Publication | Closed Access
Trusted AI in Multiagent Systems: An Overview of Privacy and Security for Distributed Learning
76
Citations
239
References
2023
Year
Artificial IntelligencePrivacy ProtectionEngineeringMachine LearningInformation SecurityVerificationAutonomous Agent SystemDistributed Ai SystemMulti-agent LearningIntelligent SystemsDistributed MlData ScienceAdversarial Machine LearningSystems EngineeringDistributed Machine LearningMultiagent SystemsData PrivacyComputer ScienceDistributed LearningDifferential PrivacyPrivacyPrivacy LeakageData SecurityCryptographyMulti-agent SystemsFederated LearningCloud ComputingDistributed Artificial IntelligenceBig Data
Motivated by the advancing computational capacity of distributed end-user equipment (UE), as well as the increasing concerns about sharing private data, there has been considerable recent interest in machine learning (ML) and artificial intelligence (AI) that can be processed on distributed UEs. Specifically, in this paradigm, parts of an ML process are outsourced to multiple distributed UEs. Then, the processed information is aggregated on a certain level at a central server, which turns a centralized ML process into a distributed one and brings about significant benefits. However, this new distributed ML paradigm raises new risks in terms of privacy and security issues. In this article, we provide a survey of the emerging security and privacy risks of distributed ML from a unique perspective of information exchange levels, which are defined according to the key steps of an ML process, i.e., we consider the following levels: 1) the level of preprocessed data; 2) the level of learning models; 3) the level of extracted knowledge; and 4) the level of intermediate results. We explore and analyze the potential of threats for each information exchange level based on an overview of current state-of-the-art attack mechanisms and then discuss the possible defense methods against such threats. Finally, we complete the survey by providing an outlook on the challenges and possible directions for future research in this critical area.
| Year | Citations | |
|---|---|---|
Page 1
Page 1