2021 International Conference on Networking and Network Applications (NaNA) 2021
DOI: 10.1109/nana53684.2021.00062
|View full text |Cite
|
Sign up to set email alerts
|

A survey on security and privacy threats to federated learning

Abstract: Trustworthy artificial intelligence (AI) technology has revolutionized daily life and greatly benefited human society. Among various AI technologies, Federated Learning (FL) stands out as a promising solution for diverse real-world scenarios, ranging from risk evaluation systems in finance to cutting-edge technologies like drug discovery in life sciences. However, challenges around data isolation and privacy threaten the trustworthiness of FL systems. Adversarial attacks against data privacy, learning algorith… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 213 publications
0
4
0
Order By: Relevance
“…FL can be categorized into horizontal FL, vertical FL, and federated transfer learning, based on how the training data is organized [27]. Since the majority of research on FL vulnerabilities focuses on the horizontal FL setting, therefore, we also focus on horizontal FL as [37] ✓ ✓ ✓ ✓ ✓ ✓ Zhang et al [38][39] • • • ✓ Yin et al [40] ✓ ✓ Zhang et al [41] •…”
Section: Preliminaries Of Federated Learningmentioning
confidence: 99%
“…FL can be categorized into horizontal FL, vertical FL, and federated transfer learning, based on how the training data is organized [27]. Since the majority of research on FL vulnerabilities focuses on the horizontal FL setting, therefore, we also focus on horizontal FL as [37] ✓ ✓ ✓ ✓ ✓ ✓ Zhang et al [38][39] • • • ✓ Yin et al [40] ✓ ✓ Zhang et al [41] •…”
Section: Preliminaries Of Federated Learningmentioning
confidence: 99%
“…Specifically, the adversary participant steals other participants' sensitive information from shared parameters since the transmitted gradient value is transformed from the original training data. Recently, security and privacy issues have become critical concerns due to potential security attacks and internal theft [16].…”
Section: Decreased Energy Consumptionmentioning
confidence: 99%
“…They also failed to review security issues arising from poisoning attacks. In contrast, reviews 15–17 summarized privacy and security protection schemes in FL. However, they all exhibited some degree of deficiency in summarizing certain techniques.…”
Section: Introductionmentioning
confidence: 99%
“…However, they all exhibited some degree of deficiency in summarizing certain techniques. For instance, References 15 and 17 lacked a summary of techniques based on statistical information to bypass malicious model updates, whereas References 15 and 16 lacked a summary of the security protection of FL based on blockchain technology. Meanwhile, a critical observation is that none of these studies have fully considered schemes that effectively balance both privacy and security requirements in FL, as shown in Table 1.…”
Section: Introductionmentioning
confidence: 99%