Author : Avinash Thube 1
Date of Publication :7th April 2016
Abstract: Back-propagation Neural Network is one of the important machines learning technique for classification Accuracy of any machine learning technique is improved with volume of datasets. Recent developments in computer networks provide such environment that multiple users connect with each other. This scenario leads in development of machine learning technique with collaborative or joint participation of these multiple users. In collaborative learning multiple parties participate jointly in learning where data is shared by users may contain sensitive information such as corporate data, health care data and personal data. There are chances of data leakage by any corrupt party or intruders. Users are concern about privacy of their datasets due to this main hurdle in collaborative machine learning technique many users are not interested to participate. In this project we are giving solution to privacy of individual user’s data by converting data in the form of cipher texts where users can use these cipher texts directly in the learning process. A machine learning system working on cipher texts needs various computations. Recent development in cloud computing provides good computing environment where we are utilizing these computations. In this way a system will be developed with neural network machine learning technique working on cipher text and utilizing cloud computing services.
Reference :
-
- HIPPA, National Standards to Protect the Privacy of Personal Health Information, http://www.hhs.gov/ocr/hipaa/finalreg.html.
- S. Pearson, Y. Shen, and M. Mowbray, “A Privacy Manager for Cloud Computing,” Proc. Int’l Conf. Cloud Computing (CloudCom), pp. 90-106, 2009.
- N. Schlitter, “A Protocol for Privacy Preserving Neural Network Learning on Horizontal Partitioned Data,” Proc. Privacy Statistics in Databases (PSD ’08), Sept. 2008
- Yogachandran Rahulamathavan, Suresh Veluru, Kanapathippillai, Cumanan and Muttukrishnan Rajarajan,”Privacy-Preserving Multi-Class Support Vector Machine for Outsourcing the Data Classification in Cloud”, IEEE transaction on Dependable and Secure Computing, vol. 11, no. 5, September/October 2014
- Anak Agung Putri Ratna, Ahmad Shaugi, Prima Dewi Purnamasari, Muhammad Salman,”Analysis and comparison of MD5 and SHA-1 algorithm implementation in Simple-O authentication based security system”, IEEE Conference on Quality in Research, 2013
- C. Lee Giles, Fellow, IEEE, Christian W. Omlin, and Karvel K. Thornber,” Equivalence in Knowledge Representation: Automata, Recurrent Neural Networks, and Dynamical Fuzzy Systems”, IEEE, vol. 87, no. 9, september 1999
- Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou And Y. Thomas Hou,”Toward Privacy-Assured And Searchable Cloud Data Storage Services”, Proc. IEEE Network, July/August 2013
- Jiawei Yuan, Shuchng Yu,”Privacy Preserving BackPropagation Neural Network Learning Made Practical with Cloud Computing”, IEEE Transaction on Parallel and Distributed Systems,vol.25,NO.1, January 2014.
- Durand Cutler. "Transformations" (http://groups. csail.mit.edu/graphics/classes/6837/F03/lectures/04_tran sformations.ppt)(PowerPoint). Massachusetts Institute of Technology. Retrieved 12 September 2008
- http://en.wikipedia.org/wiki/Advanced_Encryption_Stan dard.
- http://en.wikipedia.org/wiki/SHA-1.