A SYSTEMATIC REVIEW OF PRESERVING PRIVACY IN FEDERATED LEARNING: A REFLECTIVE REPORT - A COMPREHENSIVE ANALYSIS
Keywords:
Machine Learning, Artificial Intelligence, Federated Learning, Decentralized devices, Encryption, Privacy, Differential privacy, Privacy preservation, Secure aggregation, Machine learningAbstract
The primary purpose of this research is to systematically evaluate the technology and approaches that presently define privacy preservation in Federated Learning's situation. Federated learning, an alternative to centralized machine learning, has compelling applications where privacy-sensitive data is to be combined for collaborative model training in a distributed manner [1]. While privacy preservation is a pressing issue in federated learning systems, the current solutions should be carefully evaluated to ensure that the proper methodology is used. This reflective report summarizes the recent developments in privacy-preserving aspects of federated Learning, highlighting major critiques, hurdles, and recommendations. Decentralized Learning is an emerging approach to machine learning where models are distributed among devices to be trained while keeping data confidential [1]. The subsequent section builds upon the thought-awakening part, which addresses the issue of privacy in federated Learning. A literature review is done systematically to evaluate the techniques and methods for maintaining privacy in the context of federated Learning. Important aspects include differential privacy, secure aggregation protocols, encryption technologies, and Federation learning design. The manuscript delves into the hurdles and openings regarding protecting privacy in federated Learning and directs future work on the subject [1,2]. This report combines the available knowledge and pinpoints the possible gaps, thus contributing to more profound knowledge about the privacy issues of federated Learning as presented in the recommendations.
Downloads
References
M. Iskander, Innovations in E-learning, instruction technology, assessment, and engineering education. Estados Unidos: Springer, 2010.
T. E. Simos and G. Psihoyios, International e-Conference on Computer Science 2006: additional papers from ICNAAM 2006 and ICCMSE 2006. Leiden: Brill, 2007.
T. L. Fine, Feedforward Neural Network Methodology. Springer Science & Business Media, 2006.
K. Liu, Semiotics in Information Systems Engineering. Cambridge University Press, 2000.
F. Bott, A. Coleman, J. Eaton, and D. Rowland, Professional Issues in Software Engineering. Boca Raton, FL: CRC Press, 2014.
M. Stefik, The Internet edge: social, technical, and legal challenges for a networked world. Cambridge, Mass.: MIT Press, 2000.
D. D. Sworder and J. E. Boyd, Estimation Problems in Hybrid Systems. Cambridge University Press, 1999.
I. Bernard Cohen, G. W. Welch, and R. V. D. Campbell, Makin' numbers: Howard Aiken and the computer. Cambridge, Mass.: MIT Press, 1999.
J.L.Laufgraben and N. S. Shapiro, Sustaining and improving learning communities. San Francisco, Ca: Jossey-Bass, 2004.
N. S. Shapiro, Creating Learning Communities. Jossey-Bass, 1999.
M. V. Brown, Residential Learning Communities as Social Constructions. 2005.
C. Dwork and A. Roth, The algorithmic foundations of differential privacy. Boston: Now Publ, 2014.
A. For et al., SIGMOD'10, PODS'10, & SoCC'10 Compilation proceedings. New York, NY: The Association For Computing Machinery, 2010.
Y. Luo, Cooperative design, visualization, and engineering: second international conference, CDVE 2005, Palma de Mallorca, Spain, September 18-21, 2005: proceedings. Berlin; New York: Springer, 2005.
W. Dubitzky, Data Mining Techniques in Grid Computing Environments. John Wiley & Sons, 2008.
Management Association, Information Resources, Grid, and Cloud Computing: Concepts, Methodologies, Tools, and Applications. IGI Global, 2012.
S. S. Bhowmick, J. Küng, and R. Wagner, Database and Expert Systems Applications. Springer Science & Business Media, 2008.
W. Stallings, Network and internetwork security: principles and practice. Englewood Cliffs, N.J.: Prentice Hall; New York, 1995.
W. A.Conklin, Principles of computer security: CompTIA security+ and beyond. New York: McGraw-Hill, 2010.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 IEJRD
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.