POMIC: Privacy-Preserving Outsourcing Medical Image Classification Based on Convolutional Neural Network to Cloud
Abstract
:1. Introduction
1.1. Related Work
1.1.1. Medical Image Classification
1.1.2. Privacy-Preserving Outsourcing Convolutional Neural Network to Cloud
1.2. Contribution
- It achieves outsourcing medical image classification based on a convolutional neural network. Users can get the result of a medical image with a lower computing burden;
- For different protocol blocks in medical image classification based on a convolutional neural network, we provide privacy-preserving schemes utilizing lightweight cryptography primitives-secret sharing, which can not only ensure security but also improve the efficiency of service;
- A pathological section staining experiment with good accuracy is carried out, which proves the efficiency and security of the scheme in practice.
2. Preliminaries
2.1. Medical Image Classification
2.2. Convolutional Neural Network
2.3. Secure Multi-Party Computation
3. System Overview
3.1. System Model
3.2. Threat Model
4. Building Blocks
4.1. Replicated Secret Sharing Technique
- : For the secret value , the protocol samples three random values under the constraint that mod . Each participant owns a portion. gets . And it can be written as .
- : To reconstruct and reveal x, sends to , each party can compute sum of locally, which means the secret value x is revealed to each party.
4.2. Secure Comparison Protocol
Algorithm 1 SecureComparison |
|
4.3. Division
5. Privacy-Preserving Outsourcing Medical Image Classification Based on Convolutional Neural Network
5.1. Linear Operations
Algorithm 2 SecureLinear |
|
5.2. Nonlinear Operation
Algorithm 3 SecureReLU |
|
Algorithm 4 SecureMaxPooling |
|
5.3. Complexity Analysis
6. Experimental Setup and Results
6.1. Experimental Setup
6.2. Experimental Results
7. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Secinaro, S.; Calandra, D.; Secinaro, A.; Muthurangu, V.; Biancone, P. The role of artificial intelligence in healthcare: A structured literature review. BMC Med. Inform. Decis. Mak. 2021, 21, 1–23. [Google Scholar] [CrossRef]
- Mirbabaie, M.; Stieglitz, S.; Frick, N.R. Artificial intelligence in disease diagnostics: A critical review and classification on the current state of research guiding future direction. Health Technol. 2021, 11, 693–731. [Google Scholar] [CrossRef]
- Chowdhury, S.; Mayilvahanan, P.; Govindaraj, R. Optimal feature extraction and classification-oriented medical insurance prediction model: Machine learning integrated with the internet of things. Int. J. Comput. Appl. 2022, 44, 278–290. [Google Scholar] [CrossRef]
- Deepika, J.; Rajan, C.; Senthil, T. Security and privacy of cloud-and IoT-based medical image diagnosis using fuzzy convolutional neural network. Comput. Intell. Neurosci. 2021, 2021, 1–17. [Google Scholar] [CrossRef]
- Cheng, J.; Tian, S.; Yu, L.; Gao, C.; Kang, X.; Ma, X.; Wu, W.; Liu, S.; Lu, H. ResGANet: Residual group attention network for medical image classification and segmentation. Med. Image Anal. 2022, 76, 102313. [Google Scholar] [CrossRef]
- Ziller, A.; Usynin, D.; Braren, R.; Makowski, M.; Rueckert, D.; Kaissis, G. Medical imaging deep learning with differential privacy. Sci. Rep. 2021, 11, 1–8. [Google Scholar] [CrossRef] [PubMed]
- Tripathi, M. Analysis of convolutional neural network based image classification techniques. J. Innov. Image Process. (JIIP) 2021, 3, 100–117. [Google Scholar] [CrossRef]
