Federated learning vulnerabilities, threats and defenses: A systematic review and future directions

被引:4
作者
Almutairi, Suzan [1 ]
Barnawi, Ahmed [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah, Saudi Arabia
关键词
Federated learning; Deep learning; Security; Privacy; ASSOCIATION; PRIVACY;
D O I
10.1016/j.iot.2023.100947
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, a broad range of items, ranging from smartphones to smart cars are connected together via the Internet, also known as the Internet of Things (IoT). The IoT is powered by Machine Learning (ML) to facilitate client services and applications. Traditionally, centralized ML techniques require the collection and processing of enormous data sets, which may not be feasible in the context of realistic IoT applications scenarios, due to the exponential increase in IoT devices. Federated learning (FL) is a new paradigm of ML training that relies on decentralized collaborative learning, between various clients, where data is located locally with each client. FL has brings about many advantages, such as helping preserve privacy where the client's local data is retained locally to train the model. While FL has emerged as an attractive and promising training solution to protect clients' privacy, it needs additional exploration to specify its potential security implications, as these may preclude its routine adoption. Existing FL algorithms, security and privacy techniques exhibit new vulnerabilities, which could be exploit by attackers to compromise the FL model. Thus, it is critical to increase awareness of the potential consequences associated with novel threats to FL models. Prior research has examined various FL concepts, such as algorithms, attacks, privacy, vulnerabilities, etc. However, these concepts were not encompassed in a single survey. To the best of our knowledge, this is the first survey combining analysis of FL security and privacy techniques by highlighting sources of FL vulnerabilities, possible attacks and privacy techniques, and presenting FL basics including data distribution and aggregation algorithms. We then present state of the art studies in FL attack studies, and privacy techniques for protecting against these attacks. Finally, we conclude by identifying FL challenges and future research directions to address current limitations.
引用
收藏
页数:33
相关论文
共 123 条
[1]  
Abad MSH, 2020, INT CONF ACOUST SPEE, P8866, DOI [10.1109/ICASSP40776.2020.9054634, 10.1109/icassp40776.2020.9054634]
[2]   A Survey on Federated Learning: The Journey From Centralized to Distributed On-Site Learning and Beyond [J].
AbdulRahman, Sawsan ;
Tout, Hanine ;
Ould-Slimane, Hakima ;
Mourad, Azzam ;
Talhi, Chamseddine ;
Guizani, Mohsen .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5476-5497
[3]  
Adler J, 2018, ADV NEUR IN, V31
[4]  
Aledhari M, 2020, IEEE ACCESS, V8, P140699, DOI [10.1109/ACCESS.2020.3013541, 10.1109/access.2020.3013541]
[5]   Cognitive Smart Healthcare for Pathology Detection and Monitoring [J].
Amin, Syed Umar ;
Hossain, M. Shamim ;
Muhammad, Ghulam ;
Alhussein, Musaed ;
Rahman, Md Abdur .
IEEE ACCESS, 2019, 7 :10745-10753
[6]  
Andrew G, 2021, ADV NEUR IN, V34
[7]  
[Anonymous], 2020, ADV NEUR IN
[8]  
Ateniese Giuseppe, 2015, International Journal of Security and Networks, V10, P137
[9]   Model Evasion Attack on Intrusion Detection Systems using Adversarial Machine Learning [J].
Ayub, Md Ahsan ;
Johnson, William A. ;
Talbert, Douglas A. ;
Siraj, Ambareen .
2020 54TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2020, :324-329
[10]  
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938