Securing Collaborative Deep Learning in Industrial Applications Within Adversarial Scenarios

被引:26
作者
Esposito, Christian [1 ]
Su, Xin [2 ]
Aljawarneh, Shadi A. [3 ]
Choi, Chang [4 ]
机构
[1] Univ Salerno, Dept Comp Sci, I-84084 Fisciano, Italy
[2] Hohai Univ, Coll IoT Engn, Changzhou 213022, Peoples R China
[3] Jordan Univ Sci & Technol, Software Engn Dept, Irbid 22110, Jordan
[4] Chosun Univ, IT Inst, Gwangju 61452, South Korea
基金
新加坡国家研究基金会;
关键词
Adversarial learning; collaborative learning; deep learning (DL); energy efficiency; game theory; privacy;
D O I
10.1109/TII.2018.2853676
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several industries in many different domains are looking at deep learning as a way to take advantage of the insights in their data, to improve their competitiveness, to open up novel business possibilities, or to resolve the problem that thought to be impossible to tackle. The large scale of the systems where deep learning is applied and the need of preserving the privacy of the used data have imposed a shift from the traditional centralized deployment to a more collaborative one. However, this has opened up several vulnerabilities caused by compromised nodes and inputs, with traditional crypto primitives and access control models exploited to offer protection means. Providing security can be costly in terms of higher energy consumption, calling for a wise use of these protection means. This paper exploits game theory to model interactions among collaborative deep learning nodes and to decide when using actions to support security enhancements.
引用
收藏
页码:4972 / 4981
页数:10
相关论文
共 30 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
[Anonymous], 2017, ARXIV170701155
[3]  
Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
[4]   COURTSHIP AS A WAITING GAME [J].
BERGSTROM, TC ;
BAGNOLI, M .
JOURNAL OF POLITICAL ECONOMY, 1993, 101 (01) :185-202
[5]  
Cao Z., 2015, ARXIV151105341
[6]  
Chabanne H., 2017, IACR CRYPTOLOGY EPRI, V2017, P35
[7]  
Dwork C, 2008, LECT NOTES COMPUT SC, V4890, P1
[8]   Cheap talk [J].
Farrell, J ;
Rabin, M .
JOURNAL OF ECONOMIC PERSPECTIVES, 1996, 10 (03) :103-118
[9]   Generative Adversarial Networks [J].
Goodfellow, Ian ;
Pouget-Abadie, Jean ;
Mirza, Mehdi ;
Xu, Bing ;
Warde-Farley, David ;
Ozair, Sherjil ;
Courville, Aaron ;
Bengio, Yoshua .
COMMUNICATIONS OF THE ACM, 2020, 63 (11) :139-144
[10]   Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds [J].
Guo, Cheng ;
Zhuang, Ruhan ;
Jie, Yingmo ;
Ren, Yizhi ;
Wu, Ting ;
Choo, Kim-Kwang Raymond .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)