4.7 Article

Trusted AI in Multiagent Systems: An Overview of Privacy and Security for Distributed Learning

期刊

PROCEEDINGS OF THE IEEE
卷 111, 期 9, 页码 1097-1132

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JPROC.2023.3306773

关键词

Distributed machine learning (ML); federated learning (FL); multiagent systems; privacy; security; trusted artificial intelligence (AI)

向作者/读者索取更多资源

Motivated by the increasing computational capacity of distributed end-user equipment and concerns about privacy, there has been considerable interest in machine learning and artificial intelligence that can be processed on distributed devices. However, this new paradigm also introduces new risks in terms of privacy and security. In this article, the authors provide a survey of the emerging security and privacy risks of distributed machine learning and discuss defense methods and future research directions.
Motivated by the advancing computational capacity of distributed end-user equipment (UE), as well as the increasing concerns about sharing private data, there has been considerable recent interest in machine learning (ML) and artificial intelligence (AI) that can be processed on distributed UEs. Specifically, in this paradigm, parts of an ML process are outsourced to multiple distributed UEs. Then, the processed information is aggregated on a certain level at a central server, which turns a centralized ML process into a distributed one and brings about significant benefits. However, this new distributed ML paradigm raises new risks in terms of privacy and security issues. In this article, we provide a survey of the emerging security and privacy risks of distributed ML from a unique perspective of information exchange levels, which are defined according to the key steps of an ML process, i.e., we consider the following levels: 1) the level of preprocessed data; 2) the level of learning models; 3) the level of extracted knowledge; and 4) the level of intermediate results. We explore and analyze the potential of threats for each information exchange level based on an overview of current state-of-the-art attack mechanisms and then discuss the possible defense methods against such threats. Finally, we complete the survey by providing an outlook on the challenges and possible directions for future research in this critical area.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据