Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Security and Efficiency Tradeoffs in Machine Learning for Cloud Platforms: An Analysis of Encryption Strategies and Performance
Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
Blekinge Institute of Technology, Faculty of Computing, Department of Software Engineering.
2024 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Background: Privacy-preserving machine learning (PPML) is increasingly important as organizations seek to leverage sensitive data while complying with data protection regulations. Homomorphic encryption schemes, such as CKKS and Paillier, enable machine learning on encrypted data, ensuring data confidentiality. However, these encryption methods introduce computational overhead that can affect the efficiency and scalability of machine-learning models. This thesis investigates the trade-offs between encryption strength, computational efficiency, and resource utilization in machine learning models trained on encrypted data.

Objectives: The primary objective of this research is to evaluate the impact of CKKS and Paillier encryption on key machine learning metrics—model accuracy, training and testing times, and resource utilization (CPU and RAM consumption)—across three machine learning algorithms: Linear Regression, Logistic Regression, and SVM. This study provides insights into how organizations can optimize their machine-learning workflows while ensuring data privacy.

Methods: We conducted a series of experiments using both CKKS and Paillierencryption schemes to train and test machine learning models on datasets of varying dimensionality (low, medium, and high attributes and instances). Results were analyzed in terms of accuracy, training/testing time, and resource consumption, providing a comparative analysis of the two encryption methods across different algorithms.

Results: CKKS and Paillier encryption preserved model accuracy across all tested algorithms. However, CKKS consistently outperformed Paillier in terms of training and testing times, making it more suitable for real-time applications. Paillier provided higher precision in Linear Regression but resulted in significantly longer training times, especially with high-dimensional datasets. CKKS also exhibited higher RAM consumption, whereas Paillier was more memory-efficient, albeit at the cost of longer processing times. 

Conclusions: This study provides a comprehensive evaluation of how homomorphic encryption impacts machine learning performance. CKKS is better suited for organizations requiring quick model updates and real-time predictions, while Paillier is preferable for applications requiring higher precision and lower memory usage. The findings offer actionable insights for balancing data privacy with computational efficiency in privacy-preserving machine learning implementations. 

Place, publisher, year, edition, pages
2024. , p. 72
Keywords [en]
Homomorphic Encryption, CKKS, Paillier, Privacy-Preserving Machine Learning, Computational Efficiency
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:bth-27215OAI: oai:DiVA.org:bth-27215DiVA, id: diva2:1919492
Subject / course
PA2534 Master's Thesis (120 credits) in Software Engineering
Educational program
PAADA Master Qualification Plan in Software Engineering 120,0 hp
Presentation
2024-09-23, C245, Valhallavägen 10, 371 79, Karlskrona, 11:00 (English)
Supervisors
Examiners
Available from: 2024-12-09 Created: 2024-12-09 Last updated: 2025-09-30Bibliographically approved

Open Access in DiVA

fulltext(2830 kB)258 downloads
File information
File name FULLTEXT01.pdfFile size 2830 kBChecksum SHA-512
d49b6e193737f6ddf972c365581dc28d28e4f013febd7fe6b1f24600d6f6f16eb7317c2855bdce6bd6bcd7243f7758801259b559c07efa12009645074eac3ba4
Type fulltextMimetype application/pdf

By organisation
Department of Software Engineering
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 258 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 600 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf