Author:
Bonura Susanna,Carbonare Davide Dalle,Díaz-Morales Roberto,Fernández-Díaz Marcos,Morabito Lucrezia,Muñoz-González Luis,Napione Chiara,Navia-Vázquez Ángel,Purcell Mark
Abstract
AbstractThe quality of a machine learning model depends on the volume of data used during the training process. To prevent low accuracy models, one needs to generate more training data or add external data sources of the same kind. If the first option is not feasible, the second one requires the adoption of a federated learning approach, where different devices can collaboratively learn a shared prediction model. However, access to data can be hindered by privacy restrictions. Training machine learning algorithms using data collected from different data providers while mitigating privacy concerns is a challenging problem. In this chapter, we first introduce the general approach of federated machine learning and the H2020 MUSKETEER project, which aims to create a federated, privacy-preserving machine learning Industrial Data Platform. Then, we describe the Privacy Operations Modes designed in MUSKETEER as an answer for more privacy before looking at the platform and its operation using these different Privacy Operations Modes. We eventually present an efficiency assessment of the federated approach using the MUSKETEER platform. This chapter concludes with the description of a real use case of MUSKETEER in the manufacturing domain.
Publisher
Springer International Publishing
Reference28 articles.
1. Bishop, C. M. (2006). Pattern recognition and machine learning. Springer, Berlin.
2. Chen, V., Pastro, V., & Raykova, M. (2019). Secure computation for machine learning with SPDZ. arXiv preprint arXiv:1901.00329.
3. Coleman, C., Damodaran, S., & Deuel, E. (2017). Predictive maintenance and the smart factory. Tech. rep., Deloitte.
4. Cramer, R., Damgård, I. B., & Nielsen, J. B. (2015). Secure multiparty computation. Cambridge University, Cambridge.
5. Díaz-Morales, R., & Navia-Vázquez, Á. (2017). LIBIRWLS: A parallel IRWLS library for full and budgeted SVMs. Knowledge-Based Systems, 136, 183–186.