SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 75-79
www.iosrjournals.org
DOI: 10.9790/0661-17217579 www.iosrjournals.org 75 | Page
Back-Propagation Neural Network Learning with Preserved
Privacy using Cloud Computing
1
Mrs. Valli N, 2
Mr. H.Anwar Basha
1
PG Scholar S.A. Engineering College Chennai, India
2
Assistant Professor, CSE S.A.Engineering College Chennai, India
Abstract: Cloud computing facilitates the owners to share data. Multiple parties join the learning process by
conducting joint Back propagation neural network algorithm on the union of their respective data sets. During
the learning process none of the party wants to disclose her/his private data to others. The limitations of the
existing schemes are learning process for only two parties or the few ways in which the data is arbitrarily
partitioned. The proposed solution allows two or more parties, each with an arbitrarily partitioned data set, to
jointly conduct the learning. The solution is provided by the magnificent power of cloud computing. In the
proposed scheme, each owner encrypts his/her private dataset locally through AES cryptography and uploads
the cipher texts into the cloud. The cloud then executes most of the operations over cipher texts via BGN
homomorphic algorithm. The cloud is unaware of the original dataset. The Back propagation learning takes
place and the owners are benefited through collaborative learning. Thus the scalability of the learning process
is improved and the privacy of the data is ensured.
Keywords: Privacy preserving, learning, neural network, back-propagation, cloud computing, computation
outsource, homomorphic encryption
I. Introduction
The multiparty learning in Neural Networks through Back Propagation Algorithm has always been a
challenging scenario. With cloud computing infrastructure, we can solve this problem.
Cloud computing involves deployment of groups of remote servers and software networks and other
resources that allow centralized access to storage and computer services or resources. Clouds can be classified
as public, private or hybrid based on their deployment model. Public cloud is accessible by all and private cloud
is protected within the boundary of an organization say corporate through firewalls whereas hybrid cloud is a
combination of both public and private cloud. With cloud there is a shift from CAPEX model to OPEX model in
most of the organizations.
With the increased use of cloud computing, there is a new paradigm emerging – cloud computing
security. Cloud computing security is the set of policies, tools and regulations to ensure that data is secure in
cloud computing atmosphere. To make sure the data is secure and privacy of the dataset is maintained, we make
use of AES (Advanced Encryption Standard) and RSA (Rivest, Shamir and Adleman) algorithms.
The back propagation neural network algorithm is the most widely used algorithm for learning in
neural network. It is the workhorse in neural networks. Neural networks are composed of artificial neurons that
simulate the human brain. The neural network is trained with numerous examples and it learns from these
examples. Back propagation is one such scheme where the supervised learning takes place by examples. It
makes use of activation function and makes the network learn by examples by adjusting the weights of the edges
in the neural network. The activation function can be a step function or sigmoid function. Usually sigmoid
function is used.
II. System Model
The system consists of three major components:
 Trust Agent
 Cloud
 Owners
The trust agent is a government agency that activates the owner‟s account. The owner registers with the
trust agent and uploads the data only when the owners‟s account is active. The uploaded data is encrypted using
AES cryptography. The ciphertext is manipulated by the cloud to perform additive and multiplicative operations
using bgn homomorphic algorithm. The learning takes place using back propagation algorithm. It is then
collaboratively shared.
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing
DOI: 10.9790/0661-17217579 www.iosrjournals.org 76 | Page
Fig1 shows the overall description of Collaborative Learning
III. Security Model
The Trust Agent is usually a government agency that authenticates the owner by verifying the owner
details. In the proposed solution, the cloud generates the keys and distributes to the owners. The security of the
system is improved as the cloud does not know the data of the owners.
IV. System Description
A. Authenticating the Owner
It is performed by Trust Agent. Owner‟s account is activated after the authentication of the owner by
the Trust Agent. The owner registers with the trust agent and the trust agent confirms his registration. Only after
the confirmation of registration the owner‟s account is made active.
B. Uploading the data
