PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication

作者: Yang Liu , Yilong Yang , Zhuo Ma , Ximeng Liu , Zhuzhu Wang

DOI: 10.1109/IWQOS49365.2020.9212822

关键词:

摘要: Cloud-based Convolutional neural network (CNN) is a powerful tool for the healthcare center to provide health condition monitor service. Although new service has future prospects in medical, patient's privacy concerns arise because of sensitivity medical data. Prior works address concern have following unresolved problems: 1) focus on data but neglect protect machine learning model itself; 2) introduce considerable communication costs CNN inference, which lowers quality cloud server. To push forward this area, we propose PE-HEALTH, privacy-preserving framework that supports fully-encrypted (both input and model). In Internet Things (IoT) sensor serves as collector. For protecting patient privacy, IoT additively shares collected uploads shared server, efficient suited energy-limited sensor. keep PE-HEALTH allows previously deploy, then, use an encrypted During inference process, does not need servers exchange any extra messages operating convolutional operation, can greatly reduce cost.

参考文章(25)
Dan Bogdanov, Sven Laur, Jan Willemson, Sharemind: A Framework for Fast Privacy-Preserving Computations european symposium on research in computer security. pp. 192- 206 ,(2008) , 10.1007/978-3-540-88313-5_13
Donald Beaver, Efficient Multiparty Protocols Using Circuit Randomization international cryptology conference. pp. 420- 432 ,(1991) , 10.1007/3-540-46766-1_34
Moeen Hassanalieragh, Alex Page, Tolga Soyata, Gaurav Sharma, Mehmet Aktas, Gonzalo Mateos, Burak Kantarci, Silvana Andreescu, Health Monitoring and Management Using Internet-of-Things (IoT) Sensing with Cloud-Based Processing: Opportunities and Challenges 2015 IEEE International Conference on Services Computing. pp. 285- 292 ,(2015) , 10.1109/SCC.2015.47
Helger Lipmaa, On the CCA1-security of Elgamal and Damgård's Elgamal international conference on information security and cryptology. pp. 18- 35 ,(2010) , 10.1007/978-3-642-21518-6_2
Dan Bogdanov, Margus Niitsoo, Tomas Toft, Jan Willemson, High-performance secure multi-party computation for data mining applications International Journal of Information Security. ,vol. 11, pp. 403- 418 ,(2012) , 10.1007/S10207-012-0177-2
Andrew McGregor, Ilya Mironov, Toniann Pitassi, Omer Reingold, Kunal Talwar, Salil Vadhan, The Limits of Two-Party Differential Privacy 2010 IEEE 51st Annual Symposium on Foundations of Computer Science. pp. 81- 90 ,(2010) , 10.1109/FOCS.2010.14
Craig Gentry, Fully homomorphic encryption using ideal lattices Proceedings of the 41st annual ACM symposium on Symposium on theory of computing - STOC '09. pp. 169- 178 ,(2009) , 10.1145/1536414.1536440
Adi Shamir, How to share a secret Communications of the ACM. ,vol. 22, pp. 612- 613 ,(1979) , 10.1145/359168.359176
Zhisheng Yan, Jingteng Xue, Chang Wen Chen, Prius: Hybrid Edge Cloud and Client Adaptation for HTTP Adaptive Streaming in Cellular Networks IEEE Transactions on Circuits and Systems for Video Technology. ,vol. 27, pp. 209- 222 ,(2017) , 10.1109/TCSVT.2016.2539827
Ran Gilad-Bachrach, Kristin Lauter, John Wernsing, Michael Naehrig, Kim Laine, Nathan Dowlin, CryptoNets: applying neural networks to encrypted data with high throughput and accuracy international conference on machine learning. pp. 201- 210 ,(2016)