BUNET: Blind Medical Image Segmentation Based on Secure UNET
- URL: http://arxiv.org/abs/2007.06855v1
- Date: Tue, 14 Jul 2020 07:05:23 GMT
- Title: BUNET: Blind Medical Image Segmentation Based on Secure UNET
- Authors: Song Bian, Xiaowei Xu, Weiwen Jiang, Yiyu Shi, Takashi Sato
- Abstract summary: We propose blind UNET (BUNET), a secure protocol that implements privacy-preserving medical image segmentation based on the UNET architecture.
In BUNET, we efficiently utilize cryptographic primitives such as homomorphic encryption and garbled circuits (GC) to design a complete secure protocol for the UNET neural architecture.
We show that we can achieve up to 14x inference time reduction compared to the-state-of-the-art secure inference technique on a baseline architecture with negligible accuracy degradation.
- Score: 24.374253627122467
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The strict security requirements placed on medical records by various privacy
regulations become major obstacles in the age of big data. To ensure efficient
machine learning as a service schemes while protecting data confidentiality, in
this work, we propose blind UNET (BUNET), a secure protocol that implements
privacy-preserving medical image segmentation based on the UNET architecture.
In BUNET, we efficiently utilize cryptographic primitives such as homomorphic
encryption and garbled circuits (GC) to design a complete secure protocol for
the UNET neural architecture. In addition, we perform extensive architectural
search in reducing the computational bottleneck of GC-based secure activation
protocols with high-dimensional input data. In the experiment, we thoroughly
examine the parameter space of our protocol, and show that we can achieve up to
14x inference time reduction compared to the-state-of-the-art secure inference
technique on a baseline architecture with negligible accuracy degradation.
Related papers
- TernaryVote: Differentially Private, Communication Efficient, and
Byzantine Resilient Distributed Optimization on Heterogeneous Data [50.797729676285876]
We propose TernaryVote, which combines a ternary compressor and the majority vote mechanism to realize differential privacy, gradient compression, and Byzantine resilience simultaneously.
We theoretically quantify the privacy guarantee through the lens of the emerging f-differential privacy (DP) and the Byzantine resilience of the proposed algorithm.
arXiv Detail & Related papers (2024-02-16T16:41:14Z) - Seagull: Privacy preserving network verification system [0.0]
This paper introduces a novel approach to verify the correctness of configurations in the internet backbone governed by the BGP protocol.
Not only does our proposed solution effectively address scalability concerns, but it also establishes a robust privacy framework.
arXiv Detail & Related papers (2024-02-14T05:56:51Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - MirrorNet: A TEE-Friendly Framework for Secure On-device DNN Inference [14.08010398777227]
Deep neural network (DNN) models have become prevalent in edge devices for real-time inference.
Existing defense approaches fail to fully safeguard model confidentiality or result in significant latency issues.
This paper presents MirrorNet, which generates a TEE-friendly implementation for any given DNN model to protect the model confidentiality.
For the evaluation, MirrorNet can achieve a 18.6% accuracy gap between authenticated and illegal use, while only introducing 0.99% hardware overhead.
arXiv Detail & Related papers (2023-11-16T01:21:19Z) - SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - RRNet: Towards ReLU-Reduced Neural Network for Two-party Computation
Based Private Inference [17.299835585861747]
We introduce RRNet, a framework that aims to jointly reduce the overhead of MPC comparison protocols and accelerate computation through hardware acceleration.
Our approach integrates the hardware latency of cryptographic building blocks into the DNN loss function, resulting in improved energy efficiency, accuracy, and security guarantees.
arXiv Detail & Related papers (2023-02-05T04:02:13Z) - A privacy-preserving data storage and service framework based on deep
learning and blockchain for construction workers' wearable IoT sensors [0.0]
Classifying brain signals collected by wearable Internet of Things (IoT) sensors, especially brain-computer interfaces (BCIs), is one of the fastest-growing areas of research.
In this article, we try to bridge this gap and propose a secure privacy-preserving protocol for implementing BCI applications.
We first transformed brain signals into images and used generative adversarial network to generate synthetic signals to protect data privacy.
In addition, we proposed a blockchain-based scheme and developed a prototype, which aims to make storing, querying and sharing personal neurophysiological data and analysis reports secure and privacy-aware.
arXiv Detail & Related papers (2022-11-19T14:57:19Z) - Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive
Privacy Analysis and Beyond [57.10914865054868]
We consider vertical logistic regression (VLR) trained with mini-batch descent gradient.
We provide a comprehensive and rigorous privacy analysis of VLR in a class of open-source Federated Learning frameworks.
arXiv Detail & Related papers (2022-07-19T05:47:30Z) - Safe RAN control: A Symbolic Reinforcement Learning Approach [62.997667081978825]
We present a Symbolic Reinforcement Learning (SRL) based architecture for safety control of Radio Access Network (RAN) applications.
We provide a purely automated procedure in which a user can specify high-level logical safety specifications for a given cellular network topology.
We introduce a user interface (UI) developed to help a user set intent specifications to the system, and inspect the difference in agent proposed actions.
arXiv Detail & Related papers (2021-06-03T16:45:40Z) - A Systematic Comparison of Encrypted Machine Learning Solutions for
Image Classification [11.6906656396618]
This work provides a comprehensive review of existing frameworks based on secure computing techniques in the context of private image classification.
Experiments were conducted using four state-of-the-art libraries implementing secure computing at the heart of the data science stack.
arXiv Detail & Related papers (2020-11-10T18:33:31Z) - CryptoSPN: Privacy-preserving Sum-Product Network Inference [84.88362774693914]
We present a framework for privacy-preserving inference of sum-product networks (SPNs)
CryptoSPN achieves highly efficient and accurate inference in the order of seconds for medium-sized SPNs.
arXiv Detail & Related papers (2020-02-03T14:49:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.