The owner uploads the data in cloud. The owner can upload as many times as required. Owner owns a
private data set and wants to perform collaborative learning. For this he loads the encrypted data in cloud. Each
participating party s, denoted as Ps, owns a private data set and wants to perform collaborative BPN network
learning with all other participating parties. That is, they will collaboratively conduct learning over the
arbitrarily partitioned data set, which is private and cannot be disclosed during the whole learning process. We
assume that each participating party stays online with broadband access to the cloud and is equipped with one or
several contemporary computers, which can work in parallel if there is more than one.
C. Arbitrarily partitioning data
Combination of horizontal and vertical partitioning is done. The rows and columns are not partitioned
in any particular order. It is done arbitrarily. We consider arbitrary partitioning of data between two parties. In
arbitrary partitioning of data between two parties, there is no specific order of how the data is divided between
two parties. Combined data of two parties can be seen as a database. Suppose D is the data to be partitioned then
Di is the partition of data D such that D1∩D2∩D3∩………….Dn=∅
and D1∩D2∩D3∩………….Dn=D
D. Encrypting the data
AES (Advanced Encryption System) is used to encrypt the data and the encrypted data is uploaded in
cloud. This is the fundamental encryption that takes place. This produces the cipher text upon which BGN
algorithm is applied.
E. Homomorphically encrypting data
BGN (Boneh, Goh and Nissim algorithm is used to encrypt the cipher text and the encrypted cipher
text is available in cloud. It is called doubly homomorphic encryption. Homomorphic encryption enables
operations on plaintexts to be performed on their respective cipher texts without disclosing the plaintexts. Most
existing homomorphic encryption schemes only support single operation - either addition or multiplication. It
introduced a public-key „doubly homomorphic encryption scheme (called „BGN‟ for short), which
simultaneously supports one multiplication and unlimited number of addition operations. Therefore, given
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing
DOI: 10.9790/0661-17217579 www.iosrjournals.org 77 | Page
cipher texts C(m1), C(m2), …. C(mi) and C( ˆ m1), C(ˆm2),….C(ˆmi), one can compute C(m1mˆ1+m2mˆ2+・
・ ・+mimˆi) without knowing the plaintext, where C() is the cipher text of message mi or mˆi, encrypted by
the system‟s public key.
Fig 3: Scalar Product and Sum
Fig 3[12] illustrates the calculation of scalar product and Sum. The cloud calculates first the product of
cipher text and then it calculates the sum of the product obtained in the previous step. The C(m1) is multiplied
with C(m^1) and then added with C(m2) multiplied with C(m^2).
F. Back Propagation Learning
Back propagation, otherwise known as "backward propagation of errors", is a common method of
learning in artificial neural networks. From a desired output, the network learns from many inputs Back-
Propagation neural network learning algorithm is mainly composed of two stages: feed forward and error back −
propagation. In Feed Forward the network is trained with many inputs and the output is generated as a sigmoid
function of the inputs. The actual output and the expected output is compared and then the difference is
calculated as error. The error is then propagated backwards in the network and the internal weights adjusted so
that the difference between the actual and expected weight diminishes.
The input and output [10] of the neuron, i, (except for the input layer) in a multilayer perceptron mode,
according to the Back Propagation algorithm are:
Input xi=∑wijoj+bi (1)
Output oi=f (xi) (2)
Where Wij is the weight of the connection from neuron i to node j, bi is the numerical value and f is the
activation function.
Fig. 2. Configuration of Back Propagation Network
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing
DOI: 10.9790/0661-17217579 www.iosrjournals.org 78 | Page
Fig.1[10] shows is a configuration for a three layered Back Propagation network. The inputs are feeded
to the input layer. The weights are assigned to the edges connecting these layers and the output is calculated
with the help of sigmoid function. The difference between the actual and the desired output is calculated and this
difference is observed as error. A fraction of the error is back propagated to the hidden layer and input layer and
then the sigmoid function again calculates the actual output. The difference is noted and this process is repeated
until the error becomes negligible.
The algorithm can be decomposed in the following four steps:
i) Feed-forward computation
ii) Back propagation to the output layer
iii) Back propagation to the hidden layer
iv) Weight updates