- Salvi, M.; Acharya, U.R.; Molinari, F.; Meiburger, K.M. The impact of pre-and post-image processing techniques on deep learning frameworks: A comprehensive review for digital pathology image analysis. Comput. Biol. Med. 2021, 128, 104129. [Google Scholar] [CrossRef] [PubMed]
- Benil, T.; Jasper, J. Cloud based security on outsourcing using blockchain in E-health systems. Comput. Netw. 2020, 178, 107344. [Google Scholar] [CrossRef]
- Pulido-Gaytan, B.; Tchernykh, A.; Cortés-Mendoza, J.M.; Babenko, M.; Radchenko, G.; Avetisyan, A.; Drozdov, A.Y. Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities. Peer- Netw. Appl. 2021, 14, 1666–1691. [Google Scholar] [CrossRef]
- Li, Q.; Wen, Z.; Wu, Z.; Hu, S.; Wang, N.; Li, Y.; Liu, X.; He, B. A survey on federated learning systems: Vision, hype and reality for data privacy and protection. IEEE Trans. Knowl. Data Eng. 2021. [Google Scholar] [CrossRef]
- Onoufriou, G.; Mayfield, P.; Leontidis, G. Fully homomorphically encrypted deep learning as a service. Mach. Learn. Knowl. Extr. 2021, 3, 819–834. [Google Scholar] [CrossRef]
- Lim, J.S.; Hong, M.; Lam, W.S.; Zhang, Z.; Teo, Z.L.; Liu, Y.; Ng, W.Y.; Foo, L.L.; Ting, D.S. Novel technical and privacy-preserving technology for artificial intelligence in ophthalmology. Curr. Opin. Ophthalmol. 2022, 33, 174–187. [Google Scholar] [CrossRef] [PubMed]
- Heidari, A.; Toumaj, S.; Navimipour, N.J.; Unal, M. A privacy-aware method for COVID-19 detection in chest CT images using lightweight deep conventional neural network and blockchain. Comput. Biol. Med. 2022, 145, 105461. [Google Scholar] [CrossRef] [PubMed]
- Rehman, M.U.; Shafique, A.; Ghadi, Y.Y.; Boulila, W.; Jan, S.U.; Gadekallu, T.R.; Driss, M.; Ahmad, J. A Novel Chaos-Based Privacy-Preserving Deep Learning Model for Cancer Diagnosis. IEEE Trans. Netw. Sci. Eng. 2022, 9, 4322–4337. [Google Scholar] [CrossRef]
- Huang, Q.X.; Yap, W.L.; Chiu, M.Y.; Sun, H.M. Privacy-Preserving Deep Learning With Learnable Image Encryption on Medical Images. IEEE Access. 2022, 10, 66345–66355. [Google Scholar] [CrossRef]
- Arevalo, J.; González, F.A.; Ramos-Pollán, R.; Oliveira, J.L.; Lopez, M.A.G. Representation learning for mammography mass lesion classification with convolutional neural networks. Comput. Methods Programs Biomed. 2016, 127, 248–257. [Google Scholar] [CrossRef] [PubMed]
- Sun, W.; Tseng, T.L.B.; Zhang, J.; Qian, W. Enhancing deep convolutional neural network scheme for breast cancer diagnosis with unlabeled data. Comput. Med Imaging Graph. 2017, 57, 4–9. [Google Scholar] [CrossRef] [Green Version]
- Gao, X.; Li, W.; Loomes, M.; Wang, L. A fused deep learning architecture for viewpoint classification of echocardiography. Inf. Fusion 2017, 36, 103–113. [Google Scholar] [CrossRef]
- Jeyaraj, P.R.; Samuel Nadar, E.R. Computer-assisted medical image classification for early diagnosis of oral cancer employing deep learning algorithm. J. Cancer Res. Clin. Oncol. 2019, 145, 829–837. [Google Scholar] [CrossRef]
- Xu, G.; Li, H.; Zhang, Y.; Xu, S.; Ning, J.; Deng, R.H. Privacy-preserving federated deep learning with irregular users. IEEE Trans. Dependable Secur. Comput. 2020, 19, 1364–1381. [Google Scholar] [CrossRef]
- Li, M.; Chow, S.S.; Hu, S.; Yan, Y.; Shen, C.; Wang, Q. Optimizing privacy-preserving outsourced convolutional neural network predictions. IEEE Trans. Dependable Secur. Comput. 2020, 19, 1592–1604. [Google Scholar] [CrossRef]
