2020
DOI: 10.3389/fdata.2020.587139
|View full text |Cite
|
Sign up to set email alerts
|

Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security

Abstract: With the advances in machine learning (ML) and deep learning (DL) techniques, and the potency of cloud computing in offering services efficiently and cost-effectively, Machine Learning as a Service (MLaaS) cloud platforms have become popular. In addition, there is increasing adoption of third-party cloud services for outsourcing training of DL models, which requires substantial costly computational resources (e.g., high-performance graphics processing units (GPUs)). Such widespread usage of cloud-hosted ML/DL … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
23
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 45 publications
(23 citation statements)
references
References 34 publications
0
23
0
Order By: Relevance
“…Therefore, novel techniques need to be developed to enforce strong encryption schemes to protect sophisticated data. Quantum services are also currently being offered via the cloud, it is important to acknowledge and mitigate the various security risks that emerge from using cloud services-especially when quantum machine learning services are being offered via the cloud [170].…”
Section: G Quantum Security Applicationsmentioning
confidence: 99%
“…Therefore, novel techniques need to be developed to enforce strong encryption schemes to protect sophisticated data. Quantum services are also currently being offered via the cloud, it is important to acknowledge and mitigate the various security risks that emerge from using cloud services-especially when quantum machine learning services are being offered via the cloud [170].…”
Section: G Quantum Security Applicationsmentioning
confidence: 99%
“…The adversarial robustness can be defined as the survivability of ML-based systems to adversarial attacks. In this line, three types of adversarial defense methods have been proposed in the literature, i.e., modifying data, modifying model, and adding auxiliary model, a taxonomy of such methods can be found in [73].…”
Section: A Principles Of Trustworthy Ai For Healthcarementioning
confidence: 99%
“…The critical nature of healthcare applications provides significant motivation for the malicious actors to defame the ML/DL-based system and to get the desired outcomes. In the literature, a wide variety of adversarial ML attacks have been already proposed and the research on developing respective defense methods is very limited [73]. This highlights that there is an utmost need for developing adversarially robust ML/DL techniques.…”
Section: Adversarially Robust MLmentioning
confidence: 99%
“…The presence of such malicious actors is more common in FL due to its distributed nature and incentivization further provides a substantial motivation to such adversaries. In the literature, different attacks have been proposed for cloud-hosted ML models [127] and for the models trained using FL settings [98]. Considerable attention has been devoted to the development of mitigation strategies for adversarial attacks, however, the literature focused on attacking ML/DL-based systems is drastically increasing as compared with the literature focused on developing defense methods.…”
Section: Adversarially Robust Flmentioning
confidence: 99%