The algorithm is stopped when the value of the error function has become sufficiently small.
The algorithm for back propagation[10] is described below.
[13] Input: N input sample vectors V, 1<i<N with a
dimensions iteration tales place at the rate of n, target value ti, sigmoid function f(x) =1/1+e(-x)
Output: Network with final weights. wjk
Randomly initialize the wjk values
For iteration=1, 2….iteration
Do for sample=1, 2…..N.
//Feed forward stage: for j=1, 2…b do
hj=f 𝑎𝑘=1(x(k)*wjk)
For i=1, 2….c do
oi=f ( 𝑎(𝑗=1hj*wjk)
If Error=12 𝑐𝑖=1(ti-0i)*hj
else// it works with Back propagation stage,
𝞼wij=-(ti-oi)*hj 𝜎𝑤𝑗𝑘=−ℎ𝑗 1−ℎ𝑗 𝑥𝑘
𝑐𝑖=1[(ti-oi)*wij)]
wij=wij-μwjk
wjk=whj-μwjk
else //learning finish break.
𝜎𝑤𝑖𝑗=−(𝑡𝑖−𝑜𝑖)ℎ𝑗
𝜎𝑤𝑗𝑘=−ℎ𝑗 1−ℎ𝑗 𝑥𝑘
𝑐𝑖=1[ 𝑡𝑖−𝑜𝑖 ∗𝑤𝑗𝑘)]
G. Collaborative learning
Collaborative learning is a process in which many people gather with their data for learning
simultaneously. There are two factors impacting the multiparty learning - the number of participating parties and
the size of dataset .As the number of participants increases, the operations for each party to share intermediate
results and decrypt the final learning result increases.
V. Performance Evaluation
In this section, the several issues related to performance in back propagation algorithm using cloud is
discussed. First the accuracy of the output depends on the number of layers in the network. There should be at
least three layers in the back propagation configuration network. The more the number of layers, the accuracy of
the output increases at the cost of tradeoff with performance. [11] Choosing number of nodes for each layer will
depend on problem Neural Network is trying to solve, types of data network is dealing with, quality of data and
some other parameters. Number of input and output nodes depends on training set in hand. If there are too many
nodes in hidden layer, number of possible computations that algorithm has to deal with increases. Picking just
few nodes in hidden layer can prevent the algorithm of its learning ability. Right balance needs to be picked.
Second the security algorithms namely AES and BGN should be applied to only small datasets. So the
datasets are made very relevant and apt.
Third the number of iterations in back propagation learning increases the accuracy of the output. The
tradeoff with computation time has to be analyzed.
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing
DOI: 10.9790/0661-17217579 www.iosrjournals.org 79 | Page
VI. Conclusion
The cloud does the key generation and distributes the keys to the owner. The owner encrypts the data
with the public key of the owner using AES cryptography. The encrypted ciphertext is uploaded in the cloud.
The cloud does multiplication and addition operation on the ciphertext and the collaborative learning takes place
without disclosing the private data of the owners.
References
[1]. “The Health Insurance Portability and Accountability Act of Privacy and Security Rules,” http://www.hhs.gov/ocr/privacy, 2013.
[2]. “National Standards to Protect the Privacy of Personal Health Information,” http://www.hhs.gov/ocr/hipaa/finalreg.html, 2013.
[3]. M. Abramowitz and I.A. Stegun, Handbook of Mathematical Functions: With Formulas, Graphs, and Mathematics Tables,
DoverBooks on Mathematics. Dover, 1964.
[4]. A. Bansal, T. Chen, and S. Zhong, “Privacy Preserving Back-Propagation Neural Network Learning over Arbitrarily Parti-tioned
Data,” Neural Computing Applications, vol. 20, no. 1, pp. 143150,Feb. 2011.
[5]. D. Boneh, E.-J. Goh, and K. Nissim, “Evaluating 2-DNF Formulas on Ciphertexts,” Proc. Second Int‟l Conf. Theory of
Cryptography (TCC ‟05), pp. 325-341, 2005.
[6]. T. Chen and S. Zhong, “Privacy-Preserving Backpropagation Neural Network Learning,” IEEE Trans. Neural Network, vol. 20, no.
10, pp. 1554-1564, Oct. 2009.
[7]. L. Cun, B. Boser, J.S. Denker, D. Henderson, R.E. Howard, W.Hubbard, and L.D. Jackel, “Handwritten Digit Recognition with a
Back-Propagation Network,” Proc. Advances in Neural Information Processing Systems, pp. 396-404, 1990.
[8]. S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P.Samarati, “Over-Encryption: Management of Access Control
Evolution on Outsourced Data,” Proc. 33rd Int‟l Conf. Very Large Data Bases (VLDB ‟07), pp. 123-134, 2007.
[9]. T. El Gamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Proc. Advances in Cryptology
(CRYPTO ‟85), pp. 10-18, 1985.
[10]. http://www.m-hikari.com/ces/ces2011/ces1-4-2011/mustafaCES1-4-2011.pdf
[11]. http://www.dataminingmasters.com/uploads/studentProjects/NeuralNetworks.pdf
[12]. Jiawei Yuan, Student Member, IEEE, and Schucheng Yu, Member, IEEE Privacy Preserving Back Propagation Neural Network
learning made Practical with Cloud Computing, “IEEE transactions on parallel and distributed systems, vol no. 1, January 2014.
[13]. http://www.ijera.com/special_issue/Humming%20Bird_March_2014/Version%20%203/CA0105.pdf

