introduction - Academic Science

advertisement
Privacy Preserving Made Practical with Cloud Computing
Back propagation & neural network learning
Deepansu Singh1, Suraj
Satav1
Prof Mohsin Mulla2
Students
Department of Computer
Engineering, GHRCEM
Pune
Department of Computer
Engineering, GHRCEM
Pune
mmoseen87@gmail.com2
deepf15@gmail.com, 1
surajsatav30891@gmail.com
Abstract: Privacy preserving in cloud is very difficult in
vertical approach for privacy preserving BPN network
today aspect. Cloud is mainly used for larger data
storage. Data Sharing is important in cloud storage. In
this paper, we are going to describe how efficiently and
flexibly one can share data and preserve it into the
cloud. Back Propagation neural networks help to train
data and load data and finally to improve the accuracy
of result. During the process, when multiple parties may
join through conducting back-propagation neural
network, no party wants to expose their own private
data to others. Existing models support this kind of
collaborative learning and limited in the way of data
partitioning or just only for two parties. There is a
problem, it just only for two parties. In our proposed
scheme, each party encrypts his/her own private data
locally & uploads ciphertexts into the cloud.
learning algorithm just only for two parties. Cloud
Keywords
storage is responsible for storing and keeping the data
available and accessible. The main concern is how to
share those encrypted data which were done at client
site. One can download the shared encrypted data from
server &decrypt them. ANN is used to train the data at
the beginning stage and apply BPNN to approximate
value of data. BPNN is used for error correction.
Scaling and transformation is used for encryption of
data. In our scheme privacy preserving in cloud
containing following functionalities:

In cloud we are going to provide privacy to
data at both client and server site after doing
Privacy preserving, Back-propagation neural
network (BPNN), Artificial neural network (ANN),
Cloud computing.
encryption at both the sides.

At the client site data encrypted with the help
of transformation and scaling.
INTRODUCTION

And we are going to train the data at the server
site with the help of ANN and minimize the
Privacy preserving is very important from the today’s
error with the help of BPNN and get
world’s aspect, and in cloud it is very difficult to
approximate result.
provide privacy to data. Due to this an encryption and

Cloud is helpful in storage of sensitive data
decryption technique is developed to preserve the data
such as Government data etc. we provide
and provide privacy to them. [1] Introduction to
privacy with our scheme.
horizontal approach for privacy preserving (BPN)

In cloud privacy is very important so, at server
network learning scheme. That enables two or more
site original data is transformed into another
than two parties together perform BPN network
and sent to client.
learning without disclosing their data. [2] Introduces



