Security Issues and Privacy Preserving in Machine Learning

被引:0
作者
Wei L. [1 ]
Chen C. [1 ]
Zhang L. [1 ]
Li M. [1 ]
Chen Y. [1 ]
Wang Q. [1 ]
机构
[1] College of Information Technology, Shanghai Ocean University, Shanghai
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2020年 / 57卷 / 10期
基金
中国国家自然科学基金; 上海市自然科学基金;
关键词
Differential privacy; Homomorphic encryption; Machine learning; Privacy preserving; Secure multi-party computation; Security threat;
D O I
10.7544/issn1000-1239.2020.20200426
中图分类号
学科分类号
摘要
In recent years, machine learning has developed rapidly, and it is widely used in the aspects of work and life, which brings not only convenience but also great security risks. The security and privacy issues have become a stumbling block in the development of machine learning. The training and inference of the machine learning model are based on a large amount of data, which always contains some sensitive information. With the frequent occurrence of data privacy leakage events and the aggravation of the leakage scale annually, how to make sure the security and privacy of data has attracted the attention of the researchers from academy and industry. In this paper we introduce some fundamental concepts such as the adversary model in the privacy preserving of machine learning and summarize the common security threats and privacy threats in the training and inference phase of machine learning, such as privacy leakage of training data, poisoning attack, adversarial attack, privacy attack, etc. Subsequently, we introduce the common security protecting and privacy preserving methods, especially focusing on homomorphic encryption, secure multi-party computation, differential privacy, etc. and compare the typical schemes and applicable scenarios of the three technologies. At the end, the future development trend and research direction of machine learning privacy preserving are prospected. © 2020, Science Press. All right reserved.
引用
收藏
页码:2066 / 2085
页数:19
相关论文
共 160 条
  • [11] Ling Chentian, Evolutionaryneural network for credit card fraud detection, Microelectronics & Computer, 28, 10, pp. 14-17, (2011)
  • [12] Fu Kang, Cheng Dawei, Tu Yi, Et al., Credit card fraud detection using convolutional neural networks, Proc of Int Conf on Neural Information Processing, pp. 483-490, (2016)
  • [13] Roy A, Sun J, Mahoney R, Et al., Deep learning detecting fraud in credit card transactions, Proc of 2018 Systems and Information Engineering Design Symp (SIEDS), pp. 129-134, (2018)
  • [14] Acharya U R, Oh S L, Hagiwara Y, Et al., Deep convolutional neural network for the automated detection and diagnosis of seizure using EEG signals, Computers in Biology and Medicine, 100, pp. 270-278, (2018)
  • [15] Arabasadi Z, Alizadehsani R, Roshanzamir M, Et al., Computer aided decision making for heart disease detection using hybrid neural network-genetic algorithm, Computer Methods and Programs in Biomedicine, 141, pp. 19-26, (2017)
  • [16] Alpaydin E., Introduction to Machine Learning, (2010)
  • [17] Van Hasselt H, Guez A, Silver D., Deep reinforcement learning with double q-learning, Proc of the 3rd AAAI Conf on Artificial Intelligence, pp. 2094-2100, (2016)
  • [18] Barreno M, Nelson B, Joseph A D, Et al., The security of machine learning, Machine Learning, 81, 2, pp. 121-148, (2010)
  • [19] Biggio B, Fumera G, Roli F., Security evaluation of pattern classifiers under attack, IEEE Transactions on Knowledge and Data Engineering, 26, 4, pp. 984-996, (2013)
  • [20] Tan Zuowen, Zhang Lianfu, Survey on privacy preserving techniques for machine learning, Journal of Software, 31, 7, pp. 2127-2156, (2020)