From Distributed Machine Learning To Federated Learning: In The View Of Data Privacy And Security
Federated learning is an improved version of distributed machine learning that further offloads operations which would usually be performed by a central server. The server becomes more like an assistant coordinating clients to work together rather than micro-managing the workforce as in traditional...
Published in: | Concurrency and Computation: Practice and Experience |
---|---|
Main Authors: | , , , , |
Format: | Text |
Language: | unknown |
Published: |
2020
|
Subjects: | |
Online Access: | http://arxiv.org/abs/2010.09258 https://doi.org/10.1002/cpe.6002 |
id |
ftarxivpreprints:oai:arXiv.org:2010.09258 |
---|---|
record_format |
openpolar |
spelling |
ftarxivpreprints:oai:arXiv.org:2010.09258 2023-09-05T13:19:06+02:00 From Distributed Machine Learning To Federated Learning: In The View Of Data Privacy And Security Shen, Sheng Zhu, Tianqing Wu, Di Wang, Wei Zhou, Wanlei 2020-10-19 http://arxiv.org/abs/2010.09258 https://doi.org/10.1002/cpe.6002 unknown http://arxiv.org/abs/2010.09258 Concurrency and Computation Practice and Experience, 2020, 1-19 doi:10.1002/cpe.6002 Computer Science - Distributed Parallel and Cluster Computing text 2020 ftarxivpreprints https://doi.org/10.1002/cpe.6002 2023-08-16T16:08:49Z Federated learning is an improved version of distributed machine learning that further offloads operations which would usually be performed by a central server. The server becomes more like an assistant coordinating clients to work together rather than micro-managing the workforce as in traditional DML. One of the greatest advantages of federated learning is the additional privacy and security guarantees it affords. Federated learning architecture relies on smart devices, such as smartphones and IoT sensors, that collect and process their own data, so sensitive information never has to leave the client device. Rather, clients train a sub-model locally and send an encrypted update to the central server for aggregation into the global model. These strong privacy guarantees make federated learning an attractive choice in a world where data breaches and information theft are common and serious threats. This survey outlines the landscape and latest developments in data privacy and security for federated learning. We identify the different mechanisms used to provide privacy and security, such as differential privacy, secure multi-party computation and secure aggregation. We also survey the current attack models, identifying the areas of vulnerability and the strategies adversaries use to penetrate federated systems. The survey concludes with a discussion on the open challenges and potential directions of future work in this increasingly popular learning paradigm. Comment: 21 pages, 4 figures, 4 tables, 76 references Text DML ArXiv.org (Cornell University Library) Concurrency and Computation: Practice and Experience |
institution |
Open Polar |
collection |
ArXiv.org (Cornell University Library) |
op_collection_id |
ftarxivpreprints |
language |
unknown |
topic |
Computer Science - Distributed Parallel and Cluster Computing |
spellingShingle |
Computer Science - Distributed Parallel and Cluster Computing Shen, Sheng Zhu, Tianqing Wu, Di Wang, Wei Zhou, Wanlei From Distributed Machine Learning To Federated Learning: In The View Of Data Privacy And Security |
topic_facet |
Computer Science - Distributed Parallel and Cluster Computing |
description |
Federated learning is an improved version of distributed machine learning that further offloads operations which would usually be performed by a central server. The server becomes more like an assistant coordinating clients to work together rather than micro-managing the workforce as in traditional DML. One of the greatest advantages of federated learning is the additional privacy and security guarantees it affords. Federated learning architecture relies on smart devices, such as smartphones and IoT sensors, that collect and process their own data, so sensitive information never has to leave the client device. Rather, clients train a sub-model locally and send an encrypted update to the central server for aggregation into the global model. These strong privacy guarantees make federated learning an attractive choice in a world where data breaches and information theft are common and serious threats. This survey outlines the landscape and latest developments in data privacy and security for federated learning. We identify the different mechanisms used to provide privacy and security, such as differential privacy, secure multi-party computation and secure aggregation. We also survey the current attack models, identifying the areas of vulnerability and the strategies adversaries use to penetrate federated systems. The survey concludes with a discussion on the open challenges and potential directions of future work in this increasingly popular learning paradigm. Comment: 21 pages, 4 figures, 4 tables, 76 references |
format |
Text |
author |
Shen, Sheng Zhu, Tianqing Wu, Di Wang, Wei Zhou, Wanlei |
author_facet |
Shen, Sheng Zhu, Tianqing Wu, Di Wang, Wei Zhou, Wanlei |
author_sort |
Shen, Sheng |
title |
From Distributed Machine Learning To Federated Learning: In The View Of Data Privacy And Security |
title_short |
From Distributed Machine Learning To Federated Learning: In The View Of Data Privacy And Security |
title_full |
From Distributed Machine Learning To Federated Learning: In The View Of Data Privacy And Security |
title_fullStr |
From Distributed Machine Learning To Federated Learning: In The View Of Data Privacy And Security |
title_full_unstemmed |
From Distributed Machine Learning To Federated Learning: In The View Of Data Privacy And Security |
title_sort |
from distributed machine learning to federated learning: in the view of data privacy and security |
publishDate |
2020 |
url |
http://arxiv.org/abs/2010.09258 https://doi.org/10.1002/cpe.6002 |
genre |
DML |
genre_facet |
DML |
op_relation |
http://arxiv.org/abs/2010.09258 Concurrency and Computation Practice and Experience, 2020, 1-19 doi:10.1002/cpe.6002 |
op_doi |
https://doi.org/10.1002/cpe.6002 |
container_title |
Concurrency and Computation: Practice and Experience |
_version_ |
1776199927609688064 |