SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 75-79
www.iosrjournals.org
DOI: 10.9790/0661-17217579 www.iosrjournals.org 75 | Page
Back-Propagation Neural Network Learning with Preserved
Privacy using Cloud Computing
1
Mrs. Valli N, 2
Mr. H.Anwar Basha
1
PG Scholar S.A. Engineering College Chennai, India
2
Assistant Professor, CSE S.A.Engineering College Chennai, India
Abstract: Cloud computing facilitates the owners to share data. Multiple parties join the learning process by
conducting joint Back propagation neural network algorithm on the union of their respective data sets. During
the learning process none of the party wants to disclose her/his private data to others. The limitations of the
existing schemes are learning process for only two parties or the few ways in which the data is arbitrarily
partitioned. The proposed solution allows two or more parties, each with an arbitrarily partitioned data set, to
jointly conduct the learning. The solution is provided by the magnificent power of cloud computing. In the
proposed scheme, each owner encrypts his/her private dataset locally through AES cryptography and uploads
the cipher texts into the cloud. The cloud then executes most of the operations over cipher texts via BGN
homomorphic algorithm. The cloud is unaware of the original dataset. The Back propagation learning takes
place and the owners are benefited through collaborative learning. Thus the scalability of the learning process
is improved and the privacy of the data is ensured.
Keywords: Privacy preserving, learning, neural network, back-propagation, cloud computing, computation
outsource, homomorphic encryption
I. Introduction
The multiparty learning in Neural Networks through Back Propagation Algorithm has always been a
challenging scenario. With cloud computing infrastructure, we can solve this problem.
Cloud computing involves deployment of groups of remote servers and software networks and other
resources that allow centralized access to storage and computer services or resources. Clouds can be classified
as public, private or hybrid based on their deployment model. Public cloud is accessible by all and private cloud
is protected within the boundary of an organization say corporate through firewalls whereas hybrid cloud is a
combination of both public and private cloud. With cloud there is a shift from CAPEX model to OPEX model in
most of the organizations.
With the increased use of cloud computing, there is a new paradigm emerging – cloud computing
security. Cloud computing security is the set of policies, tools and regulations to ensure that data is secure in
cloud computing atmosphere. To make sure the data is secure and privacy of the dataset is maintained, we make
use of AES (Advanced Encryption Standard) and RSA (Rivest, Shamir and Adleman) algorithms.
The back propagation neural network algorithm is the most widely used algorithm for learning in
neural network. It is the workhorse in neural networks. Neural networks are composed of artificial neurons that
simulate the human brain. The neural network is trained with numerous examples and it learns from these
examples. Back propagation is one such scheme where the supervised learning takes place by examples. It
makes use of activation function and makes the network learn by examples by adjusting the weights of the edges
in the neural network. The activation function can be a step function or sigmoid function. Usually sigmoid
function is used.
II. System Model
The system consists of three major components:
 Trust Agent
 Cloud
 Owners
The trust agent is a government agency that activates the owner‟s account. The owner registers with the
trust agent and uploads the data only when the owners‟s account is active. The uploaded data is encrypted using
AES cryptography. The ciphertext is manipulated by the cloud to perform additive and multiplicative operations
using bgn homomorphic algorithm. The learning takes place using back propagation algorithm. It is then
collaboratively shared.
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing
DOI: 10.9790/0661-17217579 www.iosrjournals.org 76 | Page
Fig1 shows the overall description of Collaborative Learning
III. Security Model
The Trust Agent is usually a government agency that authenticates the owner by verifying the owner
details. In the proposed solution, the cloud generates the keys and distributes to the owners. The security of the
system is improved as the cloud does not know the data of the owners.
IV. System Description
A. Authenticating the Owner
It is performed by Trust Agent. Owner‟s account is activated after the authentication of the owner by
the Trust Agent. The owner registers with the trust agent and the trust agent confirms his registration. Only after
the confirmation of registration the owner‟s account is made active.
B. Uploading the data
