2020
DOI: 10.1109/access.2020.3023084
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Deep Learning on Machine Learning as a Service—a Comprehensive Survey

Abstract: The exponential growth of big data and deep learning has increased the data exchange traffic in society. Machine Learning as a Service, (MLaaS) which leverages deep learning techniques for predictive analytics to enhance decision-making, has become a hot commodity. However, the adoption of MLaaS introduces data privacy challenges for data owners and security challenges for deep learning model owners. Data owners are concerned about the safety and privacy of their data on MLaaS platforms, while MLaaS platform o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
40
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 78 publications
(53 citation statements)
references
References 91 publications
0
40
0
Order By: Relevance
“…Therefore, the basic architecture of CNN consists of three layers, namely convolutional (CONV) layers, pooling (POOL) layers and fully connected (FC) layers, as described below [12,14]. Any middle layers are considered hidden since the activation function and final convolution cover their inputs and outputs [15]. Figure 1 illustrates the basic architecture of a CNN model.…”
Section: Convolutional Neural Networkmentioning
confidence: 99%
“…Therefore, the basic architecture of CNN consists of three layers, namely convolutional (CONV) layers, pooling (POOL) layers and fully connected (FC) layers, as described below [12,14]. Any middle layers are considered hidden since the activation function and final convolution cover their inputs and outputs [15]. Figure 1 illustrates the basic architecture of a CNN model.…”
Section: Convolutional Neural Networkmentioning
confidence: 99%
“…Still, they only considered the security of the DL‐based model. References 7‐11 presented ML‐ and DL‐based surveys and elaborated the adversarial attacks and their techniques to generate attack and how that specific attack is mitigated by different defense mechanism and discussed other security‐based mechanisms such as differential privacy, HE, security enclaves, and secure multiparty communication. These surveys addressed the security and privacy issues of the ML and DL model and gave the research directions to protect against adversarial attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Protocols used for private machine learning training are investigated in [29]. Similarily, Tanuwidjaja et al [30] summarize existing works on privacy-preserving deep learning and issues when using these schemes as well as possible attacks on private deep learning. Kiss et al [31] systematically review the state-of-the-art approaches to private decision tree evaluation.…”
Section: Introductionmentioning
confidence: 99%