More Related Content

What's hot

Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
 
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...IJCSIS Research Publications
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural networkMahira Banu
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
 

What's hot (19)

Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural network
 
Image Security
Image SecurityImage Security
Image Security
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
 

Viewers also liked

PayPal coverage report_SCMP_01Feb13
PayPal coverage report_SCMP_01Feb13PayPal coverage report_SCMP_01Feb13
PayPal coverage report_SCMP_01Feb13PayPalHK
 
67 transición y democracia española en manos de las dos incultas españas d...
67   transición  y democracia española en manos de las dos incultas españas d...67   transición  y democracia española en manos de las dos incultas españas d...
67 transición y democracia española en manos de las dos incultas españas d...Miguel Cabral Martín
 
Menu trong photoshop
Menu trong photoshopMenu trong photoshop
Menu trong photoshopgioakim thao
 
Tesis juan
Tesis juanTesis juan
Tesis juanjuanasto
 
Yoga alejandraguillen23302561
Yoga alejandraguillen23302561Yoga alejandraguillen23302561
Yoga alejandraguillen23302561guillenalejandra
 
Planificador de proyectos perfecto
Planificador de proyectos perfectoPlanificador de proyectos perfecto
Planificador de proyectos perfectotecnomecanica
 
Modelo de producción
Modelo de producciónModelo de producción
Modelo de producciónMarco Novelo
 
#Documento: Incidencia de la jurisprudencia en la elección de magistrados de ...
#Documento: Incidencia de la jurisprudencia en la elección de magistrados de ...#Documento: Incidencia de la jurisprudencia en la elección de magistrados de ...
#Documento: Incidencia de la jurisprudencia en la elección de magistrados de ...FUSADES
 
RapWords – Tachistoscopio: un’app per esercitare e migliorare la velocità e ...
RapWords – Tachistoscopio: un’app per esercitare e migliorare la velocità e ...RapWords – Tachistoscopio: un’app per esercitare e migliorare la velocità e ...
RapWords – Tachistoscopio: un’app per esercitare e migliorare la velocità e ...Anastasis Soc. Coop.
 
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...idsecconf
 

Viewers also liked (20)

PayPal coverage report_SCMP_01Feb13
PayPal coverage report_SCMP_01Feb13PayPal coverage report_SCMP_01Feb13
PayPal coverage report_SCMP_01Feb13
 
67 transición y democracia española en manos de las dos incultas españas d...
67   transición  y democracia española en manos de las dos incultas españas d...67   transición  y democracia española en manos de las dos incultas españas d...
67 transición y democracia española en manos de las dos incultas españas d...
 
