When Machine Learning Meets Privacy in 6G: A Survey

被引:116
作者
Sun, Yuanyuan [1 ]
Liu, Jiajia [2 ]
Wang, Jiadai [1 ]
Cao, Yurui [1 ]
Kato, Nei [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Northwestern Polytech Univ, Natl Engn Lab Integrated Aero Space Ground Ocean, Sch Cybersecur, Xian 710072, Peoples R China
[3] Tohoku Univ, Grad Sch Informat Sci, Sendai, Miyagi 9808579, Japan
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2020年 / 22卷 / 04期
基金
中国国家自然科学基金;
关键词
Privacy; Data privacy; Big Data; MIMO communication; Tutorials; Machine learning; machine learning; 6G; violation; protection; communication; double-edged sword; SUPPORT VECTOR MACHINE; INTERNET-OF-THINGS; TRAFFIC CLASSIFICATION; HETEROGENEOUS INTERNET; VEHICLES CHALLENGES; INTRUSION DETECTION; ENCRYPTED DATA; MOBILE; EDGE; SECURITY;
D O I
10.1109/COMST.2020.3011561
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid-developing Artificial Intelligence (AI) technology, fast-growing network traffic, and emerging intelligent applications (e.g., autonomous driving, virtual reality, etc.) urgently require a new, faster, more reliable and flexible network form. At this time, researchers in both industry and academia have turned their attention to the sixth generation (6G) communication networks. In the 6G vision, various intelligent application scenarios that utilize Machine Learning (ML) technology (the most important branch of AI) will bring rich heterogeneous connections, as well as massive information storage and operations. When ML meets 6G, new opportunities will emerge along with numerous privacy challenges. On one hand, a secure ML structure, or the correct application of ML, can protect privacy in 6G. On the other hand, ML may be attacked or abused, resulting in privacy violation. It is worth noting that the alliance between 6G and ML may also be a double-edged sword in many cases, rather than absolutely infringe or protect privacy. Therefore, based on lots of existing meaningful works, this paper aims to provide a comprehensive survey of ML and privacy in 6G, with a view to further promoting the development of 6G and privacy protection technologies.
引用
收藏
页码:2694 / 2724
页数:31
相关论文
共 201 条
  • [1] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [2] Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
    Akhtar, Naveed
    Mian, Ajmal
    [J]. IEEE ACCESS, 2018, 6 : 14410 - 14430
  • [3] Privacy-Preserving Machine Learning: Threats and Solutions
    Al-Rubaie, Mohammad
    Chang, J. Morris
    [J]. IEEE SECURITY & PRIVACY, 2019, 17 (02) : 49 - 58
  • [4] Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud
    Al-Rubaie, Mohammad
    Chang, J. Morris
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2648 - 2663
  • [5] [Anonymous], 2012, P 29 INT COFERENCE I
  • [6] [Anonymous], 2005, SIGMOBILE Mob. Comput. Commun. Rev, DOI DOI 10.1145/1094549.1094558
  • [7] [Anonymous], 2016, ADVERSARIAL MACHINE
  • [8] [Anonymous], IEEE COMMUN SURVEYS
  • [9] Transforming health policy through machine learning
    Ashrafian, Hutan
    Darzi, Ara
    [J]. PLOS MEDICINE, 2018, 15 (11)
  • [10] Aslett LouisJ. M., 2015, ENCRYPTED STAT MACHI