The owner uploads the data in cloud. The owner can upload as many times as required. Owner owns a
private data set and wants to perform collaborative learning. For this he loads the encrypted data in cloud. Each
participating party s, denoted as Ps, owns a private data set and wants to perform collaborative BPN network
learning with all other participating parties. That is, they will collaboratively conduct learning over the
arbitrarily partitioned data set, which is private and cannot be disclosed during the whole learning process. We
assume that each participating party stays online with broadband access to the cloud and is equipped with one or
several contemporary computers, which can work in parallel if there is more than one.
C. Arbitrarily partitioning data
Combination of horizontal and vertical partitioning is done. The rows and columns are not partitioned
in any particular order. It is done arbitrarily. We consider arbitrary partitioning of data between two parties. In
arbitrary partitioning of data between two parties, there is no specific order of how the data is divided between
two parties. Combined data of two parties can be seen as a database. Suppose D is the data to be partitioned then
Di is the partition of data D such that D1∩D2∩D3∩………….Dn=∅
and D1∩D2∩D3∩………….Dn=D
D. Encrypting the data
AES (Advanced Encryption System) is used to encrypt the data and the encrypted data is uploaded in
cloud. This is the fundamental encryption that takes place. This produces the cipher text upon which BGN
algorithm is applied.
E. Homomorphically encrypting data
BGN (Boneh, Goh and Nissim algorithm is used to encrypt the cipher text and the encrypted cipher
text is available in cloud. It is called doubly homomorphic encryption. Homomorphic encryption enables
operations on plaintexts to be performed on their respective cipher texts without disclosing the plaintexts. Most
existing homomorphic encryption schemes only support single operation - either addition or multiplication. It
introduced a public-key „doubly homomorphic encryption scheme (called „BGN‟ for short), which
simultaneously supports one multiplication and unlimited number of addition operations. Therefore, given
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing
DOI: 10.9790/0661-17217579 www.iosrjournals.org 77 | Page
cipher texts C(m1), C(m2), …. C(mi) and C( ˆ m1), C(ˆm2),….C(ˆmi), one can compute C(m1mˆ1+m2mˆ2+・
・ ・+mimˆi) without knowing the plaintext, where C() is the cipher text of message mi or mˆi, encrypted by
the system‟s public key.
Fig 3: Scalar Product and Sum
Fig 3[12] illustrates the calculation of scalar product and Sum. The cloud calculates first the product of
cipher text and then it calculates the sum of the product obtained in the previous step. The C(m1) is multiplied
with C(m^1) and then added with C(m2) multiplied with C(m^2).
F. Back Propagation Learning
Back propagation, otherwise known as "backward propagation of errors", is a common method of
learning in artificial neural networks. From a desired output, the network learns from many inputs Back-
Propagation neural network learning algorithm is mainly composed of two stages: feed forward and error back −
propagation. In Feed Forward the network is trained with many inputs and the output is generated as a sigmoid
function of the inputs. The actual output and the expected output is compared and then the difference is
calculated as error. The error is then propagated backwards in the network and the internal weights adjusted so
that the difference between the actual and expected weight diminishes.
The input and output [10] of the neuron, i, (except for the input layer) in a multilayer perceptron mode,
according to the Back Propagation algorithm are:
Input xi=∑wijoj+bi (1)
Output oi=f (xi) (2)
Where Wij is the weight of the connection from neuron i to node j, bi is the numerical value and f is the
activation function.
Fig. 2. Configuration of Back Propagation Network
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing
DOI: 10.9790/0661-17217579 www.iosrjournals.org 78 | Page
Fig.1[10] shows is a configuration for a three layered Back Propagation network. The inputs are feeded
to the input layer. The weights are assigned to the edges connecting these layers and the output is calculated
with the help of sigmoid function. The difference between the actual and the desired output is calculated and this
difference is observed as error. A fraction of the error is back propagated to the hidden layer and input layer and
then the sigmoid function again calculates the actual output. The difference is noted and this process is repeated
until the error becomes negligible.
The algorithm can be decomposed in the following four steps:
i) Feed-forward computation
ii) Back propagation to the output layer
iii) Back propagation to the hidden layer
iv) Weight updates
