Author:
Hu Kai,Gong Sheng,Zhang Qi,Seng Chaowen,Xia Min,Jiang Shanshan
Abstract
AbstractFederated learning has received a great deal of research attention recently,with privacy protection becoming a key factor in the development of artificial intelligence. Federated learning is a special kind of distributed learning framework, which allows multiple users to participate in model training while ensuring that their privacy is not compromised; however, this paradigm is still vulnerable to security and privacy threats from various attackers. This paper focuses on the security and privacy threats related to federated learning. First, we analyse the current research and development status of federated learning through use of the CiteSpace literature search tool. Next, we describe the basic concepts and threat models, and then analyse the security and privacy vulnerabilities within current federated learning architectures. Finally, the directions of development in this area are further discussed in the context of current advanced defence solutions, for which we provide a summary and comparison.
Funder
National Natural Science Foundation of China
Funding of Special Development Project of Tianchang Intelligent Equipment and Instrument Research Institute
Publisher
Springer Science and Business Media LLC
Reference161 articles.
1. Aono Y, Hayashi T, Wang L et al (2017) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inf For Secur 13(5):1333–1345
2. Bagdasaryan E, Veit A, Hua Y, et al (2020) How to backdoor federated learning. In: International conference on artificial intelligence and statistics, PMLR, pp 2938–2948
3. Barreno M, Nelson B, Sears R, et al (2006) Can machine learning be secure? In: Proceedings of the 2006 ACM symposium on information, computer and communications security, pp 16–25
4. Beimel A (2011) Secret-sharing schemes: a survey. In: International conference on coding and cryptology, Springer, pp 11–46
5. Bellare M, Hoang VT, Rogaway P (2012) Foundations of garbled circuits. In: Proceedings of the 2012 ACM conference on computer and communications security, pp 784–796