Method and system for machine learning secure aggregation prediction supporting bidirectional privacy protection

A machine learning and security aggregation technology, applied in the field of machine learning, can solve the problems of privacy leakage, inability to guarantee the privacy of teacher model training data, leakage of prediction results, etc., to achieve the effect of increasing flexibility

Active Publication Date: 2022-07-26
杭州量安科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] First of all, in terms of privacy, PATE aggregates the prediction results of multiple teachers through a trusted aggregator, but there is no completely trusted entity in reality. If the aggregator is malicious or half-honest, the prediction results will be directly leaked
Second, if the student model has no public data, or the data held by the student model is also private, the privacy of the student model data cannot be guaranteed
Imagine that a hospital wants to train a machine learning model to help infer the patient's condition, and help itself (students) mark the data set through other hospitals (teachers). However, since the patient's data cannot be directly disclosed to other hospitals (teachers), in this case PATE Frameworks cannot provide effective privacy guarantees
Moreover, if the adversary corrupts the students and reversely attacks the teacher model through the teacher's prediction results (membership inference attack), the privacy of the teacher model and its training data cannot be guaranteed.
The above problems have caused two-way privacy leakage
In terms of performance, since the PATE framework provides privacy guarantees through differential privacy, but in order to control privacy costs, it also limits the amount of predictable data
In addition, the PATE framework can only be deployed locally, that is, the teacher model can only provide predictions locally, which requires the teacher to remain online during prediction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for machine learning secure aggregation prediction supporting bidirectional privacy protection
  • Method and system for machine learning secure aggregation prediction supporting bidirectional privacy protection
  • Method and system for machine learning secure aggregation prediction supporting bidirectional privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] This embodiment provides a machine learning security aggregation prediction method that supports bidirectional privacy protection;

[0040] Machine learning secure aggregate prediction methods that support bidirectional privacy protection, including:

[0041] S101: The calculation server receives the data share of the data to be predicted sent by the client;

[0042] S102: the computing server processes the data share to obtain a predicted result share;

[0043] S103: The computing server performs blinding processing on the prediction result share to obtain a blinded prediction result share;

[0044] S104: The computing server sends the blinded prediction result share to the aggregation server;

[0045] S105: The aggregation server performs blind removal processing and noise addition processing on the shares of the blinded prediction results, and feeds back the results to the client.

[0046] As one or more embodiments, before step S101, the method fu...

Embodiment 2

[0123] This embodiment provides a machine learning security aggregation prediction system that supports bidirectional privacy protection;

[0124] A machine learning security aggregation prediction system that supports bidirectional privacy protection, including: client, computing server and aggregation server;

[0125] The calculation server receives the data share of the data to be predicted sent by the client; the calculation server processes the data share to obtain the prediction result share; the calculation server performs blind processing on the prediction result share to obtain the blind prediction result share; The computing server sends the blind prediction result share to the aggregation server; the aggregation server performs blind removal processing and noise addition processing on the blind prediction result share, and feeds back the result to the client.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses a machine learning security aggregation prediction method and system that supports bidirectional privacy protection, including: a client, a computing server, and an aggregation server; the computing server receives the data share of the data to be predicted sent by the client; Perform processing to obtain the forecast result share; the computing server performs blind processing on the forecast result share to obtain the blind forecast result share; the computing server sends the blind forecast result share to the aggregation server; The prediction result share is subjected to blind removal processing and noise processing, and the results are fed back to the client.

Description

technical field [0001] The present application relates to the technical field of machine learning, and in particular, to a method and system for machine learning security aggregation prediction that supports bidirectional privacy protection. Background technique [0002] The statements in this section merely mention the background art related to the present application and do not necessarily constitute prior art. [0003] Driven by technologies such as big data and machine learning, artificial intelligence technology has changed people's way of life, such as face, speech recognition, recommendation systems, unmanned vehicles, etc. But what followed was the abuse of personal privacy information, and leakage incidents occurred frequently. The performance of machine learning and deep learning algorithms all rely on a large amount of training data collected in advance, which may involve sensitive user information, such as medical records, user credit records, etc. A large numb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/62G06K9/62G06N20/00
CPCG06F21/55G06F21/6245G06N20/00G06F18/214
Inventor 赵川赵埼荆山张波陈贞翔贾忠田
Owner 杭州量安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products