The data value extraction requires decryption, languages, libraries, etc.; creating critical exposure points. As a result, privacy- & Privacy-preserving NN-HE development by retrieving ac- preserving techniques are emerging as a key consideration in ademic publications in the last fifteen years to detect data analytics and cloud computing domains. The general idea emerging trends in research and relevant application is to delegate data processing without giving transparent ac- domains; cess to it. & NN-HE implementations using high-level and low-level Fully Homomorphic Encryption (FHE) has been dubbed tools to demonstrate the advantages and disadvantages of the holy grail of cryptography, an elusive goal that could solve each approach. cybersecurity problems [2–4]. FHE allows a non-trustworthy third-party to process encrypted information without disclos- This survey aims to give a knowledge basis to researchers ing confidential data. Since the remote server only sees en- and practitioners interested in knowing, applying, and extend- cryptions and never has access to the secret key, users can be ing NN-HE models. assured that it does not learn anything about their data or the The paper is structured as follows. Section 2 reviews the computation output. This is an extremely valuable opportunity evolution of homomorphic encryption schemes. Section 3 in the world of distributed computing and heterogeneous provides the formal definition of fully homomorphic encryp- networks. tion and describes fundamental concepts, such as FHE enables applying basic mathematical operations bootstrapping and key-switching. Section 4 discusses the directly to the ciphertext so that the decrypting of the state-of-the-art of homomorphic cryptosystems and machine ciphertext results in the same answer as applying the learning. Section 5 addresses privacy-preserving NN-HE, fo- operations to the original unencrypted data. In other cusing on challenges and opportunities towards a blind non- words, FHE enables compatibility between two critical interactive classification. Section 6 presents NN-HE applica- factors: computing and privacy. tions in real-world problems and current development tools. Today, the promising post-quantum tool based on HE is Section 7 presents NN-HE implementation examples using technically feasible for real-world domains, after years of be- both high-level and low-level tools. Section 8 summarizes ing considered a purely theoretical problem [5]. However, its open research problems and challenges. Finally, we conclude implementation exhibits several limitations in performance. A and discuss future works in Section 9. long-pursue application is a privacy-preserving machine learning model for predicting or classifying confidential infor- mation. These systems promise to work with encrypted data 2 Homomorphic encryption and have the same performance as their unencrypted versions, providing security and accuracy at the same time. In this section, we discuss basic concepts of HE and their A critical limitation of the extensive adoption of machine evolution based on representative works in the area. learning is the low protection of sensitive information. In most In the cryptography field, the term HE defines a kind of cases, access to the datasets is forbidden due to privacy con- encryption system able to perform certain computable func- cerns, e.g., accessing medical datasets is a privacy violation of tions over ciphertexts. The output maintains the features of the the patients. In such a domain, the privacy-preserving Neural function and input format. The system has no access to Peer-to-Peer Netw. Appl. ÀÁ information on the ciphertexts and secret keys. It only uses ¼ 2 Á m1 theirÀÁ respective ciphertexts c1 b1 e mod n and publicly available information without risks of the data ¼ 2 Á m2 2 2 c2 b2 e mod n,whereb1 and b2 are quadratic breach. The HE concept refers to a mapping between func- ÀÁ ÀÁ nonresidue values such that gcd b2; n ¼ gcd b2; n ¼ 1, tions on the space of messages and ciphertexts. A homomor- 1 2 and e is one of the quadratic nonresidue modulo n values with phic function applied to ciphertexts provides the same (after (x/n)=1. decryption) result as applying the function to the original The GM scheme has a homomorphic property, where the unencrypted data. encryption of m + m ,is Let m and m be messages, c and c be their cor- 1 2 1 2 1 :: 2 hi þ responding ciphertexts. The operation in an additively 2 m1þm2 :: cþ← ðÞb1 Á b2 Á e mod n HE produces the ciphertext cþ←c

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    26 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us