Wireless Technology -IoT Projects
Wireless Technology -IoT ProjectsWireless Technology -IoT Projects
Wireless Technology -IoT Projects
 
8D PST
8D PST8D PST
8D PST
 
Menu trong photoshop
Menu trong photoshopMenu trong photoshop
Menu trong photoshop
 
Tesis juan
Tesis juanTesis juan
Tesis juan
 
Yoga alejandraguillen23302561
Yoga alejandraguillen23302561Yoga alejandraguillen23302561
Yoga alejandraguillen23302561
 
Planificador de proyectos perfecto
Planificador de proyectos perfectoPlanificador de proyectos perfecto
Planificador de proyectos perfecto
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Modelo de producción
Modelo de producciónModelo de producción
Modelo de producción
 
#Documento: Incidencia de la jurisprudencia en la elección de magistrados de ...
#Documento: Incidencia de la jurisprudencia en la elección de magistrados de ...#Documento: Incidencia de la jurisprudencia en la elección de magistrados de ...
#Documento: Incidencia de la jurisprudencia en la elección de magistrados de ...
 
RapWords – Tachistoscopio: un’app per esercitare e migliorare la velocità e ...
RapWords – Tachistoscopio: un’app per esercitare e migliorare la velocità e ...RapWords – Tachistoscopio: un’app per esercitare e migliorare la velocità e ...
RapWords – Tachistoscopio: un’app per esercitare e migliorare la velocità e ...
 
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...
Danang Jaya, Query Adika Rezylana - “Steganografi DCT dengan Memanfaatkan Apl...
 
C010321630
C010321630C010321630
C010321630
 
E1102023442
E1102023442E1102023442
E1102023442
 
M017218088
M017218088M017218088
M017218088
 
M01267378
M01267378M01267378
M01267378
 
B0310711
B0310711B0310711
B0310711
 
M017258892
M017258892M017258892
M017258892
 
D017252327
D017252327D017252327
D017252327
 

Similar to Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing

Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...IOSR Journals
 
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group MembersEnhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
 
Cryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop ImplementationCryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop ImplementationIOSR Journals
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networkstheijes
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmIOSR Journals
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
Enhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC AlgorithmEnhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC Algorithmijtsrd
 
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageSecure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageIOSR Journals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...Patel Dasharathbhai
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemIRJET Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campusvivatechijri
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 

Similar to Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing (20)

Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
 
L018137479
L018137479L018137479
L018137479
 
Q01725110114
Q01725110114Q01725110114
Q01725110114
 
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group MembersEnhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Members
 
Cryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop ImplementationCryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop Implementation
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
Enhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC AlgorithmEnhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC Algorithm
 
