BUNET: Blind Medical Image Segmentation Based on Secure UNET
- URL: http://arxiv.org/abs/2007.06855v1
- Date: Tue, 14 Jul 2020 07:05:23 GMT
- Title: BUNET: Blind Medical Image Segmentation Based on Secure UNET
- Authors: Song Bian, Xiaowei Xu, Weiwen Jiang, Yiyu Shi, Takashi Sato
- Abstract summary: We propose blind UNET (BUNET), a secure protocol that implements privacy-preserving medical image segmentation based on the UNET architecture.
In BUNET, we efficiently utilize cryptographic primitives such as homomorphic encryption and garbled circuits (GC) to design a complete secure protocol for the UNET neural architecture.
We show that we can achieve up to 14x inference time reduction compared to the-state-of-the-art secure inference technique on a baseline architecture with negligible accuracy degradation.
- Score: 24.374253627122467
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The strict security requirements placed on medical records by various privacy
regulations become major obstacles in the age of big data. To ensure efficient
machine learning as a service schemes while protecting data confidentiality, in
this work, we propose blind UNET (BUNET), a secure protocol that implements
privacy-preserving medical image segmentation based on the UNET architecture.
In BUNET, we efficiently utilize cryptographic primitives such as homomorphic
encryption and garbled circuits (GC) to design a complete secure protocol for
the UNET neural architecture. In addition, we perform extensive architectural
search in reducing the computational bottleneck of GC-based secure activation
protocols with high-dimensional input data. In the experiment, we thoroughly
examine the parameter space of our protocol, and show that we can achieve up to
14x inference time reduction compared to the-state-of-the-art secure inference
technique on a baseline architecture with negligible accuracy degradation.
Related papers
- HOPE: Homomorphic Order-Preserving Encryption for Outsourced Databases -- A Stateless Approach [1.1701842638497677]
Homomorphic OPE (HOPE) is a new OPE scheme that eliminates client-side storage and avoids additional client-server interaction during query execution.
We provide a formal cryptographic analysis of HOPE, proving its security under the widely accepted IND-OCPA model.
arXiv Detail & Related papers (2024-11-26T00:38:46Z) - ViT Enhanced Privacy-Preserving Secure Medical Data Sharing and Classification [8.140412831443454]
This research introduces a secure framework consisting of a learnable encryption method based on the block-pixel operation to encrypt the data and subsequently integrate it with the Vision Transformer (ViT)
The proposed framework ensures data privacy and security by creating unique scrambling patterns per key, providing robust performance against leading bit attacks and minimum difference attacks.
arXiv Detail & Related papers (2024-11-08T16:33:20Z) - TernaryVote: Differentially Private, Communication Efficient, and
Byzantine Resilient Distributed Optimization on Heterogeneous Data [50.797729676285876]
We propose TernaryVote, which combines a ternary compressor and the majority vote mechanism to realize differential privacy, gradient compression, and Byzantine resilience simultaneously.
We theoretically quantify the privacy guarantee through the lens of the emerging f-differential privacy (DP) and the Byzantine resilience of the proposed algorithm.
arXiv Detail & Related papers (2024-02-16T16:41:14Z) - Seagull: Privacy preserving network verification system [0.0]
This paper introduces a novel approach to verify the correctness of configurations in the internet backbone governed by the BGP protocol.
Not only does our proposed solution effectively address scalability concerns, but it also establishes a robust privacy framework.
arXiv Detail & Related papers (2024-02-14T05:56:51Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - A privacy-preserving data storage and service framework based on deep
learning and blockchain for construction workers' wearable IoT sensors [0.0]
Classifying brain signals collected by wearable Internet of Things (IoT) sensors, especially brain-computer interfaces (BCIs), is one of the fastest-growing areas of research.
In this article, we try to bridge this gap and propose a secure privacy-preserving protocol for implementing BCI applications.
We first transformed brain signals into images and used generative adversarial network to generate synthetic signals to protect data privacy.
In addition, we proposed a blockchain-based scheme and developed a prototype, which aims to make storing, querying and sharing personal neurophysiological data and analysis reports secure and privacy-aware.
arXiv Detail & Related papers (2022-11-19T14:57:19Z) - Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive
Privacy Analysis and Beyond [57.10914865054868]
We consider vertical logistic regression (VLR) trained with mini-batch descent gradient.
We provide a comprehensive and rigorous privacy analysis of VLR in a class of open-source Federated Learning frameworks.
arXiv Detail & Related papers (2022-07-19T05:47:30Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv Detail & Related papers (2021-06-03T16:45:40Z) - A Systematic Comparison of Encrypted Machine Learning Solutions for
Image Classification [11.6906656396618]
This work provides a comprehensive review of existing frameworks based on secure computing techniques in the context of private image classification.
Experiments were conducted using four state-of-the-art libraries implementing secure computing at the heart of the data science stack.
arXiv Detail & Related papers (2020-11-10T18:33:31Z) - CryptoSPN: Privacy-preserving Sum-Product Network Inference [84.88362774693914]
We present a framework for privacy-preserving inference of sum-product networks (SPNs)
CryptoSPN achieves highly efficient and accurate inference in the order of seconds for medium-sized SPNs.
arXiv Detail & Related papers (2020-02-03T14:49:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.