A Study of Federated Learning with Internet of Things for Data Privacy and Security using Privacy Preserving Techniques

被引:0
作者
Shakeer S.M. [1 ]
机构
[1] School of Computer Science and Engineering, Vellore Institute of Technology, Tamilnadu, Vellore
关键词
communication and networking systems; data privacy; federated learning; internet of things; machine learning; Privacy preserving; vulnerabilities;
D O I
10.2174/1872212117666230112110257
中图分类号
学科分类号
摘要
To address the privacy concerns that arise from centralizing model training on a large number of IoT devices, a revolutionary new distributed learning framework called federated learning has been developed. This setup of devices works together to train models without compromising the security of individual data streams. To solve machine learning problems, a federated learning architecture relies on many clients working together through a central aggregator. To protect each device's privacy, we only access the training data at random. Because of its focus on decentralized processing and model transmission, federated learning considerably reduces systemic privacy risks and costs in comparison to conventional centralized machine learning systems. All client data is encrypted before being stored in a local database. Each user's device collects data locally for training during a federated learning session, and then uploads the final model to a centralized server. To provide a comprehensive assessment and inspire more research, this paper explores into the inner workings of federated learning from five different vantage points: data partitioning, privacy approaches, machine learning models, communication architectures, and system heterogeneity. Then, suggestions for further research are given, and a list is compiled of the most recent problems in federated learning. We conclude with an examination of the present applications of federated Learning knowledge. © 2024 Bentham Science Publishers.
引用
收藏
页码:1 / 17
页数:16
相关论文
共 114 条
[1]  
Alam T., Gupta R., Federated learning and its role in the privacy preservation of IoT devices, Future Internet, 14, 9, (2022)
[2]  
Devlin J., Chang M., Lee K., Toutanova K, BERT: Pre-training of deep bidirectional transformers for language under-standing, (2019)
[3]  
Zhu Y., Meijering E., Neural architecture search for micros-copy cell segmentation, Machine Learning in Medical Imaging. MLMI 2020. Lecture Notes in Comp. Sci, 12436, (2020)
[4]  
Yin X., Zhu Y., Hu J., 3D fingerprint recognition based on ridge-valley-guided 3D reconstruction and 3D topology polymer feature extraction, IEEE Trans. Pattern Anal. Mach. Intell, 43, 3, pp. 1085-1091, (2021)
[5]  
Silver D., Schrittwieser J., Simonyan K., Antonoglou I., Huang A., Guez A., Hubert T., Baker L., Lai M., Bolton A., Chen Y., Lillicrap T., Hui F., Sifre L., van den Driessche G., Graepel T., Hassabis D., Mastering the game of Go without human knowledge, Nature, 550, 7676, pp. 354-359, (2017)
[6]  
Hu J., Vasilakos A.V., Energy big data analytics and security: Challenges and opportunities, IEEE Trans. Smart Grid, 7, 5, pp. 2423-2436, (2016)
[7]  
Voigt P., Von dem Bussche A., The EU General Data Protection Regulation (GDPR), (2017)
[8]  
Chik W.B., The Singapore personal data protection act and an assessment of future trends in data privacy reform, Comput. Law Secur. Rep, 29, 5, pp. 554-575, (2013)
[9]  
Jatain D., Singh V., Dahiya N., A contemplative perspective on federated machine learning: Taxonomy, threats & vulnerability assessment and challenges, J. King Saud Univ.-Comput. Inform. Sci, 34, 9, pp. 6681-6698, (2022)
[10]  
Lin Y., Han S., Mao H., Wang Y., Dally W.J, Deep gradient compression. reducing the communication bandwidth for distributed training, (2017)