Skip to main content

MLDStore

DNNs as Similitude Models for Sharing Big Data (Brief Announcement)

  • Conference paper
  • First Online:
Cyber Security Cryptography and Machine Learning (CSCML 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11527))

Abstract

The amount of data grows exponentially with time and the growth shows no signs of stopping. However, the data in itself is not useful until it can be processed, mined for information and queried. Thus, data sharing is a crucial component of modern computations. On the other hand, exposing the data might lead to serious privacy implications.

In our past research we suggested the use of similitude models, as compact models of data representation instead of the data itself. In this paper we suggest the use of deep neural networks (DNN) as data models to answer different types of queries. In addition, we discuss ownership of the DNN models and how to retain the ownership of the model after sharing it.

We thank the Lynne and William Frankel Center for Computer Science and the Rita Altura Trust Chair in Computer Science.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bengio, Y., Laufer, E., Alain, G., Yosinski, J.: Deep generative stochastic networks trainable by backprop. In: ICML (2014)

    Google Scholar 

  2. Bengio, Y., Yao, L., Alain, G., Vincent, P.: Generalized denoising auto-encoders as generative models. In: NIPS (2013)

    Google Scholar 

  3. Creswell, A., Bharath, A.A.: Denoising adversarial autoencoders. IEEE Trans. Neural Netw. Learn. Syst. (2018)

    Google Scholar 

  4. Derbeko, P., Dolev, S., Gudes, E.: Privacy via maintaining small similitude data for big data statistical representation. In: Dinur, I., Dolev, S., Lodha, S. (eds.) CSCML 2018. LNCS, vol. 10879, pp. 105–119. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-94147-9_9

    Chapter  Google Scholar 

  5. Derbeko, P., Dolev, S., Gudes, E., Ullman, J.D.: Efficient and private approximations of distributed databases calculations. In: 2017 IEEE International Conference on Big Data, BigData 2017, Boston, MA, USA, 11–14 December 2017, pp. 4487–4496 (2017)

    Google Scholar 

  6. Goodfellow, I.J., et al.: Generative adversarial nets. In: NIPS (2014)

    Google Scholar 

  7. Hoeffding, W.: Probability inequalities for sums of bounded random variables. In: Fisher, N.I., Sen, P.K. (eds.) The Collected Works of Wassily Hoeffding. Springer Series in Statistics (Perspectives in Statistics). Springer, New York (1962). https://doi.org/10.1007/978-1-4612-0865-5_26

    Chapter  MATH  Google Scholar 

  8. Kirkpatrick, J., et al.: Overcoming catastrophic forgetting in neural networks. Proc. Natl. Acad. Sci. 114(13), 3521–3526 (2017)

    Article  MathSciNet  Google Scholar 

  9. Kline, S.: Similitude and Approximation Theory. Springer, Heidelberg (1986). https://doi.org/10.1007/978-3-642-61638-9

    Book  Google Scholar 

  10. Li, Z., Hoiem, D.: Learning without forgetting. IEEE Trans. Pattern Anal. Mach. Intell. 40(12), 2935–2947 (2018)

    Article  Google Scholar 

  11. Makhzani, A., Shlens, J., Jaitly, N., Goodfellow, I., Frey, B.: Adversarial autoencoders. CoRR, abs/1511.05644 (2015)

    Google Scholar 

  12. McCloskey, M., Cohen, N.J.: Catastrophic interference in connectionist networks: the sequential learning problem. In: Psychology of Learning and Motivation, vol. 24, pp. 109–165. Academic Press (1989)

    Google Scholar 

  13. Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 19–38, May 2017

    Google Scholar 

  14. Rezende, D.J., Mohamed, S., Wierstra, D.: Stochastic backpropagation and approximate inference in deep generative models. arXiv preprint arXiv:1401.4082 (2014)

  15. Rusu, A.A., et al.: Progressive neural networks. CoRR, abs/1606.04671 (2016)

    Google Scholar 

  16. Seff, A., Beatson, A., Suo, D., Liu, H.: Continual learning in generative adversarial nets. CoRR, abs/1705.08395 (2017)

    Google Scholar 

  17. Serfling, R.J.: Probability inequalities for the sum in sampling without replacement. Ann. Statist. 2(1), 39–48 (1974)

    Article  MathSciNet  Google Scholar 

  18. Tassa, T., Gudes, E.: Secure distributed computation of anonymized views of shared databases. ACM Trans. Database Syst. 37(2), 11:1–11:43 (2012)

    Article  Google Scholar 

  19. Yao, A.C.: Protocols for secure computations. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 160–164 (1982)

    Google Scholar 

  20. Yoshua, B.: Learning deep architectures for AI. Foundations 2, 1–55 (2009)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Philip Derbeko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Derbeko, P., Dolev, S., Gudes, E. (2019). MLDStore. In: Dolev, S., Hendler, D., Lodha, S., Yung, M. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2019. Lecture Notes in Computer Science(), vol 11527. Springer, Cham. https://doi.org/10.1007/978-3-030-20951-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-20951-3_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-20950-6

  • Online ISBN: 978-3-030-20951-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics