Trusted AI in Multiagent Systems: An Overview of Privacy and Security for Distributed Learning

被引:16
|
作者
Ma, Chuan [1 ,2 ]
Li, Jun [3 ]
Wei, Kang [3 ,4 ]
Liu, Bo [5 ]
Ding, Ming [6 ]
Yuan, Long [7 ]
Han, Zhu [8 ,9 ]
Vincent Poor, H. [10 ]
机构
[1] Zhejiang Lab, Hangzhou 311121, Peoples R China
[2] Southeast Univ, Key Lab Comp Network & Informat Integrat, Minist Educ, Nanjing 211189, Peoples R China
[3] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210096, Peoples R China
[4] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
[5] Univ Technol Sydney, Sch Comp Sci, Sydney, NSW 2007, Australia
[6] CSIRO, Data61, Sydney, NSW 2015, Australia
[7] Nanjing Univ Sci & Technol, Sch Comp Sci, Nanjing 210096, Peoples R China
[8] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
[9] Kyung Hee Univ, Dept Comp Sci & Engn, Seoul 446701, South Korea
[10] Princeton Univ, Dept Elect & Comp Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Distributed machine learning (ML); federated learning (FL); multiagent systems; privacy; security; trusted artificial intelligence (AI); FINITE-TIME CONSENSUS; NEURAL-NETWORKS; DE-ANONYMIZATION; ATTACKS; MODEL; CHALLENGES; FRAMEWORK; SERVICES;
D O I
10.1109/JPROC.2023.3306773
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Motivated by the advancing computational capacity of distributed end-user equipment (UE), as well as the increasing concerns about sharing private data, there has been considerable recent interest in machine learning (ML) and artificial intelligence (AI) that can be processed on distributed UEs. Specifically, in this paradigm, parts of an ML process are outsourced to multiple distributed UEs. Then, the processed information is aggregated on a certain level at a central server, which turns a centralized ML process into a distributed one and brings about significant benefits. However, this new distributed ML paradigm raises new risks in terms of privacy and security issues. In this article, we provide a survey of the emerging security and privacy risks of distributed ML from a unique perspective of information exchange levels, which are defined according to the key steps of an ML process, i.e., we consider the following levels: 1) the level of preprocessed data; 2) the level of learning models; 3) the level of extracted knowledge; and 4) the level of intermediate results. We explore and analyze the potential of threats for each information exchange level based on an overview of current state-of-the-art attack mechanisms and then discuss the possible defense methods against such threats. Finally, we complete the survey by providing an outlook on the challenges and possible directions for future research in this critical area.
引用
收藏
页码:1097 / 1132
页数:36
相关论文
共 50 条
  • [1] Trusted AI and the Contribution of Trust Modeling in Multiagent Systems
    Cohen, Robin
    Schaekermann, Mike
    Liu, Sihao
    Cormier, Michael
    AAMAS '19: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2019, : 1644 - 1648
  • [2] DISTRIBUTED AI, DECENTRALIZED AI, AND MULTIAGENT SYSTEMS - FOREWORD
    KELEMEN, J
    COMPUTERS AND ARTIFICIAL INTELLIGENCE, 1993, 12 (01): : 1 - 4
  • [3] Security and privacy in collaborative distributed systems
    Yau, SS
    Bonatti, PA
    Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005, : 267 - 267
  • [4] Security and Privacy for Distributed Optimization & Distributed Machine Learning
    Vaidya, Nitin H.
    PROCEEDINGS OF THE 2021 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING (PODC '21), 2021, : 573 - 573
  • [5] Security and Privacy Issues in Ehealthcare Systems: Towards Trusted Services
    Zriqat, Isra'a Ahmed
    Altamimi, Ahmad Mousa
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (09) : 229 - 236
  • [6] An overview of implementing security and privacy in federated learning
    Hu, Kai
    Gong, Sheng
    Zhang, Qi
    Seng, Chaowen
    Xia, Min
    Jiang, Shanshan
    ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (08)
  • [7] Security and survivability of distributed systems: An overview
    Kyamakya, K
    Jobmann, K
    Meincke, M
    MILCOM 2000: 21ST CENTURY MILITARY COMMUNICATIONS CONFERENCE PROCEEDINGS, VOLS 1 AND 2: ARCHITECTURES & TECHNOLOGIES FOR INFORMATION SUPERIORITY, 2000, : 449 - 454
  • [8] Enhancing IoT Security and Privacy with Trusted Execution Environments and Machine Learning
    Yuhala, Peterson
    2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 176 - 178
  • [9] Security and Privacy in E-Health Systems: A Review of AI and Machine Learning Techniques
    Nankya, Mary
    Mugisa, Allan
    Usman, Yusuf
    Upadhyay, Aadesh
    Chataut, Robin
    IEEE ACCESS, 2024, 12 : 148796 - 148816
  • [10] Trust, Security and Privacy in Emerging Distributed Systems
    Abawajy, Jemal
    Wang, Guojun
    Yang, Laurence T.
    Javadi, Bahman
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 224 - 226