The algorithm is stopped when the value of the error function has become sufficiently small.
The algorithm for back propagation[10] is described below.
[13] Input: N input sample vectors V, 1<i<N with a
dimensions iteration tales place at the rate of n, target value ti, sigmoid function f(x) =1/1+e(-x)
Output: Network with final weights. wjk
Randomly initialize the wjk values
For iteration=1, 2….iteration
Do for sample=1, 2…..N.
//Feed forward stage: for j=1, 2…b do
hj=f 𝑎𝑘=1(x(k)*wjk)
For i=1, 2….c do
oi=f ( 𝑎(𝑗=1hj*wjk)
If Error=12 𝑐𝑖=1(ti-0i)*hj
else// it works with Back propagation stage,
𝞼wij=-(ti-oi)*hj 𝜎𝑤𝑗𝑘=−ℎ𝑗 1−ℎ𝑗 𝑥𝑘
𝑐𝑖=1[(ti-oi)*wij)]
wij=wij-μwjk
wjk=whj-μwjk
else //learning finish break.
𝜎𝑤𝑖𝑗=−(𝑡𝑖−𝑜𝑖)ℎ𝑗
𝜎𝑤𝑗𝑘=−ℎ𝑗 1−ℎ𝑗 𝑥𝑘
𝑐𝑖=1[ 𝑡𝑖−𝑜𝑖 ∗𝑤𝑗𝑘)]
G. Collaborative learning
Collaborative learning is a process in which many people gather with their data for learning
simultaneously. There are two factors impacting the multiparty learning - the number of participating parties and
the size of dataset .As the number of participants increases, the operations for each party to share intermediate
results and decrypt the final learning result increases.
V. Performance Evaluation
In this section, the several issues related to performance in back propagation algorithm using cloud is
discussed. First the accuracy of the output depends on the number of layers in the network. There should be at
least three layers in the back propagation configuration network. The more the number of layers, the accuracy of
the output increases at the cost of tradeoff with performance. [11] Choosing number of nodes for each layer will
depend on problem Neural Network is trying to solve, types of data network is dealing with, quality of data and
some other parameters. Number of input and output nodes depends on training set in hand. If there are too many
nodes in hidden layer, number of possible computations that algorithm has to deal with increases. Picking just
few nodes in hidden layer can prevent the algorithm of its learning ability. Right balance needs to be picked.
Second the security algorithms namely AES and BGN should be applied to only small datasets. So the
datasets are made very relevant and apt.
Third the number of iterations in back propagation learning increases the accuracy of the output. The
tradeoff with computation time has to be analyzed.
Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing
DOI: 10.9790/0661-17217579 www.iosrjournals.org 79 | Page
VI. Conclusion
The cloud does the key generation and distributes the keys to the owner. The owner encrypts the data
with the public key of the owner using AES cryptography. The encrypted ciphertext is uploaded in the cloud.
The cloud does multiplication and addition operation on the ciphertext and the collaborative learning takes place
without disclosing the private data of the owners.
References
[1]. “The Health Insurance Portability and Accountability Act of Privacy and Security Rules,” http://www.hhs.gov/ocr/privacy, 2013.
[2]. “National Standards to Protect the Privacy of Personal Health Information,” http://www.hhs.gov/ocr/hipaa/finalreg.html, 2013.
[3]. M. Abramowitz and I.A. Stegun, Handbook of Mathematical Functions: With Formulas, Graphs, and Mathematics Tables,
DoverBooks on Mathematics. Dover, 1964.
[4]. A. Bansal, T. Chen, and S. Zhong, “Privacy Preserving Back-Propagation Neural Network Learning over Arbitrarily Parti-tioned
Data,” Neural Computing Applications, vol. 20, no. 1, pp. 143150,Feb. 2011.
[5]. D. Boneh, E.-J. Goh, and K. Nissim, “Evaluating 2-DNF Formulas on Ciphertexts,” Proc. Second Int‟l Conf. Theory of
Cryptography (TCC ‟05), pp. 325-341, 2005.
[6]. T. Chen and S. Zhong, “Privacy-Preserving Backpropagation Neural Network Learning,” IEEE Trans. Neural Network, vol. 20, no.
10, pp. 1554-1564, Oct. 2009.
[7]. L. Cun, B. Boser, J.S. Denker, D. Henderson, R.E. Howard, W.Hubbard, and L.D. Jackel, “Handwritten Digit Recognition with a
Back-Propagation Network,” Proc. Advances in Neural Information Processing Systems, pp. 396-404, 1990.
[8]. S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P.Samarati, “Over-Encryption: Management of Access Control
Evolution on Outsourced Data,” Proc. 33rd Int‟l Conf. Very Large Data Bases (VLDB ‟07), pp. 123-134, 2007.
[9]. T. El Gamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Proc. Advances in Cryptology
(CRYPTO ‟85), pp. 10-18, 1985.
[10]. http://www.m-hikari.com/ces/ces2011/ces1-4-2011/mustafaCES1-4-2011.pdf
[11]. http://www.dataminingmasters.com/uploads/studentProjects/NeuralNetworks.pdf
[12]. Jiawei Yuan, Student Member, IEEE, and Schucheng Yu, Member, IEEE Privacy Preserving Back Propagation Neural Network
learning made Practical with Cloud Computing, “IEEE transactions on parallel and distributed systems, vol no. 1, January 2014.
[13]. http://www.ijera.com/special_issue/Humming%20Bird_March_2014/Version%20%203/CA0105.pdf

More Related Content

What's hot

Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
 
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...IJCSIS Research Publications
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural networkMahira Banu
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
 

What's hot (19)

Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTINGDATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
DATA HIDING IMAGES USING SPREAD SPECTRUM IN CLOUD COMPUTING
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingA Novel Technique for Image Steganography Based on DWT and Huffman Encoding
A Novel Technique for Image Steganography Based on DWT and Huffman Encoding
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
Compressive Sensing Based Simultaneous Data Compression and Convergent Encryp...
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Cryptography using artificial neural network
Cryptography using artificial neural networkCryptography using artificial neural network
Cryptography using artificial neural network
 
Image Security
Image SecurityImage Security
Image Security
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
 

Viewers also liked

Weather2020 Forecast School Chapter 1
 Weather2020 Forecast School Chapter 1 Weather2020 Forecast School Chapter 1
Weather2020 Forecast School Chapter 1Gary Lezak
 
Ian dewson marries at lavish parkland country club
Ian dewson marries at lavish parkland country clubIan dewson marries at lavish parkland country club
Ian dewson marries at lavish parkland country clubIan Dewson
 
TECHNOLOGY TRANSFER LICENSING AGREEMENTS-PRESENTATION
TECHNOLOGY  TRANSFER  LICENSING AGREEMENTS-PRESENTATIONTECHNOLOGY  TRANSFER  LICENSING AGREEMENTS-PRESENTATION
TECHNOLOGY TRANSFER LICENSING AGREEMENTS-PRESENTATIONGauri Chaturvedi
 
20150801 新人秘笈講座 slideshare
20150801 新人秘笈講座 slideshare20150801 新人秘笈講座 slideshare
20150801 新人秘笈講座 slideshareSherry Hung
 
Marsh Analytics - CFO com
Marsh Analytics - CFO comMarsh Analytics - CFO com
Marsh Analytics - CFO comPeter Gold
 
Ian Dewson Enjoys Golfing
Ian Dewson Enjoys GolfingIan Dewson Enjoys Golfing
Ian Dewson Enjoys GolfingIan Dewson
 
Vishal_Final_Evaluation_PPT
Vishal_Final_Evaluation_PPTVishal_Final_Evaluation_PPT
Vishal_Final_Evaluation_PPTVishal Sharma
 

Viewers also liked (17)

Weather2020 Forecast School Chapter 1
 Weather2020 Forecast School Chapter 1 Weather2020 Forecast School Chapter 1
Weather2020 Forecast School Chapter 1
 
Ian dewson marries at lavish parkland country club
Ian dewson marries at lavish parkland country clubIan dewson marries at lavish parkland country club
Ian dewson marries at lavish parkland country club
 