Then after client decrypt the data and generate
using BPNN with cloud computing in section V we
the result.
have discussed the proposed solutions for Privacy
Back-propagation provides training to the data
preserving using BPNN with cloud computing in
just like ANN. But it had two stages1) Feed
section VI we have highlighted the encryption and
forward, 2) Feed backward.
decryption in our project and finally in Section VII
In cloud, loss of data is very common term,
conclusion and Section VIII Future work.
that’s why we provide encryption to the data
for no data losing.
I. Artificial Neural Network
[Our contribution] In this work, we address this open
problem by incorporating the computing power of the
cloud. The main idea of our scheme can be summarized
as follows: is participant first encrypts her/his private
data with the system public key and then uploads the
cipher text to the cloud; the participants jointly decrypt
the results with which they update their respective
weights for the BPN network. During this process cloud
servers learn no privacy data of a participant even if
they collide with all the rest participants. Through
offloading the computation task to the resourceabundant
cloud,
our
computation/communication
scheme
makes
complexity
on
the
each
participant independent to the number of participants
and each thus, highly scalable. For privacy preservation,
we decompose most of the sub algorithms of BPNN
into simple operations such as addition, multiplication
and scalar product. As decryption of BGN is limited to
small numbers, we introduce a novel design in our
scheme such that arbitrarily large numbers can be
efficiently decrypted.
Artificial neural network is very useful for training of
data it work similarly as the brain does. It is composed
of a large number of interconnected nodes working
together to solve the specific problems. ANN provides
training of data at the beginning stage where the data is
totally blank. ANN is used for a specific application,
such as pattern recognition or speech recognition or
data classification through learning process. Learning is
a biological process which involves connection that
exists between the neurons or neural cells. An artificial
neuron is a neuron which consists of many inputs and
one output. ANN work as similar as human brain does.
There are following four advantages
: 1) Adaptive
learning 2) Self-organization 3) Real time operation 4)
Fault-tolerance.
The neurons as shown in fig. a. had two modes of
operation, the training mode and using mode. In
training mode, the neurons can be trained to fire for
particular input patterns. In the using mode, when an
input pattern is detected at the input, its associated
output becomes the current output.
Neural network process information in a similar way
In this paper we are detailing various flavors of Privacy
preserving using Back-propagation Neural Network
with cloud computing and their existing and proposed
the human brain does. The network is composed of a
large number of highly interconnected processing
elements working in parallel to solve specific problem.
solution, in section I we have discussed Artificial neural
network in Section II we have discussed Backpropagation neural network in Section III we have
discussed about Cloud computing in Section IV we
have discussed existing solutions for Privacy preserving
Use
X1
X2
Neuron
2
2
Inputs
Outputs
.
Xn
Teaching inputs
N
N
N
Input
Hidden
Output
Fig. b. BPNN
Fig. a. Neuron
As shown in fig. b, back propagation neural networks
used in all three layers of neurons, or nodes. Each node
of input and hidden layer is connected to each other.
And the nodes in the next layer i.e. hidden or output are
II. Back-Propagation Neural Network
Back propagation neural network algorithm is mainly
used to reduce the error with having threshold value
with them. It is a multi-layered feed forward or feed
backward network trained according to error backpropagation algorithm. It is one of the most widely used
and applied neural networks model. Back-propagation
is mainly used for learning and for considering to
solving problems with many inputs and outputs. Its
learning rule is to adapted in which the back
connected with previous connected nodes i.e. input and
hidden. All the connections between nodes are directed
means the information flows only one way, and there
are no connections between nodes within a particular
layer. Each connection between nodes has a weighing
factor or having the threshold value associated with it.
These weights are modified using the BPNN algorithm
during the training process, and threshold value is used
to minimize the error and provide appropriate result
using BPNN algorithm
propagation is used to regulate the threshold value &
the weight value and of the network to achieve the
III. Cloud
minimum error. It has been used successfully for wide
variety of application such as speech or voice
Cloud is used for larger data storage and for large
recognition,
medical
number of transferring of data from client to server or
diagnosis and automatic controls. When each entry of
server to client. Cloud storage is useful for storing
the trained data or sample set is presented to the
sensitive data i.e. Government data etc. Cloud storage
network, the network reads the inputs responds to the
providers are responsible for storing, keeping the data
sample input patterns. The output response is calculated
available and accessible. Cloud storage is gaining
and compared with other outputs to minimize the error
popularity recently. In enterprise has been an abrupt rise
value. On the basis of error, the connection weight and
in demand for data outsourcing, which serves in
adjusted.
management of co-operate data.
image,
Pattern
recognition,
Data sharing is important term in cloud. The main
concern is how to share those encrypted data. One can
download the shared encrypted data from server &
1
1
1
decrypt them. With the wireless technology, one can
access with an ease all their files and emails through
TPA performs six types of steps on the received
any network based devices whether it is mobile or
file/files from the respective client for storage across
computer. Sharing become even worse, in cloud