- Zheng, Y.; Duan, H.; Tang, X.; Wang, C.; Zhou, J. Denoising in the dark: Privacy-preserving deep neural network-based image denoising. IEEE Trans. Dependable Secur. Comput. 2019, 18, 1261–1275. [Google Scholar] [CrossRef]
- Liu, X.; Zheng, Y.; Yuan, X.; Yi, X. Securely Outsourcing Neural Network Inference to the Cloud with Lightweight Techniques. IEEE Trans. Dependable Secur. Comput. 2022, 20, 620–636. [Google Scholar] [CrossRef]
- Falcetta, A.; Roveri, M. Privacy-preserving deep learning with homomorphic encryption: An introduction. IEEE Comput. Intell. Mag. 2022, 17, 14–25. [Google Scholar] [CrossRef]
- Shen, W.; Yu, J.; Yang, M.; Hu, J. Efficient Identity-Based Data Integrity Auditing with Key-Exposure Resistance for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 2022. [Google Scholar] [CrossRef]
- Yao, X.; Wang, X.; Wang, S.H.; Zhang, Y.D. A comprehensive survey on convolutional neural network in medical image analysis. Multimed. Tools Appl. 2022, 81, 41361–41405. [Google Scholar] [CrossRef]
- Lee, J.S. A review of deep-learning-based approaches for attenuation correction in positron emission tomography. IEEE Trans. Radiat. Plasma Med. Sci. 2020, 5, 160–184. [Google Scholar] [CrossRef]
- Dargan, S.; Kumar, M.; Ayyagari, M.R.; Kumar, G. A survey of deep learning and its applications: A new paradigm to machine learning. Arch. Comput. Methods Eng. 2020, 27, 1071–1092. [Google Scholar] [CrossRef]
- Basha, S.S.; Dubey, S.R.; Pulabaigari, V.; Mukherjee, S. Impact of fully connected layers on performance of convolutional neural networks for image classification. Neurocomputing 2020, 378, 112–119. [Google Scholar] [CrossRef] [Green Version]
- Braeken, A. Public key versus symmetric key cryptography in client–server authentication protocols. Int. J. Inf. Secur. 2022, 21, 103–114. [Google Scholar] [CrossRef]
- Wei, W.; Tang, C.; Chen, Y. Efficient Privacy-Preserving K-Means Clustering from Secret-Sharing-Based Secure Three-Party Computation. Entropy 2022, 24, 1145. [Google Scholar] [CrossRef] [PubMed]
- Araki, T.; Furukawa, J.; Lindell, Y.; Nof, A.; Ohara, K. High-throughput semi-honest secure three-party computation with an honest majority. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 805–817. [Google Scholar]
- Keller, M.; Sun, K. Secure quantized training for deep learning. In Proceedings of the International Conference on Machine Learning, Seoul, Republic of Korea, 17–23 July 2022; pp. 10912–10938. [Google Scholar]
- Mohassel, P.; Rindal, P. ABY3: A mixed protocol framework for machine learning. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 35–52. [Google Scholar]
- Goldschmidt, R.E. Applications of Division by Convergence. Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 1964. [Google Scholar]
- Catrina, O.; Saxena, A. Secure computation with fixed-point numbers. In Financial Cryptography and Data Security, In Proceedings of the 14th International Conference, FC 2010, Tenerife, Canary Islands, 25–28 January 2010; Revised Selected Papers 14; Springer: Berlin/Heidelberg, Germany, 2010; pp. 35–50. [Google Scholar]
- Dong, Y.; Liu, Q.; Du, B.; Zhang, L. Weighted feature fusion of convolutional neural network and graph attention network for hyperspectral image classification. IEEE Trans. Image Process. 2022, 31, 1559–1572. [Google Scholar] [CrossRef]