PPT5 with Music
PPT5 with MusicPPT5 with Music
PPT5 with Music
 
N130306100103
N130306100103N130306100103
N130306100103
 
F1303073647
F1303073647F1303073647
F1303073647
 
TECHNOLOGY TRANSFER LICENSING AGREEMENTS-PRESENTATION
TECHNOLOGY  TRANSFER  LICENSING AGREEMENTS-PRESENTATIONTECHNOLOGY  TRANSFER  LICENSING AGREEMENTS-PRESENTATION
TECHNOLOGY TRANSFER LICENSING AGREEMENTS-PRESENTATION
 
20150801 新人秘笈講座 slideshare
20150801 新人秘笈講座 slideshare20150801 新人秘笈講座 slideshare
20150801 新人秘笈講座 slideshare
 
Marsh Analytics - CFO com
Marsh Analytics - CFO comMarsh Analytics - CFO com
Marsh Analytics - CFO com
 
resume
resumeresume
resume
 
F1103024661
F1103024661F1103024661
F1103024661
 
Ian Dewson Enjoys Golfing
Ian Dewson Enjoys GolfingIan Dewson Enjoys Golfing
Ian Dewson Enjoys Golfing
 
MPC_Company Profile
MPC_Company ProfileMPC_Company Profile
MPC_Company Profile
 
Q180203109113
Q180203109113Q180203109113
Q180203109113
 
Vishal_Final_Evaluation_PPT
Vishal_Final_Evaluation_PPTVishal_Final_Evaluation_PPT
Vishal_Final_Evaluation_PPT
 
what
whatwhat
what
 
NILESH_CV
NILESH_CVNILESH_CV
NILESH_CV
 
Amaatra homes
Amaatra homesAmaatra homes
Amaatra homes
 

Similar to L017217579

Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...IOSR Journals
 
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group MembersEnhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Membersiosrjce
 
Cryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop ImplementationCryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop ImplementationIOSR Journals
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networkstheijes
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmIOSR Journals
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET Journal
 
Enhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC AlgorithmEnhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC Algorithmijtsrd
 
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageSecure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageIOSR Journals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...Patel Dasharathbhai
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemIRJET Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campusvivatechijri
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 

Similar to L017217579 (20)

Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
 
L018137479
L018137479L018137479
L018137479
 
Q01725110114
Q01725110114Q01725110114
Q01725110114
 
Enhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group MembersEnhancing Cloud Computing Security for Data Sharing Within Group Members
Enhancing Cloud Computing Security for Data Sharing Within Group Members
 
Cryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop ImplementationCryptographic Cloud Storage with Hadoop Implementation
Cryptographic Cloud Storage with Hadoop Implementation
 
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural NetworksSecuring Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
Securing Privacy of User’s Data on Cloud Using Back Propagation Neural Networks
 
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic AlgorithmEnhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET-  	  Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET-  	  Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity AdministrationIRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
IRJET- Improving Data Spillage in Multi-Cloud Capacity Administration
 
Enhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC AlgorithmEnhanced Cloud Security Implementation using Modified ECC Algorithm
Enhanced Cloud Security Implementation using Modified ECC Algorithm
 
K017115359
K017115359K017115359
K017115359
 
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud StorageSecure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
Secure Data Sharing Using Compact Summation key in Hybrid Cloud Storage
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
A Survey of the Homomorphic Encryption Approach for Data Security in Cloud Co...
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
Providing Secure Cloud for College Campus
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

