Privacy preservation for Neural Network Training

Abstract

Data mining enables us to extract interesting patterns from huge volumes of data. This can be a security/privacy issue, if we make sensitive information available to unintended users as a result of mining. Preserving the privacy of sensitive data and individuals' information is a major challenge in many applications. Privacy concerns may prevent the parties from directly sharing the data and some types of information about the data. Back propagation (BP) is one of the algorithms used for training neural networks. This algorithm is suitable for both single-layer and multi-layer models. Another neural network training algorithm values for weights. Training the network is achieved by iteratively adjusting the weights based on a set of input parameters. During this process a training sample is presented to the network and is forwarded to determine the resulting output. The difference between the obtained output and expected output in each output unit represents error. Error is back propagated is the Extreme Learning Machine (ELM) algorithm. This algorithm works only for single-layer models. This restriction makes ELM more efficient than BP by reducing the communication between multiple parties during the learning phase. Most of the neural network learning systems is designed for single-layer and multi-layer models which can be applied to continuous data and differentiable activation functions. The present work proposes a protocol for neural network training systems that guarantee data confidentiality when data is partitioned among several parties. The proposed protocol preserves the privacy of both the input data and the constructed learning model.

Authors and Affiliations

Ms. Ch. Aparna , Ms. K. Venkata Ramana

Keywords

Related Articles

CRYPTOGRAPHIC METHOD FOR DIGITAL DOCUMENT

Due to the recent development of computers and computer networks, huge amount of digital data can easily be transmitted or stored. However, transmitted data in networks or stored data in computers may easily substitute b...

A Systematic Survey report on Various Frameworks and Models for Verification of Choreography in SOA

Service- Oriented Architecture (SOA) is a mainstream strategy for improving IT performance. Web Services are self-contained internet enabled applications which are capable of performing business activities. Web Services...

Predicting Students Attrition using Data Mining

Student attrition has become one of the most important measures of success for higher education institutions. It is an important issue for all institutions due to the potential negative impact on the image of the univers...

BLACK HOLE ATTACK AND ITS MITIGATION TECHNIQUES IN AODV AND OLSR

MANET is a self configurable, self deployable and infrastructure less network in which nodes are continuously moving and creates dynamic topology. For routing the main protocols using are AODV, OLSR, DSDV, DSR etc. AODV...

A Novel Maximum Power Point Tracking Method Based on Extension Theory for Wind Energy Conversion System

This paper proposed an intelligent maximum-power-point tracking algorithm to fully utilize wind energy conversation system (WECS) output power that depends on wind speed. The proposed method has been applied to a wind tu...

Download PDF file
  • EP ID EP116128
  • DOI -
  • Views 89
  • Downloads 0

How To Cite

Ms. Ch. Aparna, Ms. K. Venkata Ramana (2014). Privacy preservation for Neural Network Training. International Journal of Computer Science & Engineering Technology, 5(6), 728-733. https://europub.co.uk/articles/-A-116128