Machine learning security aggregation prediction method and system supporting bidirectional privacy protection

A technology of machine learning and security aggregation, applied in the field of machine learning, can solve the problems of privacy leakage, limit predictable data, and patients' data cannot be directly disclosed to other hospitals (teachers, etc.), so as to avoid privacy costs and increase flexibility.

Active Publication Date: 2021-02-09
杭州量安科技有限公司
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] First of all, in terms of privacy, PATE aggregates the prediction results of multiple teachers through a trusted aggregator, but there is no completely trusted entity in reality. If the aggregator is malicious or half-honest, the prediction results will be directly leaked
Second, if the student model has no public data, or the data held by the student model is also private, the privacy of the student model data cannot be guaranteed
Imagine that a hospital wants to train a machine learning model to help infer the patient's condition, and help itself (students) mark the data set through other hospitals (teachers). However, since the patient's data cannot be directly disclosed to other hospitals (teachers), in this case PATE Frameworks cannot provide effective privacy guarantees
Moreover, if the adversary corrupts the students and reversely attacks the teacher model through the teacher's prediction results (membership inference attack), the privacy of the teacher model and its training data cannot be guaranteed.
The above problems have caused two-way privacy leakage
In terms of performance, since the PATE framework provides privacy guarantees through differential privacy, but in order to control privacy costs, it also limits the amount of predictable data
In addition, the PATE framework can only be deployed locally, that is, the teacher model can only provide predictions locally, which requires the teacher to remain online during prediction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Machine learning security aggregation prediction method and system supporting bidirectional privacy protection
  • Machine learning security aggregation prediction method and system supporting bidirectional privacy protection
  • Machine learning security aggregation prediction method and system supporting bidirectional privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] This embodiment provides a machine learning security aggregation prediction method that supports two-way privacy protection;

[0040] A machine learning security aggregation prediction method that supports two-way privacy protection, including:

[0041] S101: Calculate the data share of the server receiving the data to be predicted sent by the client;

[0042] S102: The calculation server processes the data share to obtain the forecast result share;

[0043] S103: The calculation server performs blinding processing on the prediction result share to obtain the blinded prediction result share;

[0044] S104: The calculation server sends the blinded prediction result share to the aggregation server;

[0045] S105: The aggregation server performs blinding removal and noise addition processing on the blinded prediction result share, and feeds back the result to the client.

[0046] As one or more embodiments, before step S101 of the method, it also include...

Embodiment 2

[0123] This embodiment provides a machine learning security aggregation prediction system that supports two-way privacy protection;

[0124] A machine learning security aggregation prediction system that supports two-way privacy protection, including: client, computing server, and aggregation server;

[0125] The calculation server receives the data share of the data to be predicted sent by the client; the calculation server processes the data share to obtain the forecast result share; the calculation server blinds the prediction result share to obtain the blinded forecast result share; The calculation server sends the blinded prediction result share to the aggregation server; the aggregation server performs blinding removal and noise addition processing on the blinded prediction result share, and feeds back the result to the client.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a machine learning security aggregation prediction method and system supporting bidirectional privacy protection. The system comprises a client, a calculation server and an aggregation server. The calculation server receives the data share of the to-be-predicted data sent by the client; the calculation server processes the data share to obtain a prediction result share; thecalculation server performs blinding on the prediction result share to obtain a blinded prediction result share; the calculation server sends the blind prediction result share to an aggregation server; and the aggregation server performs blinding removal and noise addition on the blinding prediction result share, and feeds back a result to the client.

Description

technical field [0001] This application relates to the technical field of machine learning, in particular to a machine learning security aggregation prediction method and system supporting two-way privacy protection. Background technique [0002] The statements in this section merely mention the background art related to this application, and do not necessarily constitute the prior art. [0003] Driven by technologies such as big data and machine learning, artificial intelligence technology has changed people's lifestyles, such as face recognition, voice recognition, recommendation systems, and unmanned vehicles. But what followed was the abuse of personal privacy information, and frequent leaks. The performance of machine learning and deep learning algorithms all rely on a large amount of training data collected in advance, which may involve sensitive user information, such as medical records, user credit records, etc. A large number of studies have shown that machine lea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/62G06K9/62G06N20/00
CPCG06F21/55G06F21/6245G06N20/00G06F18/214
Inventor 赵川赵埼荆山张波陈贞翔贾忠田
Owner 杭州量安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products