Security Issues and Privacy Preserving in Machine Learning

被引:0
作者
Wei L. [1 ]
Chen C. [1 ]
Zhang L. [1 ]
Li M. [1 ]
Chen Y. [1 ]
Wang Q. [1 ]
机构
[1] College of Information Technology, Shanghai Ocean University, Shanghai
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2020年 / 57卷 / 10期
基金
中国国家自然科学基金; 上海市自然科学基金;
关键词
Differential privacy; Homomorphic encryption; Machine learning; Privacy preserving; Secure multi-party computation; Security threat;
D O I
10.7544/issn1000-1239.2020.20200426
中图分类号
学科分类号
摘要
In recent years, machine learning has developed rapidly, and it is widely used in the aspects of work and life, which brings not only convenience but also great security risks. The security and privacy issues have become a stumbling block in the development of machine learning. The training and inference of the machine learning model are based on a large amount of data, which always contains some sensitive information. With the frequent occurrence of data privacy leakage events and the aggravation of the leakage scale annually, how to make sure the security and privacy of data has attracted the attention of the researchers from academy and industry. In this paper we introduce some fundamental concepts such as the adversary model in the privacy preserving of machine learning and summarize the common security threats and privacy threats in the training and inference phase of machine learning, such as privacy leakage of training data, poisoning attack, adversarial attack, privacy attack, etc. Subsequently, we introduce the common security protecting and privacy preserving methods, especially focusing on homomorphic encryption, secure multi-party computation, differential privacy, etc. and compare the typical schemes and applicable scenarios of the three technologies. At the end, the future development trend and research direction of machine learning privacy preserving are prospected. © 2020, Science Press. All right reserved.
引用
收藏
页码:2066 / 2085
页数:19
相关论文
共 160 条
  • [1] Julia C W., The Cambridge analytica scandal changed the world-but it didn't change Facebook, The Guardian, (2019)
  • [2] Olivia S., Facial recognition's "dirty little secret": Millions of online photos scraped without consent, NBC News, (2019)
  • [3] Drew H., Thousands of zoom video calls left exposed on open Web, The Washington Post
  • [4] Mitchell T M., Machine Learning, (2003)
  • [5] Liao Guohui, Liu Jiayong, Amalicious code detection method based on data mining and machine learning, Journal of Information Securyity Research, 2, 1, pp. 74-79, (2016)
  • [6] Han Ying, Li Shanshan, Chen Fuming, The seismic anomaly data mining model based on machine learning, Computer Simulation, 31, 11, pp. 319-322, (2014)
  • [7] Chen Xueyun, Xiang Shiming, Liu Chenglin, Et al., Vehicle-detection in satellite images by hybrid deep convolutional neural networks, IEEE Geoence and Remote Sensing Letters, 11, 10, pp. 1797-1801, (2014)
  • [8] Chen Sizhe, Wang Haipeng, Xu Feng, Et al., Target classification using the deep convolutional networks for SAR images, IEEE Transactions on Geoence and Remote Sensing, 54, 8, pp. 4806-4817, (2016)
  • [9] Wittel G L, Wu S F., On attacking statistical spam filters, Proc of Conf on Email & Anti-spam, (2004)
  • [10] Launchbury J, Archer D, DuBuisson T, Et al., Application-scale secure multiparty computation, Proc of European Symp on Programming Languages and Systems, pp. 8-26, (2014)