L017217579

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015), PP 75-79 www.iosrjournals.org DOI: 10.9790/0661-17217579 www.iosrjournals.org 75 | Page Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing 1 Mrs. Valli N, 2 Mr. H.Anwar Basha 1 PG Scholar S.A. Engineering College Chennai, India 2 Assistant Professor, CSE S.A.Engineering College Chennai, India Abstract: Cloud computing facilitates the owners to share data. Multiple parties join the learning process by conducting joint Back propagation neural network algorithm on the union of their respective data sets. During the learning process none of the party wants to disclose her/his private data to others. The limitations of the existing schemes are learning process for only two parties or the few ways in which the data is arbitrarily partitioned. The proposed solution allows two or more parties, each with an arbitrarily partitioned data set, to jointly conduct the learning. The solution is provided by the magnificent power of cloud computing. In the proposed scheme, each owner encrypts his/her private dataset locally through AES cryptography and uploads the cipher texts into the cloud. The cloud then executes most of the operations over cipher texts via BGN homomorphic algorithm. The cloud is unaware of the original dataset. The Back propagation learning takes place and the owners are benefited through collaborative learning. Thus the scalability of the learning process is improved and the privacy of the data is ensured. Keywords: Privacy preserving, learning, neural network, back-propagation, cloud computing, computation outsource, homomorphic encryption I. Introduction The multiparty learning in Neural Networks through Back Propagation Algorithm has always been a challenging scenario. With cloud computing infrastructure, we can solve this problem. Cloud computing involves deployment of groups of remote servers and software networks and other resources that allow centralized access to storage and computer services or resources. Clouds can be classified as public, private or hybrid based on their deployment model. Public cloud is accessible by all and private cloud is protected within the boundary of an organization say corporate through firewalls whereas hybrid cloud is a combination of both public and private cloud. With cloud there is a shift from CAPEX model to OPEX model in most of the organizations. With the increased use of cloud computing, there is a new paradigm emerging – cloud computing security. Cloud computing security is the set of policies, tools and regulations to ensure that data is secure in cloud computing atmosphere. To make sure the data is secure and privacy of the dataset is maintained, we make use of AES (Advanced Encryption Standard) and RSA (Rivest, Shamir and Adleman) algorithms. The back propagation neural network algorithm is the most widely used algorithm for learning in neural network. It is the workhorse in neural networks. Neural networks are composed of artificial neurons that simulate the human brain. The neural network is trained with numerous examples and it learns from these examples. Back propagation is one such scheme where the supervised learning takes place by examples. It makes use of activation function and makes the network learn by examples by adjusting the weights of the edges in the neural network. The activation function can be a step function or sigmoid function. Usually sigmoid function is used. II. System Model The system consists of three major components:  Trust Agent  Cloud  Owners The trust agent is a government agency that activates the owner‟s account. The owner registers with the trust agent and uploads the data only when the owners‟s account is active. The uploaded data is encrypted using AES cryptography. The ciphertext is manipulated by the cloud to perform additive and multiplicative operations using bgn homomorphic algorithm. The learning takes place using back propagation algorithm. It is then collaboratively shared.
  • 2. Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing DOI: 10.9790/0661-17217579 www.iosrjournals.org 76 | Page Fig1 shows the overall description of Collaborative Learning III. Security Model The Trust Agent is usually a government agency that authenticates the owner by verifying the owner details. In the proposed solution, the cloud generates the keys and distributes to the owners. The security of the system is improved as the cloud does not know the data of the owners. IV. System Description A. Authenticating the Owner It is performed by Trust Agent. Owner‟s account is activated after the authentication of the owner by the Trust Agent. The owner registers with the trust agent and the trust agent confirms his registration. Only after the confirmation of registration the owner‟s account is made active. B. Uploading the data The owner uploads the data in cloud. The