Skip to main content
Log in

Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data

  • Original Article
  • Published:
Neural Computing and Applications Aims and scope Submit manuscript

Abstract

Neural networks have been an active research area for decades. However, privacy bothers many when the training dataset for the neural networks is distributed between two parties, which is quite common nowadays. Existing cryptographic approaches such as secure scalar product protocol provide a secure way for neural network learning when the training dataset is vertically partitioned. In this paper, we present a privacy preserving algorithm for the neural network learning when the dataset is arbitrarily partitioned between the two parties. We show that our algorithm is very secure and leaks no knowledge (except the final weights learned by both parties) about other party’s data. We demonstrate the efficiency of our algorithm by experiments on real world data.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. Object corresponds to a row in database in this paper

References

  1. Agrawal D, Srikant R (2000) Privacy preserving data mining. In Proceedings of the ACM SIGMOD, pp 439–450

  2. Blake CL, Merz CJ (1998) UCI repository of machine learning databases, Department of Information and Computer Science, University of California, Irvine, CA. http://www.ics.uci.edu/mlearn/MLRepository.html

  3. Barni M, Orlandi C, Piva A (2006) A privacy-preserving protocol for neural-network-based computation. In: Proceeding of the 8th workshop on multimedia and security, pp 146–151

  4. Cranor LF, Reagle J, Ackerman MS (1999) Beyond concern: understanding net users attitudes about online privacy. Technical report TR 99.4.3, AT&T Labs-Research. Available from http://www.research.att.com/library/trs/TRs/99/99.4/99.4.3/report.htm

  5. Chen T, Zhong S (2009) Privacy preserving back-propagation neural network learning. IEEE Trans Neural Netw 20(10):1554–1564

    Article  Google Scholar 

  6. ElGamal T (1985) A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31(4):469–472

    Article  MATH  MathSciNet  Google Scholar 

  7. Cranor LF (ed) (1999) Special issue. Internet Priv Commun ACM 42(2)

  8. (2001) Standard for privacy of individually identifiable health information. Fed Regist 66(40). http://www.hhs.gov/ocr/hipaa/finalmaster.html.

  9. Goldreich O, Micali S, Wigderson A (1987) How to play ANY mental game. In: Proceedings of annual ACM conference on theory of computing, pp 218–229

  10. HIPPA, National Standards to Protect the Privacy of Personal Health Information. http://www.hhs.gov/ocr/hipaa/finalreg.html

  11. Jagannathan G, Wright RN (2005) Privacy-preserving distributed k-means clustering over arbitrarily partitioned data. In: Proceedings of the ACM SIGKDD, pp 593–599

  12. Kantarcioglu M, Clifton C (2004) Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Trans Knowl Data Eng 16(9):1026–1037

    Google Scholar 

  13. Lindell Y, Pinkas B (2000) Privacy preserving data mining. In: Proceedings of the 20th annual international cryptology conference on advances in cryptology, pp 36–54

  14. Vaidya J, Clifton C (2002) Privacy preserving association rule mining in vertically partitioned data. In: The eighth ACM SIGKDD international conference on knowledge discovery and data mining, pp 639–644

  15. Wan L, Ng WK, Han S, Lee VCS (2007) Privacy-preservation for gradient descent methods. In: Proceedings of ACM SIGKDD, pp 775–783

  16. Wright R, Yang Z (2004) Privacy preserving Bayesian network structure computation on distributed heterogeneous data. In: Proceedings of the tenth ACM SIGKDD international conference on knowledge discovery and data mining, pp 713–718

  17. Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science, pp 160–164

  18. Yang Z, Zhong S, Wright R (2005) Privacy-preserving classification of customer data without loss of accuracy. In: Proceedings of the 5th SIAM international conference on data mining (SDM)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sheng Zhong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bansal, A., Chen, T. & Zhong, S. Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data. Neural Comput & Applic 20, 143–150 (2011). https://doi.org/10.1007/s00521-010-0346-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00521-010-0346-z

Keywords

Navigation