cloud with security and availability.
computing environment. Data is stored in single
physical machine and sharing of data is done from that
a) Received file
site only. Due to this cloud users may not hold a good
Third party auditor received from the client/clients.
trust that there data on the cloud server is secure from
interloper. Here users are allowed to encrypt their data
b) Partitioning file
on the client side with their encryption keys before
TPA file partition received from the client/clients.
uploading data in to the cloud.
c) Digital signature extraction
TPA extract digital signature from each file partition.
IV.
Existing Solutions:
d) Secret key generation
After partitioning, third party auditor generate secret
key of each partition respectively.
Cloud Server
e) Encryption
Third Party Auditor
TPA encrypts each partition using respective secret
Data flow
key/keys.
Cloud Server Provider
User
3. Server side:
Service Message Flow
a) Sending partition
Third party auditor sends the respective partition to the
Fig. c. partitioning and domain integrity
checking for data storage in cloud computing
respective storage.
b) Storing
The existing system represents how data is stored and
The storage server stores the partition received from the
distributed on the cloud using partitioning to provide
TPA.
security and availability across two servers.
Work Flow:
V. Proposed Scheme:
1. Client Side:
a) File Selection:
Fig. d. shows the proposed system. The system consist
The user/users select a file to upload on the server.
of end users, cloud server on which data to be stored.
b) Sending File
1) The user can login on his system.
the client/clients sends respective file to third party
2) After login he can send data to the server which is
auditor(TPA) across the network using a file transfer
training data.
protocol(FTP).
3) After receiving the data and ANN parameter by
2. TPA:
server using this data ANN server will trained.
4) Then he will waiting for test data from the user. Then
user loads the test data.
the help of transformation and scaling, and send the
5) The test data is received to the server then server can
data at the server site. Then after this server once more
apply privacy preserving BPNN on the data. Then this
encrypt the data (i.e. double encryption performed)
data is stored to that server.
when client asked for data. At the server site training of
6) User can retrieve this encoded data and decode
data using key.
data has been done with the help of ANN (Artificial
Neural Network) and back-propagation is doing several
times for the original data. There after encrypted data
sent to the client. At the client site decryption of data is
Server
done and generates the result.
B.P.N.N
6. Data Received
Glass Fish
Database
Web Services
7. ANN parameter
received
8. Train using ANN
9. Wait for the test
data received
VII. Conclusion
In this paper we proposed fully homomorphic
encryption system for the data storage security in the
cloud computing. We have integrated the fully
12. Test data
SOAP/XML
13. Apply privacy
preserving BPNN
homomorphic encryption in TPA (Third Party Auditor)
system. Cloud data storage networks include a Third
Party Auditor which has the power and capabilities that
14. Result
a client does not have. The problem of data security and
integrity has been presented. The proposed system, we
1. Login (using DSA)
purposed the first secure and practical multiparty BPN
2. Load training data
network learning scheme over arbitrarily partitioned
3. Transform Data
data. In the purposed system, the parties encrypt their
arbitrarily partitioned data and upload the cipher texts to
4. Encoded data using
key
the clouds. The cloud can execute most operation
5. Submit to server
pertaining to the BPN network learning algorithm
10. Load test data &
transform
11. Encode using keys
and submit
15. Receive results
without knowing any private information. Cost of each
party in our scheme is independent to the no of parties.
Complexity and security analysis shows that our
purposed scheme is scalable, efficient and secure. We
provide encryption at both client and server site
16. Decode results using
keys
17. Done
Fig. d. Privacy Preserving Using ANN over Cloud
VIII. Future Work
Our future work is to implement RSA algorithm and
BPNN ANN algorithm to improve privacy of data in
VI.
Encryption And Decryption
cloud storage and compare it with other schemes and
algorithms based on true positive result and with
Firstly we have to encrypt the data at the client site with
various network scenarios and parameters. We are
going to use transformation and scaling at client site for
data encryption and send the encrypted data to server
then their server trains the data and encrypt the data,
then after data sent to client. Then client decrypts the
data and generate the result.
[1] N. Schlitter. A protocol for privacy preserving neural
network learning on horizontal partitioned data. In
proceedings of privacy statistics in Databases. (PSD),
Sep.2008.
[2] T. Chen and S. Zhong Privacy-Preserving back
propagation neural network learning. Trans, Neur. Netw.,
20(10): 1554-1564, OCT 2009. L. CON, B. Boser, J.S.
Denker, D. Henderson, R.E. Howard, and L.D. Jackel.
Handwritten digital recognition with a back-propagation
neural network. In advances in neural information
processing systems, Pages 396-404-Morgan Kaufmann,
1990.
[3] BURMI. M., ORLANDI, C., & Piva, A (2006). A
privacy preserving protocol for neural-network-Based
Computation Trans.
[4] K. FLOURI, B. BEFERULL-Lozano, and P.
TSAKALIDES, “Training a SVM-Based Classifier in
Distributed Sensor Networks,” Proc. 14th European
Signal Processing Conf., pp. 1-5, 2006.
[5] S.
STOLFO,
A.L.P.S. TSELEPIS, A.L.
PRODROMIDIS, S.TSELEPIS, W.LEE, D.W.
Fan, and P.K. Chan, ”JAM: Java agents for MetaLearning over distributed databases, ” Proc. Third
INT’ I Conf. Knowledge Discovery and Data
Mining, pp. 74-81, 1997.
[6] “National Standards to Protect the Privacy of Personal
Health
Information,”
http://www.hhs.gov/ocr/hipaa/finalreg.html, 2013.
[7] “The Health Insurance Portability and Accountability
Act
of
Privacy
and
Security
Rules,”
http://www.hhs.gov/ocr/privacy, 2013.
REFERENCES
Download