Font Size: a A A

Outsourced Machine Learning With Privacy Protection

Posted on:2020-05-22Degree:DoctorType:Dissertation
Country:ChinaCandidate:S S HuFull Text:PDF
GTID:1368330590453778Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
With the rapid growth of cloud computing,and increasing storage and communication requirements,today's organizations demonstrate a strong tendency to outsource their data to remote servers like cloud service providers in order to relieve themselves from the complex data management and expensive computation overheads.Since the outsourced data may contain sensitive information,the data owners usually opt to encrypt their data,e.g.,financial transactions,medical records and locations,before outsourcing to the server.Nevertheless,this in turn greatly hinders the data utilization.On the other hand,machine learning has shown its huge success in various kinds of areas in recent years.Outsourcing expensive machine learning tasks to a remote server is a promising approach for ordinary users who have limited computing resources.This thesis therefore focuses on the problem of privacy-preserving outsourcing computation for machine learning.By dividing machine learning into three stages,i.e.,feature extraction,model training and model application,we conquer them individually.The first part of the thesis is concerned with the design of privacy-preserving outsourcing of feature extraction.More specifically,we mainly focus on two prevailing feature extraction algorithms: scaleinvariant feature transform(SIFT)and Speeded-up Robust Features(SURF),and propose two new privacy-preserving outsourcing protocols for them where the key characteristics of feature descriptors are well preserved.In the second part of the thesis,two typical traditional training methods,ridge regression analysis and canonical correlation analysis(CCA),are investigated.A library of building blocks are first designed to support various arithmetics over encrypted real numbers.Based on this,we develop two approaches to perform ridge regression and CCA in the ciphertext domain where the accuracy of the learned models should be improved as much as possible.Finally,biometric identification,a typical model application scenario,is considered to show how to efficiently perform biometric identification jobs over encrypted outsourced biometric data without revealing their private information.Two solutions with different security levels are proposed,leading to a tradeoff between the privacy and efficiency.
Keywords/Search Tags:Machine Learning, Privacy Preservation, Outsroucing Computation, Homomorphic Encryption
PDF Full Text Request
Related items