K017115359
K017115359K017115359
K017115359
 
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageSecure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 75-79 www.iosrjournals.org DOI: 10.9790/0661-17217579 www.iosrjournals.org 75 | Page Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing 1 Mrs. Valli N, 2 Mr. H.Anwar Basha 1 PG Scholar S.A. Engineering College Chennai, India 2 Assistant Professor, CSE S.A.Engineering College Chennai, India Abstract: Cloud computing facilitates the owners to share data. Multiple parties join the learning process by conducting joint Back propagation neural network algorithm on the union of their respective data sets. During the learning process none of the party wants to disclose her/his private data to others. The limitations of the existing schemes are learning process for only two parties or the few ways in which the data is arbitrarily partitioned. The proposed solution allows two or more parties, each with an arbitrarily partitioned data set, to jointly conduct the learning. The solution is provided by the magnificent power of cloud computing. In the proposed scheme, each owner encrypts his/her private dataset locally through AES cryptography and uploads the cipher texts into the cloud. The cloud then executes most of the operations over cipher texts via BGN homomorphic algorithm. The cloud is unaware of the original dataset. The Back propagation learning takes place and the owners are benefited through collaborative learning. Thus the scalability of the learning process is improved and the privacy of the data is ensured. Keywords: Privacy preserving, learning, neural network, back-propagation, cloud computing, computation outsource, homomorphic encryption I. Introduction The multiparty learning in Neural Networks through Back Propagation Algorithm has always been a challenging scenario. With cloud computing infrastructure, we can solve this problem. Cloud computing involves deployment of groups of remote servers and software networks and other resources that allow centralized access to storage and computer services or resources. Clouds can be classified as public, private or hybrid based on their deployment model. Public cloud is accessible by all and private cloud is protected within the boundary of an organization say corporate through firewalls whereas hybrid cloud is a combination of both public and private cloud. With cloud there is a shift from CAPEX model to OPEX model in most of the organizations. With the increased use of cloud computing, there is a new paradigm emerging – cloud computing security. Cloud computing security is the set of policies, tools and regulations to ensure that data is secure in cloud computing atmosphere. To make sure the data is secure and privacy of the dataset is maintained, we make use of AES (Advanced Encryption Standard) and RSA (Rivest, Shamir and Adleman) algorithms. The back propagation neural network algorithm is the most widely used algorithm for learning in neural network. It is the workhorse in neural networks. Neural networks are composed of artificial neurons that simulate the human brain. The neural network is trained with numerous examples and it learns from these examples. Back propagation is one such scheme where the supervised learning takes place by examples. It makes use of activation function and makes the network learn by examples by adjusting the weights of the edges in the neural network. The activation function can be a step function or sigmoid function. Usually sigmoid function is used. II. System Model The system consists of three major components:  Trust Agent  Cloud  Owners The trust agent is a government agency that activates the owner‟s account. The owner registers with the trust agent and uploads the data only when the owners‟s account is active. The uploaded data is encrypted using AES cryptography. The ciphertext is manipulated by the cloud to perform additive and multiplicative operations using bgn homomorphic algorithm. The learning takes place using back propagation algorithm. It is then collaboratively shared.
  • 2. Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing DOI: 10.9790/0661-17217579 www.iosrjournals.org 76 | Page Fig1 shows the overall description of Collaborative Learning III. Security Model The Trust Agent is usually a government agency that authenticates the owner by verifying the owner details. In the proposed solution, the cloud generates the keys and distributes to the owners. The security of the system is improved as the cloud does not know the data of the owners. IV. System Description A. Authenticating the Owner It is performed by Trust Agent. Owner‟s account is activated after the authentication of the owner by the Trust Agent. The owner registers with the trust agent and the trust agent confirms his registration. Only after the confirmation of registration the owner‟s account is made