Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques

Citation

Yeow, Sin Qian and Ng, Kok Why (2023) Neural Network Based Data Encryption: A Comparison Study among DES, AES, and HE Techniques. JOIV : International Journal on Informatics Visualization, 7 (3-2). p. 2086. ISSN 2549-9610

[img] Text
44.pdf - Published Version
Restricted to Repository staff only

Download (4MB)

Abstract

With the improvement of technology and the continuous expansion and deepening of neural network technology, its application in computer network security plays an important role. However, the development of neural networks is accompanied by new threats and challenges. This paper proposes to encrypt the weight data using encryption algorithms and embed image encryption algorithms to improve protected data security further. The purpose is to address the feasibility and effectiveness of using modern encryption algorithms for data encryption in machine learning in response to data privacy breaches. The approach consists of training a neural network to simulate a model of machine learning and then encrypting it using Data Encryption Standard (DES), Advanced Encryption Standard (AES), and Homomorphic Encryption (HE) techniques, respectively. Its performance is evaluated based on the encryption/decryption accuracy and computational efficiency. The results indicate that combining DES with Blowfish offers moderate encryption and decryption speeds but is less secure than AES and HE. AES provides a practical solution, balancing security and performance, offering a relatively swift encryption and decryption process while maintaining high security. However, Fernet and HE present a viable alternative if data privacy is a top priority. Encryption and decryption times increase with file size and require sufficient computational resources. Future research should explore image encryption techniques to balance security and accurate image retrieval during decryption. Advanced privacy-preserving approaches, such as differential privacy and secure multi-party computation, may enhance security and confidentiality in digital encryption and decryption processes.

Item Type: Article
Uncontrolled Keywords: Machine learning
Subjects: Q Science > Q Science (General) > Q300-390 Cybernetics
Q Science > QA Mathematics > QA71-90 Instruments and machines > QA75.5-76.95 Electronic computers. Computer science
Divisions: Faculty of Computing and Informatics (FCI)
Depositing User: Ms Nurul Iqtiani Ahmad
Date Deposited: 27 Mar 2024 02:26
Last Modified: 27 Mar 2024 02:26
URII: http://shdl.mmu.edu.my/id/eprint/12203

Downloads

Downloads per month over past year

View ItemEdit (login required)