owner can upload as many times as required. Owner owns a private data set and wants to perform collaborative learning. For this he loads the encrypted data in cloud. Each participating party s, denoted as Ps, owns a private data set and wants to perform collaborative BPN network learning with all other participating parties. That is, they will collaboratively conduct learning over the arbitrarily partitioned data set, which is private and cannot be disclosed during the whole learning process. We assume that each participating party stays online with broadband access to the cloud and is equipped with one or several contemporary computers, which can work in parallel if there is more than one. C. Arbitrarily partitioning data Combination of horizontal and vertical partitioning is done. The rows and columns are not partitioned in any particular order. It is done arbitrarily. We consider arbitrary partitioning of data between two parties. In arbitrary partitioning of data between two parties, there is no specific order of how the data is divided between two parties. Combined data of two parties can be seen as a database. Suppose D is the data to be partitioned then Di is the partition of data D such that D1∩D2∩D3∩………….Dn=∅ and D1∩D2∩D3∩………….Dn=D D. Encrypting the data AES (Advanced Encryption System) is used to encrypt the data and the encrypted data is uploaded in cloud. This is the fundamental encryption that takes place. This produces the cipher text upon which BGN algorithm is applied. E. Homomorphically encrypting data BGN (Boneh, Goh and Nissim algorithm is used to encrypt the cipher text and the encrypted cipher text is available in cloud. It is called doubly homomorphic encryption. Homomorphic encryption enables operations on plaintexts to be performed on their respective cipher texts without disclosing the plaintexts. Most existing homomorphic encryption schemes only support single operation - either addition or multiplication. It introduced a public-key „doubly homomorphic encryption scheme (called „BGN‟ for short), which simultaneously supports one multiplication and unlimited number of addition operations. Therefore, given
  • 3. Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing DOI: 10.9790/0661-17217579 www.iosrjournals.org 77 | Page cipher texts C(m1), C(m2), …. C(mi) and C( ˆ m1), C(ˆm2),….C(ˆmi), one can compute C(m1mˆ1+m2mˆ2+・ ・ ・+mimˆi) without knowing the plaintext, where C() is the cipher text of message mi or mˆi, encrypted by the system‟s public key. Fig 3: Scalar Product and Sum Fig 3[12] illustrates the calculation of scalar product and Sum. The cloud calculates first the product of cipher text and then it calculates the sum of the product obtained in the previous step. The C(m1) is multiplied with C(m^1) and then added with C(m2) multiplied with C(m^2). F. Back Propagation Learning Back propagation, otherwise known as "backward propagation of errors", is a common method of learning in artificial neural networks. From a desired output, the network learns from many inputs Back- Propagation neural network learning algorithm is mainly composed of two stages: feed forward and error back − propagation. In Feed Forward the network is trained with many inputs and the output is generated as a sigmoid function of the inputs. The actual output and the expected output is compared and then the difference is calculated as error. The error is then propagated backwards in the network and the internal weights adjusted so that the difference between the actual and expected weight diminishes. The input and output [10] of the neuron, i, (except for the input layer) in a multilayer perceptron mode, according to the Back Propagation algorithm are: Input xi=∑wijoj+bi (1) Output oi=f (xi) (2) Where Wij is the weight of the connection from neuron i to node j, bi is the numerical value and f is the activation function. Fig. 2. Configuration of Back Propagation Network
  • 4. Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing DOI: 10.9790/0661-17217579 www.iosrjournals.org 78 | Page Fig.1[10] shows is a configuration for a three layered Back Propagation network. The inputs are feeded to the input layer. The weights are assigned to the edges connecting these layers and the output is calculated with the help of sigmoid function. The difference between the actual and the desired output is calculated and this difference is observed as error. A fraction of the error is back propagated to the hidden layer and input layer and then the sigmoid function again calculates the actual output. The difference is noted and this process is repeated until the error becomes negligible. The algorithm can be decomposed in the following four steps: i) Feed-forward computation ii) Back propagation to the output layer iii) Back propagation to the hidden layer iv) Weight updates The algorithm is stopped when the value of the error function has become sufficiently small. The algorithm for back propagation[10] is described below. [13] Input: N input sample vectors V, 1<i<N with a dimensions iteration tales place at the rate of n, target value ti, sigmoid function f(x) =1/1+e(-x) Output: Network with final weights. wjk Randomly initialize the wjk values For iteration=1, 2….iteration Do for sample=1, 2…..N. //Feed forward stage: for j=1, 2…b do hj=f 𝑎𝑘=1(x(k)*wjk) For i=1, 2….c do oi=f ( 𝑎(𝑗=1hj*wjk) If Error=12 𝑐𝑖=1(ti-0i)*hj else// it works with Back propagation stage, 𝞼wij=-(ti-oi)*hj 𝜎𝑤𝑗𝑘=−ℎ𝑗 1−ℎ𝑗 𝑥𝑘 𝑐𝑖=1[(ti-oi)*wij)] wij=wij-μwjk wjk=whj-μwjk else //learning finish break. 