Author:
Li Haiao,Ge Lina,Tian Lei
Abstract
AbstractThe amount of data generated owing to the rapid development of the Smart Internet of Things is increasing exponentially. Traditional machine learning can no longer meet the requirements for training complex models with large amounts of data. Federated learning, as a new paradigm for training statistical models in distributed edge networks, alleviates integration and training problems in the context of massive and heterogeneous data and security protection for private data. Edge computing processes data at the edge layers of data sources to ensure low-data-delay processing; it provides high-bandwidth communication and a stable network environment, and relieves the pressure of processing massive data using a single node in the cloud center. A combination of edge computing and federated learning can further optimize computing, communication, and data security for the edge-Internet of Things. This review investigated the development status of federated learning and expounded on its basic principles. Then, in view of the security attacks and privacy leakage problems of federated learning in the edge Internet of things, relevant work was investigated from cryptographic technologies (such as secure multi-party computation, homomorphic encryption and secret sharing), perturbation schemes (such as differential privacy), adversarial training and other privacy security protection measures. Finally, challenges and future research directions for the integration of edge computing and federated learning are discussed.
Funder
National Natural Science Foundation of China
Natural Science Foundation of Guangxi Zhuang Autonomous Region
Publisher
Springer Science and Business Media LLC
Reference134 articles.
1. Adhikari M, Menon VG, Rawat DB, Li XW (2023) Guest Editorial Introduction to the Special Section on Computational Intelligence and Advanced Learning for Next-Generation Industrial IoT. IEEE Transac Network Sci Eng 10(5):2740–2744
2. Ahmad S, Shakeel I, Mehfuz S, Ahmad J (2023) Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions. Computer Sci Rev 49:100568
3. Andrew G, Thakkar O, McMahan B, Ramaswamy S (2021) Differentially private learning with adaptive clipping. Adv Neural Inf Process Syst 34:17455–17466
4. Arjovsky M, Chintala S, Bottou L (2017) Wasserstein generative adversarial networks. In: Proceedings of the 34th International Conference on Machine Learning, vol 70, pp. 214–223. PMLR, Sydney, NSW, Australia
5. Baracaldo N, Chen B, Ludwig H, Safavi JA (2017) Mitigating poisoning attacks on machine learning models: A data provenance-based approach. In: Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, pp. 103–110. ACM, Dallas, Texas, USA
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献