Distributed computing in multi-agent systems: a survey of decentralized machine learning approaches

被引:1
作者
Ahmed, Ijaz [1 ,2 ]
Syed, Miswar Akhtar [3 ]
Maaruf, Muhammad [4 ]
Khalid, Muhammad [1 ,2 ]
机构
[1] King Fahd Univ Petr & Minerals KFUPM, Elect Engn Dept, Dhahran 31261, Saudi Arabia
[2] King Fahd Univ Petr & Minerals KFUPM, Interdisciplinary Res Ctr Sustainable Energy Syst, Dhahran 31261, Saudi Arabia
[3] Univ Waterloo, Dept Elect & Comp Engn, Ave W, Waterloo, ON N2L 3G1, Canada
[4] Imperial Coll London, Dept Elect & Elect Engn, London SW7 2AZ, England
关键词
Machine learning; Multi-agent system; User data safety; Distributed systems; DATA PRIVACY; SECURE; CLASSIFICATION; HARDWARE; COMPRESSION; INFERENCE; NETWORKS; SOFTWARE; INTERNET; ATTACKS;
D O I
10.1007/s00607-024-01356-0
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
At present, there is a pressing need for data scientists and academic researchers to devise advanced machine learning and artificial intelligence-driven systems that can effectively tackle forthcoming security challenges. This is due to the rapid advancement in processing capabilities of distributed client devices, as well as mounting apprehensions about the exposure of sensitive user data. This particular methodology renders the constituents of a decentralized machine learning paradigm private and allocates them to a diverse array of remote client apparatuses. Following this, a primary controller clusters the extracted machine learning data. This process effectively transforms a centrally controlled machine learning procedure into a distributed one, leading to significant potential benefits. Regrettably, the implementation of a progressive strategy for networked machine learning poses additional obstacles to the preservation of user data confidentiality and cyber-security apprehensions. The present endeavor aims to scrutinize the plausible hazards that decentralized machine learning may engender for the security and confidentiality of user data, as well as their well-being, through the lens of data transmission thresholds. These risks are contingent upon the salient stages of a machine learning model. The aforementioned procedures include: (i) establishing thresholds for raw data prior to processing; (ii) establishing thresholds for the learning framework; (iii) establishing thresholds for the obtained information; and (iv) establishing thresholds for the provisional outcome. We conducted a comprehensive analysis of state-of-the-art hacking methodologies, evaluating their potential vulnerabilities at every stage of the transaction, and subsequently deliberated on practical solutions to address these issues. Ultimately, the survey culminates in an exposition of the obstacles and prospects that confront researchers in this intricate realm.
引用
收藏
页数:57
相关论文
共 252 条
[1]   Machine learning in identity and access management systems: Survey and deep dive [J].
Aboukadri, Sara ;
Ouaddah, Aafaf ;
Mezrioui, Abdellatif .
COMPUTERS & SECURITY, 2024, 139
[2]   Learned Gradient Compression for Distributed Deep Learning [J].
Abrahamyan, Lusine ;
Chen, Yiming ;
Bekoulis, Giannis ;
Deligiannis, Nikos .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 33 (12) :7330-7344
[3]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[4]   AI-based anomaly identification techniques for vehicles communication protocol systems: Comprehensive investigation, research opportunities and challenges [J].
Ahmad, Hasnain ;
Gulzar, Muhammad Majid ;
Aziz, Saddam ;
Habib, Salman ;
Ahmed, Ijaz .
INTERNET OF THINGS, 2024, 27
[5]  
Ahmad S., 2012, Int J Comput Appl, V46, P26
[6]  
Ahmed I., 2024, 2024 IEEE INT C IND, P1, DOI [10.1109/ICIT58233.2024.10540926, DOI 10.1109/ICIT58233.2024.10540926]
[7]  
Ahmed I, Metaheuristic techniqes for power economic dispatch of units with valve-point effects and multiple fuels
[8]  
Ahmed I, 2014, Adv Electr Eng, V2014, DOI [10.1155/2014/765053, DOI 10.1155/2014/765053]
[9]   Consensus and Clustering Approach for Dynamic Event-Triggered Distributed Optimization of Power System Networks With Saturation Constraint [J].
Ahmed, Ijaz ;
Rehan, Muhammad ;
Basit, Abdul ;
Al-Ismail, Fahad Saleh ;
Khalid, Muhammad .
IEEE CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2024, 47 (03) :136-147
[10]  
Ahmed I, 2022, ASIA CONTROL CONF AS, P1196