𝜎𝑤𝑖𝑗=−(𝑡𝑖−𝑜𝑖)ℎ𝑗 𝜎𝑤𝑗𝑘=−ℎ𝑗 1−ℎ𝑗 𝑥𝑘 𝑐𝑖=1[ 𝑡𝑖−𝑜𝑖 ∗𝑤𝑗𝑘)] G. Collaborative learning Collaborative learning is a process in which many people gather with their data for learning simultaneously. There are two factors impacting the multiparty learning - the number of participating parties and the size of dataset .As the number of participants increases, the operations for each party to share intermediate results and decrypt the final learning result increases. V. Performance Evaluation In this section, the several issues related to performance in back propagation algorithm using cloud is discussed. First the accuracy of the output depends on the number of layers in the network. There should be at least three layers in the back propagation configuration network. The more the number of layers, the accuracy of the output increases at the cost of tradeoff with performance. [11] Choosing number of nodes for each layer will depend on problem Neural Network is trying to solve, types of data network is dealing with, quality of data and some other parameters. Number of input and output nodes depends on training set in hand. If there are too many nodes in hidden layer, number of possible computations that algorithm has to deal with increases. Picking just few nodes in hidden layer can prevent the algorithm of its learning ability. Right balance needs to be picked. Second the security algorithms namely AES and BGN should be applied to only small datasets. So the datasets are made very relevant and apt. Third the number of iterations in back propagation learning increases the accuracy of the output. The tradeoff with computation time has to be analyzed.
  • 5. Back-Propagation Neural Network Learning with Preserved Privacy using Cloud Computing DOI: 10.9790/0661-17217579 www.iosrjournals.org 79 | Page VI. Conclusion The cloud does the key generation and distributes the keys to the owner. The owner encrypts the data with the public key of the owner using AES cryptography. The encrypted ciphertext is uploaded in the cloud. The cloud does multiplication and addition operation on the ciphertext and the collaborative learning takes place without disclosing the private data of the owners. References [1]. “The Health Insurance Portability and Accountability Act of Privacy and Security Rules,” http://www.hhs.gov/ocr/privacy, 2013. [2]. “National Standards to Protect the Privacy of Personal Health Information,” http://www.hhs.gov/ocr/hipaa/finalreg.html, 2013. [3]. M. Abramowitz and I.A. Stegun, Handbook of Mathematical Functions: With Formulas, Graphs, and Mathematics Tables, DoverBooks on Mathematics. Dover, 1964. [4]. A. Bansal, T. Chen, and S. Zhong, “Privacy Preserving Back-Propagation Neural Network Learning over Arbitrarily Parti-tioned Data,” Neural Computing Applications, vol. 20, no. 1, pp. 143150,Feb. 2011. [5]. D. Boneh, E.-J. Goh, and K. Nissim, “Evaluating 2-DNF Formulas on Ciphertexts,” Proc. Second Int‟l Conf. Theory of Cryptography (TCC ‟05), pp. 325-341, 2005. [6]. T. Chen and S. Zhong, “Privacy-Preserving Backpropagation Neural Network Learning,” IEEE Trans. Neural Network, vol. 20, no. 10, pp. 1554-1564, Oct. 2009. [7]. L. Cun, B. Boser, J.S. Denker, D. Henderson, R.E. Howard, W.Hubbard, and L.D. Jackel, “Handwritten Digit Recognition with a Back-Propagation Network,” Proc. Advances in Neural Information Processing Systems, pp. 396-404, 1990. [8]. S.D.C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P.Samarati, “Over-Encryption: Management of Access Control Evolution on Outsourced Data,” Proc. 33rd Int‟l Conf. Very Large Data Bases (VLDB ‟07), pp. 123-134, 2007. [9]. T. El Gamal, “A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” Proc. Advances in Cryptology (CRYPTO ‟85), pp. 10-18, 1985. [10]. http://www.m-hikari.com/ces/ces2011/ces1-4-2011/mustafaCES1-4-2011.pdf [11]. http://www.dataminingmasters.com/uploads/studentProjects/NeuralNetworks.pdf [12]. Jiawei Yuan, Student Member, IEEE, and Schucheng Yu, Member, IEEE Privacy Preserving Back Propagation Neural Network learning made Practical with Cloud Computing, “IEEE transactions on parallel and distributed systems, vol no. 1, January 2014. [13]. http://www.ijera.com/special_issue/Humming%20Bird_March_2014/Version%20%203/CA0105.pdf