- Tanwar, V.K.; Raman, B.; Rajput, A.S.; Bhargava, R. SecureDL: A privacy preserving deep learning model for image recognition over cloud. J. Vis. Commun. Image Represent. 2022, 86, 103503. [Google Scholar] [CrossRef]
- Rotaru, D.; Wood, T. Marbled circuits: Mixing arithmetic and boolean circuits with active security. In Proceedings of the International Conference on Cryptology in India, Hyderabad, India, 15–18 December 2019; pp. 227–249. [Google Scholar]
- Keller, M. MP-SPDZ: A versatile framework for multi-party computation. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA, 9–13 November 2020; pp. 1575–1590. [Google Scholar]
References | Architecture | Dataset | Performance Metric | Computation Burden | Security |
---|---|---|---|---|---|
Arevalo et al. [17] | (Conv, ReLU, maxpool) × 2 + FC | Breast cancer benchmarking dataset | AUC 82.2% | Local side | ✗ |
Sun et al. [18] | (Conv, maxpool) × 3, FC | Breast cancer benchmarking dataset | Accuracy 82.43%, AUC 88.18% | Local side | ✗ |
Gao et al. [19] | Two path CNN of seven layers (conv, ReLU, maxpool) × 2, (conv, ReLU) × 2, (conv, ReLU, maxpool), (conv, dropout) × 2 | Tsinghua University Hospital, Beijing and Fuzhou University Hospital, China | Accuracy 92.1% | Local side | ✗ |
Jeyaraj et al. [20] | (Conv, ReLU, maxpool) × 2, FC | oral cancer in HSI image | Accuracy 91.4% | Local side | ✗ |
Our scheme | (Conv, ReLU), (Conv, ReLU, maxpool) × 3, dropout, FC | Breast cancer benchmarking dataset | Accuracy 77.48% | Cloud servers | ✓ |
Scheme | Security | Technology | Model | Domain | Efficiency |
---|---|---|---|---|---|
Zheng et al. [23] | Semi-honest and non-colluding | Yao’s Garbled Circuits (GC) | Two parties | Medium | |
Li et al. [22] | Honest-but-curious and non-colluding | Homomorphic Encryption (HE) and Secret Sharing (SS) | Two parties | High | |
Liu et al. [24] | Semi-honest and non-colluding | Additive secret sharing (ASS) | Two parties | High | |
Our scheme | Semi-honest and non-colluding | Replicated Secret Sharing (RSS) | Three parties | High |
Secure Function | Communication | Round Complexity |
---|---|---|
SReLU | ||
SMP | ||
SD | k | |
SCONV | ||
SFC |
Parameters | Value |
---|---|
Number of epochs | 15 epochs |
Early stop | No |
Mini-batch size | The size of 128 |
Reshuffling training samples | Fisher-Yates shuffle with MP-SPDZ’s internal pseudo-random number generator as randomness source |
Learning rate | 0.01 for SGD |
Learning rate decay/schedule | No |
Random initialization | Independent random initialization by design |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yu, Q.; Zhang, H.; Xu, H.; Kong, F. POMIC: Privacy-Preserving Outsourcing Medical Image Classification Based on Convolutional Neural Network to Cloud. Appl. Sci. 2023, 13, 3439. https://doi.org/10.3390/app13063439
Yu Q, Zhang H, Xu H, Kong F. POMIC: Privacy-Preserving Outsourcing Medical Image Classification Based on Convolutional Neural Network to Cloud. Applied Sciences. 2023; 13(6):3439. https://doi.org/10.3390/app13063439
Chicago/Turabian StyleYu, Qing, Hanlin Zhang, Hansong Xu, and Fanyu Kong. 2023. "POMIC: Privacy-Preserving Outsourcing Medical Image Classification Based on Convolutional Neural Network to Cloud" Applied Sciences 13, no. 6: 3439. https://doi.org/10.3390/app13063439
APA StyleYu, Q., Zhang, H., Xu, H., & Kong, F. (2023). POMIC: Privacy-Preserving Outsourcing Medical Image Classification Based on Convolutional Neural Network to Cloud. Applied Sciences, 13(6), 3439. https://doi.org/10.3390/app13063439