Privacy preservation for Neural Network Training

Abstract

Data mining enables us to extract interesting patterns from huge volumes of data. This can be a security/privacy issue, if we make sensitive information available to unintended users as a result of mining. Preserving the privacy of sensitive data and individuals' information is a major challenge in many applications. Privacy concerns may prevent the parties from directly sharing the data and some types of information about the data. Back propagation (BP) is one of the algorithms used for training neural networks. This algorithm is suitable for both single-layer and multi-layer models. Another neural network training algorithm values for weights. Training the network is achieved by iteratively adjusting the weights based on a set of input parameters. During this process a training sample is presented to the network and is forwarded to determine the resulting output. The difference between the obtained output and expected output in each output unit represents error. Error is back propagated is the Extreme Learning Machine (ELM) algorithm. This algorithm works only for single-layer models. This restriction makes ELM more efficient than BP by reducing the communication between multiple parties during the learning phase. Most of the neural network learning systems is designed for single-layer and multi-layer models which can be applied to continuous data and differentiable activation functions. The present work proposes a protocol for neural network training systems that guarantee data confidentiality when data is partitioned among several parties. The proposed protocol preserves the privacy of both the input data and the constructed learning model.

Authors and Affiliations

Ms. Ch. Aparna , Ms. K. Venkata Ramana

Keywords

Related Articles

A Comparative Study of Various Network Simulation Tools

In the area of network research, establishing a network in a real time scenario is very difficult. A single test bed takes a large amount of time and cost. Thus a network simulator tool helps the network developer to che...

Emblematic Fuzzy C-means Clustering for Demographic Dataset

Clustering algorithms are very useful in the field of marketing, education, and healthcare and engineering. It has several advantages such as -it deals with different type of data (text, numerical, image, categorical.),h...

SURVEY OF ACCIDENT SEVERITY ESTIMATION USING DATA MINING TECHNIQUES

As technology has been improved by many changes and inventions are made almost every day. Traumatic events come in many different ways at many different times of one’s life. Recent trends on the advantage of communicatio...

A Novel Approach for Web Document Classification

The web is a huge repository of information and there is a need for categorizing web documents to facilitate the search and retrieval of documents. Web document classification plays an important role in information organ...

Applications of Finite Automata in Lexical Analysis and as a Ticket Vending Machine – A Review

In this paper, we explain the two applications of finite automata. First is about the first phase of a compiler design called as lexical analysis. The lexical analysis used to identify the token with its type. Second is...

Download PDF file
  • EP ID EP116128
  • DOI -
  • Views 93
  • Downloads 0

How To Cite

Ms. Ch. Aparna, Ms. K. Venkata Ramana (2014). Privacy preservation for Neural Network Training. International Journal of Computer Science & Engineering Technology, 5(6), 728-733. https://europub.co.uk/articles/-A-116128