Survey on Privacy Preserving Techniques for Machine Learning

被引:0
作者
Tan Z.-W. [1 ]
Zhang L.-F. [1 ]
机构
[1] Department of Computer Science and Technology, School of Information Managemen, Jiangxi University of Finance and Economics, Nanchang
来源
Ruan Jian Xue Bao/Journal of Software | 2020年 / 31卷 / 07期
基金
中国国家自然科学基金;
关键词
Differential privacy; Homomorphic encryption; Machine learning; Privacy-preserving; Secure multiparty computation;
D O I
10.13328/j.cnki.jos.006052
中图分类号
学科分类号
摘要
Machine learning has become a core technology in areas such as big data, Internet of Things, and cloud computing. Training machine learning models requires a large amount of data, which is often collected by means of crowdsourcing and contains a large number of private data including personally identifiable information (such as phone number, id number, etc.) and sensitive information (such as financial data, health care, etc.). How to protect these data with low cost and high efficiency is an important issue. This paper first introduces the concept of machine learning, explains various definitions of privacy in machine learning and demonstrates all kinds of privacy threats encountered in machine learning, then continues to elaborate on the working principle and outstanding features of the mainstream technology of machine learning privacy protection. According to differential privacy, homomorphic encryption, and secure multi-party computing, the research achievements in the field of machine learning privacy protection are summarized respectively. On this basis, the paper comparatively analyzes the main advantages and disadvantages of different mechanisms of privacy preserving for machine learning. Finally, the developing trend of privacy preserving for machine learning is prospected, and the possible research directions in this field are proposed. © Copyright 2020, Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:2127 / 2156
页数:29
相关论文
共 128 条
  • [1] Ducange P, Pecori R, Mezzina P., A glimpse on big data analytics in the framework of marketing strategies, Soft Computing, 22, 1, pp. 325-342, (2018)
  • [2] Yin Y, Zhang W, Xu Y, Zhang H, Mai Z, Yu L., QoS prediction for mobile edge service recommendation with auto-encoder, IEEE Access, 7, pp. 62312-62324, (2019)
  • [3] Amazon ML.
  • [4] Azure ML.
  • [5] Big ML.
  • [6] Song CZ, Ristenpart T, Shmatikov V., Machine learning models that remember too much, Proc. of the the 2017 ACM SIGSAC Conf. on Computer and Communications Security, pp. 587-601, (2017)
  • [7] Ateniese G, Felici G, Mancini LV, Spognardi A, Villani A, Vitali D., Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers, (2015)
  • [8] Rahulamathavan Y, Phan RC-W, Veluru S, Cumanan K, Rajarajan M., Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud, IEEE Trans. on Dependable and Secure Computing, 11, 5, pp. 467-479, (2014)
  • [9] Wilber MJ, Boult TE., Secure remote matching with privacy: Scrambled support vector vaulted verification (s 2 v 3), Proc. of the the IEEE Workshop on the Applications of Computer Vision, pp. 169-176, (2012)
  • [10] Bost R, Popa RA, Tu S, Goldwasser S., Machine learning classification over encrypted data, Proc. of the 22nd Annual Network and Distributed System Security Symposium, (2015)