active. B. Uploading the data The owner uploads the data in cloud. The owner can upload as many times as required. Owner owns a private data set and wants to perform collaborative learning. For this he loads the encrypted data in cloud. Each participating party s, denoted as Ps, owns a private data set and wants to perform collaborative BPN network learning with all other participating parties. That is, they will collaboratively conduct learning over the arbitrarily partitioned data set, which is private and cannot be disclosed during the whole learning process. We assume that each participating party stays online with broadband access to the cloud and is equipped with one or several contemporary computers, which can work in parallel if there is more than one. C. Arbitrarily partitioning data Combination of horizontal and vertical partitioning is done. The rows and columns are not partitioned in any particular order. It is done arbitrarily. We consider arbitrary partitioning of data between two parties. In arbitrary partitioning of data between two parties, there is no specific order of how the data is divided between two parties. Combined data of two parties can be seen as a database. Suppose D is the data to be partitioned then Di is the partition of data D such that D1∩D2∩D3∩………….Dn=∅ and D1∩D2∩D3∩………….Dn=D D. Encrypting the data AES (Advanced Encryption System) is used to encrypt the data and the encrypted data is uploaded in cloud. This is the fundamental encryption that takes place. This produces the cipher text upon which BGN algorithm is applied. E. Homomorphically encrypting data BGN (Boneh, Goh and Nissim algorithm is used to encrypt the cipher text and the encrypted cipher text is available in cloud. It is called doubly homomorphic encryption. Homomorphic encryption enables operations on plaintexts to be performed on their respective cipher texts without disclosing the plaintexts. Most existing homomorphic encryption schemes only support single operation - either addition or multiplication. It introduced a public-key „doubly homomorphic encryption scheme (called „BGN‟ for short), which simultaneously supports one multiplication and unlimited number of addition operations. Therefore, given
  • 3. Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing DOI: 10.9790/0661-17217579 www.iosrjournals.org 77 | Page cipher texts C(m1), C(m2), …. C(mi) and C( ˆ m1), C(ˆm2),….C(ˆmi), one can compute C(m1mˆ1+m2mˆ2+・ ・ ・+mimˆi) without knowing the plaintext, where C() is the cipher text of message mi or mˆi, encrypted by the system‟s public key. Fig 3: Scalar Product and Sum Fig 3[12] illustrates the calculation of scalar product and Sum. The cloud calculates first the product of cipher text and then it calculates the sum of the product obtained in the previous step. The C(m1) is multiplied with C(m^1) and then added with C(m2) multiplied with C(m^2). F. Back Propagation Learning Back propagation, otherwise known as "backward propagation of errors", is a common method of learning in artificial neural networks. From a desired output, the network learns from many inputs Back- Propagation neural network learning algorithm is mainly composed of two stages: feed forward and error back − propagation. In Feed Forward the network is trained with many inputs and the output is generated as a sigmoid function of the inputs. The actual output and the expected output is compared and then the difference is calculated as error. The error is then propagated backwards in the network and the internal weights adjusted so that the difference between the actual and expected weight diminishes. The input and output [10] of the neuron, i, (except for the input layer) in a multilayer perceptron mode, according to the Back Propagation algorithm are: Input xi=∑wijoj+bi (1) Output oi=f (xi) (2) Where Wij is the weight of the connection from neuron i to node j, bi is the numerical value and f is the activation function. Fig. 2. Configuration of Back Propagation Network
  • 4. Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing DOI: 10.9790/0661-17217579 www.iosrjournals.org 78 | Page Fig.1[10] shows is a configuration for a three layered Back Propagation network. The inputs are feeded to the input layer. The weights are assigned to the edges connecting these layers and the output is calculated with the help of sigmoid function. The difference between the actual and the desired output is calculated and this difference is observed as error. A fraction of the error is back propagated to the hidden layer and input layer and then the sigmoid function again calculates the actual output. The difference is noted and this process is repeated until the error becomes negligible. The algorithm can be decomposed in the following four steps: i) Feed-forward computation ii) Back propagation to the output layer iii) Back propagation to the hidden layer iv) Weight updates The algorithm is stopped when the value of the error function has become sufficiently small. The algorithm for back propagation[10] is described below. [13] Input: N input sample vectors V, 1<i<N with a dimensions iteration tales place at the rate of n, target value ti, sigmoid function f(x) =1/1+e(-x) Output: Network with final weights. wjk Randomly initialize the wjk values For iteration=1, 2….iteration Do for sample=1, 2…..N. //Feed forward stage: for j=1, 2…b do hj=f 𝑎𝑘=1(x(k)*wjk) For i=1, 2….c do oi=f ( 𝑎(𝑗=1hj*wjk) If Error=12 𝑐𝑖=1(ti-0i)*hj else// it works with Back propagation stage, 𝞼wij=-(ti-oi)*hj 𝜎𝑤𝑗𝑘=−ℎ𝑗 1−ℎ𝑗 𝑥𝑘 𝑐𝑖=1[(ti-oi)*wij)] wij=wij-μwjk wjk=whj-μwjk else //learning finish break. 