SoK: Cryptography for neural networks

Monir Azraoui, Muhammad Bahram, Beyza Bozdemir, Sébastien Canard, Eleonora Ciceri, Orhan Ermis, Ramy Masalha, Marco Mosconi, Melek Önen, Marie Paindavoine, Boris Rozenberg, Bastien Vialla, Sauro Vicini

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the advent of big data technologies which bring better scalability and performance results, machine learning (ML) algorithms become affordable in several different applications and areas. The use of large volumes of data to obtain accurate predictions unfortunately come with a high cost in terms of privacy exposures. The underlying data are often personal or confidential and, therefore, need to be appropriately safeguarded. Given the cost of machine learning algorithms, these would need to be outsourced to third-party servers, and hence protection of the data becomes mandatory. While traditional data encryption solutions would not allow accessing the content of the data, these would, nevertheless, prevent third-party servers from executing the ML algorithms properly. The goal is, therefore, to come up with customized ML algorithms that would, by design, preserve the privacy of the processed data. Advanced cryptographic techniques such as fully homomorphic encryption or secure multi-party computation enable the execution of some operations over protected data and, therefore, can be considered as potential candidates for these algorithms. However, these techniques incur high computational and/or communication costs for some operations. In this paper, we propose a Systematization of Knowledge (SoK) whereby we analyze the tension between a particular ML technique, namely, neural networks (NN), and the characteristics of relevant cryptographic techniques.

Original languageEnglish
Title of host publicationPrivacy and Identity Management. Data for Better Living
Subtitle of host publicationAI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Revised Selected Papers
EditorsMichael Friedewald, Melek Önen, Eva Lievens, Stephan Krenn, Samuel Fricker
PublisherSpringer
Pages63-81
Number of pages19
ISBN (Print)9783030425036
DOIs
StatePublished - 2020
Externally publishedYes
Event14th IFIP International Summer School on Privacy and Identity Management, 2019 - Windisch, Switzerland
Duration: 19 Aug 201923 Aug 2019

Publication series

NameIFIP Advances in Information and Communication Technology
Volume576 LNCS
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X

Conference

Conference14th IFIP International Summer School on Privacy and Identity Management, 2019
Country/TerritorySwitzerland
CityWindisch
Period19/08/1923/08/19

Bibliographical note

Publisher Copyright:
© IFIP International Federation for Information Processing 2020.

Keywords

  • Homomorphic encryption
  • Neural networks
  • Privacy
  • Secure multi-party computation

ASJC Scopus subject areas

  • Information Systems and Management

Fingerprint

Dive into the research topics of 'SoK: Cryptography for neural networks'. Together they form a unique fingerprint.

Cite this