Survey of split learning data privacy
With the rapid development of machine learning, artificial intelligence technology has been widely applied across various domains of life. However, concerns regarding the privacy risks associated with machine learning have increased. In response to these concerns, the Personal Information Protection...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2024-06-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024037 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529553110958080 |
---|---|
author | QIN Yiqun MA Xiaojing FU Jiayun HU Pingyi XU Peng JIN Hai |
author_facet | QIN Yiqun MA Xiaojing FU Jiayun HU Pingyi XU Peng JIN Hai |
author_sort | QIN Yiqun |
collection | DOAJ |
description | With the rapid development of machine learning, artificial intelligence technology has been widely applied across various domains of life. However, concerns regarding the privacy risks associated with machine learning have increased. In response to these concerns, the Personal Information Protection Law of the People's Republic of China was promulgated to regulate the collection, use, and transmission of private information. Despite this, machine learning requires a large amount of data, necessitating the development of privacy protection technologies that allow for the collection and processing of data under legal and compliant conditions. Split learning, a privacy-preserving machine learning technique that enables the training of distributed models among multiple participants without sharing raw data, has emerged as a research focus. It has been recognized that split learning is vulnerable to data privacy attacks, and various attacks along with corresponding defenses have been proposed. However, existing surveys have not discussed and summarized research on data privacy during the training phase of split learning. The comprehensive overview of data privacy attack and defense techniques in the training phase of split learning was offered. Initially, the definition, principles, and classifications of split learning were summarized. Subsequently, two common attacks in split learning, namely the raw data reconstruction attack and the label leakage attack, were introduced. The causes of these attacks in the training phase of split learning were then analyzed, and corresponding defenses were presented. Finally, future research directions in the area of data privacy for split learning were discussed. |
format | Article |
id | doaj-art-abe8773dcb314b8dbed934c0103acb68 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2024-06-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-abe8773dcb314b8dbed934c0103acb682025-01-15T03:17:12ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2024-06-0110203767188631Survey of split learning data privacyQIN YiqunMA XiaojingFU JiayunHU PingyiXU PengJIN HaiWith the rapid development of machine learning, artificial intelligence technology has been widely applied across various domains of life. However, concerns regarding the privacy risks associated with machine learning have increased. In response to these concerns, the Personal Information Protection Law of the People's Republic of China was promulgated to regulate the collection, use, and transmission of private information. Despite this, machine learning requires a large amount of data, necessitating the development of privacy protection technologies that allow for the collection and processing of data under legal and compliant conditions. Split learning, a privacy-preserving machine learning technique that enables the training of distributed models among multiple participants without sharing raw data, has emerged as a research focus. It has been recognized that split learning is vulnerable to data privacy attacks, and various attacks along with corresponding defenses have been proposed. However, existing surveys have not discussed and summarized research on data privacy during the training phase of split learning. The comprehensive overview of data privacy attack and defense techniques in the training phase of split learning was offered. Initially, the definition, principles, and classifications of split learning were summarized. Subsequently, two common attacks in split learning, namely the raw data reconstruction attack and the label leakage attack, were introduced. The causes of these attacks in the training phase of split learning were then analyzed, and corresponding defenses were presented. Finally, future research directions in the area of data privacy for split learning were discussed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024037privacy protectionartificial intelligence securitydistributed machine learningsplit learning |
spellingShingle | QIN Yiqun MA Xiaojing FU Jiayun HU Pingyi XU Peng JIN Hai Survey of split learning data privacy 网络与信息安全学报 privacy protection artificial intelligence security distributed machine learning split learning |
title | Survey of split learning data privacy |
title_full | Survey of split learning data privacy |
title_fullStr | Survey of split learning data privacy |
title_full_unstemmed | Survey of split learning data privacy |
title_short | Survey of split learning data privacy |
title_sort | survey of split learning data privacy |
topic | privacy protection artificial intelligence security distributed machine learning split learning |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024037 |
work_keys_str_mv | AT qinyiqun surveyofsplitlearningdataprivacy AT maxiaojing surveyofsplitlearningdataprivacy AT fujiayun surveyofsplitlearningdataprivacy AT hupingyi surveyofsplitlearningdataprivacy AT xupeng surveyofsplitlearningdataprivacy AT jinhai surveyofsplitlearningdataprivacy |