𝜎𝑤𝑖𝑗=−(𝑡𝑖−𝑜𝑖)ℎ𝑗 𝜎𝑤𝑗𝑘=−ℎ𝑗 1−ℎ𝑗 𝑥𝑘 𝑐𝑖=1[ 𝑡𝑖−𝑜𝑖 ∗𝑤𝑗𝑘)] G. Collaborative learning Collaborative learning is a process in which many people gather with their data for learning simultaneously. There are two factors impacting the multiparty learning - the number of participating parties and the size of dataset .As the number of participants increases, the operations for each party to share intermediate results and decrypt the final learning result increases. V. Performance Evaluation In this section, the several issues related to performance in back propagation algorithm using cloud is discussed. First the accuracy of the output depends on the number of layers in the network. There should be at least three layers in the back propagation configuration network. The more the number of layers, the accuracy of the output increases at the cost of tradeoff with performance. [11] Choosing number of nodes for each layer will depend on problem Neural Network is trying to solve, types of data network is dealing with, quality of data and some other parameters. Number of input and output nodes depends on training set in hand. If there are too many nodes in hidden layer, number of possible computations that algorithm has to deal with increases. Picking just few nodes in hidden layer can prevent the algorithm of its learning ability. Right balance needs to be picked. Second the security algorithms namely AES and BGN should be applied to only small datasets. So the datasets are made very relevant and apt. Third the number of iterations in back propagation learning increases the accuracy of the output. The tradeoff with computation time has to be analyzed.
  • 5. Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing DOI: 10.9790/0661-17217579 www.iosrjournals.org 79 | Page VI. Conclusion The cloud does the key generation and distributes the keys to the owner. The owner encrypts the data with the public key of the owner using AES cryptography. The encrypted ciphertext is uploaded in the cloud. The cloud does multiplication and addition operation on the ciphertext and the collaborative learning takes place without disclosing the private data of the owners. References [1]. “The Health Insurance Portability and Accountability Act of Privacy and Security Rules,” http://www.hhs.gov/ocr/privacy, 2013. [2]. “National Standards to Protect the Privacy of Personal Health Information,” http://www.hhs.gov/ocr/hipaa/finalreg.html, 2013. [3]. M. Abramowitz and I.A. Stegun, Handbook of Mathematical Functions: With Formulas, Graphs, and Mathematics Tables, DoverBooks on Mathematics. Dover, 1964. [4]. A. Bansal, T. Chen, and S. Zhong, “Privacy Preserving Back-Propagation Neural Network Learning over Arbitrarily Parti-tioned Data,” Neural Computing Applications, vol. 20, no. 1, pp. 143150,Feb. 2011. [5]. D. Boneh, E.-J. Goh, and K. Nissim, “Evaluating 2-DNF Formulas on Ciphertexts,” Proc. Second Int‟l Conf. Theory of Cryptography (TCC ‟05), pp. 325-341, 2005. [6]. T. Chen and S. Zhong, “Privacy-Preserving Backpropagation Neural Network Learning,” IEEE Trans. Neural Network, vol. 20, no. 10, pp. 1554-1564, Oct. 2009. [7]. L. Cun, B. Boser, J.S. Denker, D. Henderson, R.E. Howard, W.Hubbard, and L.D. Jackel, “Handwritten Digit Recognition with a Back-Propagation Network,” Proc. Advances in Neural Information Processing Systems, pp. 396-404, 1990. [8]. S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P.Samarati, “Over-Encryption: Management of Access Control Evolution on Outsourced Data,” Proc. 33rd Int‟l Conf. Very Large Data Bases (VLDB ‟07), pp. 123-134, 2007. [9]. T. El Gamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Proc. Advances in Cryptology (CRYPTO ‟85), pp. 10-18, 1985. [10]. http://www.m-hikari.com/ces/ces2011/ces1-4-2011/mustafaCES1-4-2011.pdf [11]. http://www.dataminingmasters.com/uploads/studentProjects/NeuralNetworks.pdf [12]. Jiawei Yuan, Student Member, IEEE, and Schucheng Yu, Member, IEEE Privacy Preserving Back Propagation Neural Network learning made Practical with Cloud Computing, “IEEE transactions on parallel and distributed systems, vol no. 1, January 2014. [13]. http://www.ijera.com/special_issue/Humming%20Bird_March_2014/Version%20%203/CA0105.pdf