Survey of split learning data privacy

With the rapid development of machine learning, artificial intelligence technology has been widely applied across various domains of life. However, concerns regarding the privacy risks associated with machine learning have increased. In response to these concerns, the Personal Information Protection...

Full description

Saved in:
Bibliographic Details
Main Authors: QIN Yiqun, MA Xiaojing, FU Jiayun, HU Pingyi, XU Peng, JIN Hai
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2024-06-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024037
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529553110958080
author QIN Yiqun
MA Xiaojing
FU Jiayun
HU Pingyi
XU Peng
JIN Hai
author_facet QIN Yiqun
MA Xiaojing
FU Jiayun
HU Pingyi
XU Peng
JIN Hai
author_sort QIN Yiqun
collection DOAJ
description With the rapid development of machine learning, artificial intelligence technology has been widely applied across various domains of life. However, concerns regarding the privacy risks associated with machine learning have increased. In response to these concerns, the Personal Information Protection Law of the People's Republic of China was promulgated to regulate the collection, use, and transmission of private information. Despite this, machine learning requires a large amount of data, necessitating the development of privacy protection technologies that allow for the collection and processing of data under legal and compliant conditions. Split learning, a privacy-preserving machine learning technique that enables the training of distributed models among multiple participants without sharing raw data, has emerged as a research focus. It has been recognized that split learning is vulnerable to data privacy attacks, and various attacks along with corresponding defenses have been proposed. However, existing surveys have not discussed and summarized research on data privacy during the training phase of split learning. The comprehensive overview of data privacy attack and defense techniques in the training phase of split learning was offered. Initially, the definition, principles, and classifications of split learning were summarized. Subsequently, two common attacks in split learning, namely the raw data reconstruction attack and the label leakage attack, were introduced. The causes of these attacks in the training phase of split learning were then analyzed, and corresponding defenses were presented. Finally, future research directions in the area of data privacy for split learning were discussed.
format Article
id doaj-art-abe8773dcb314b8dbed934c0103acb68
institution Kabale University
issn 2096-109X
language English
publishDate 2024-06-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-abe8773dcb314b8dbed934c0103acb682025-01-15T03:17:12ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2024-06-0110203767188631Survey of split learning data privacyQIN YiqunMA XiaojingFU JiayunHU PingyiXU PengJIN HaiWith the rapid development of machine learning, artificial intelligence technology has been widely applied across various domains of life. However, concerns regarding the privacy risks associated with machine learning have increased. In response to these concerns, the Personal Information Protection Law of the People's Republic of China was promulgated to regulate the collection, use, and transmission of private information. Despite this, machine learning requires a large amount of data, necessitating the development of privacy protection technologies that allow for the collection and processing of data under legal and compliant conditions. Split learning, a privacy-preserving machine learning technique that enables the training of distributed models among multiple participants without sharing raw data, has emerged as a research focus. It has been recognized that split learning is vulnerable to data privacy attacks, and various attacks along with corresponding defenses have been proposed. However, existing surveys have not discussed and summarized research on data privacy during the training phase of split learning. The comprehensive overview of data privacy attack and defense techniques in the training phase of split learning was offered. Initially, the definition, principles, and classifications of split learning were summarized. Subsequently, two common attacks in split learning, namely the raw data reconstruction attack and the label leakage attack, were introduced. The causes of these attacks in the training phase of split learning were then analyzed, and corresponding defenses were presented. Finally, future research directions in the area of data privacy for split learning were discussed.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024037privacy protectionartificial intelligence securitydistributed machine learningsplit learning
spellingShingle QIN Yiqun
MA Xiaojing
FU Jiayun
HU Pingyi
XU Peng
JIN Hai
Survey of split learning data privacy
网络与信息安全学报
privacy protection
artificial intelligence security
distributed machine learning
split learning
title Survey of split learning data privacy
title_full Survey of split learning data privacy
title_fullStr Survey of split learning data privacy
title_full_unstemmed Survey of split learning data privacy
title_short Survey of split learning data privacy
title_sort survey of split learning data privacy
topic privacy protection
artificial intelligence security
distributed machine learning
split learning
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2024037
work_keys_str_mv AT qinyiqun surveyofsplitlearningdataprivacy
AT maxiaojing surveyofsplitlearningdataprivacy
AT fujiayun surveyofsplitlearningdataprivacy
AT hupingyi surveyofsplitlearningdataprivacy
AT xupeng surveyofsplitlearningdataprivacy
AT jinhai surveyofsplitlearningdataprivacy