Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,855 Hits in 5.7 sec

A Survey on Privacy for B5G/6G: New Privacy Goals, Challenges, and Research Directions [article]

Chamara Sandeepa, Bartlomiej Siniarski, Nicolas Kourtellis, Shen Wang, Madhusanka Liyanage
2022 arXiv   pre-print
This paper provides a comprehensive survey on privacy-related aspects for B5G/6G networks. First, it discusses a taxonomy of different privacy perspectives.  ...  Based on the taxonomy, the paper then conceptualizes a set of privacy goals for the B5G/6G and the challenges that appear as barriers to reaching these goals.  ...  ACKNOWLEDGEMENT This work is partly supported by European Union in SPA-TIAL (Grant No: 101021808), Academy of Finland in 6Genesis (grant no. 318927) and Science Foundation Ireland under CONNECT phase 2  ... 
arXiv:2203.04264v1 fatcat:blbzfjy73fhlvammlwsgfmso5y

Security and Privacy of 6G Wireless Communication using Fog Computing and Multi-Access Edge Computing

Ting Xu, Ning Wang, Qian Pang, Xiqing Zhao
2024 Scalable Computing : Practice and Experience  
This research involves a comprehensive survey of existing strategies for maintaining data confidentiality in automotive communication systems.  ...  The proposed work reveals the increasing complexity and variability of the 6G wireless network environment, leading to potential challenges in protecting private and confidential data during communication  ...  The concept of quantum computing can be personalised to enhance reliability and increase efficiency in a 6G setting.  ... 
doi:10.12694/scpe.v25i2.2629 fatcat:2ujnldoo5fgtlf3bfetd2bo5yy

SoK: Privacy-Preserving Computation Techniques for Deep Learning

José Cabrero-Holgueras, Sergio Pastrana
2021 Proceedings on Privacy Enhancing Technologies  
Recent advances in privacy-preserving computation techniques (i.e., Homomorphic Encryption and Secure Multiparty Computation) have enabled DL training and inference over protected data.  ...  Due to the high computational cost of DL algorithms, data scientists often rely upon Machine Learning as a Service (MLaaS) to outsource the computation onto third-party servers.  ...  Acknowledgments We thank the anonymous reviewers and our shepherd, Phillipp Schoppmann, for their valuable feedback. We also thank Alberto Di Meglio, Marco Manca  ... 
doi:10.2478/popets-2021-0064 fatcat:hb3kdruxozbspnowy63gynuapy

SoK: Privacy-Preserving Collaborative Tree-based Model Learning

Sylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
2021 Proceedings on Privacy Enhancing Technologies  
In this work, we survey the literature on distributed and privacy-preserving training of tree-based models and we systematize its knowledge based on four axes: the learning algorithm, the collaborative  ...  The recent orthogonal needs for more data and privacy protection call for collaborative privacy-preserving solutions.  ...  We are also grateful to Giovanni Cherubin, Andrew Janowczyk, Peizhao Hu, and the members of the EPFL Laboratory for Data Security for their helpful comments and suggestions.  ... 
doi:10.2478/popets-2021-0043 fatcat:zjlt2fgmpfcw7modhaddyqc46i

A Survey on Metaverse: Fundamentals, Security, and Privacy [article]

Yuntao Wang, Zhou Su, Ning Zhang, Rui Xing, Dongxiao Liu, Tom H. Luan, Xuemin Shen
2022 arXiv   pre-print
In this paper, we present a comprehensive survey of the fundamentals, security, and privacy of metaverse.  ...  Then, we discuss the security and privacy threats, present the critical challenges of metaverse systems, and review the state-of-the-art countermeasures.  ...  U20A20175, U1808207), and the Fundamental Research Funds for the Central Universities.  ... 
arXiv:2203.02662v3 fatcat:iudwizbvp5cv3fga6lpvydlrna

Privacy and Security Implications of Cloud-Based AI Services : A Survey [article]

Alka Luqman, Riya Mahesh, Anupam Chattopadhyay
2024 arXiv   pre-print
We first survey the AIaaS landscape to document the various kinds of liabilities that ML models, especially Deep Neural Networks pose and then introduce a taxonomy to bridge this gap by holistically examining  ...  This paper details the privacy and security landscape in today's cloud ecosystem and identifies that there is a gap in addressing the risks introduced by machine learning models.  ...  Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not reflect the views of National Research Foundation, Singapore.  ... 
arXiv:2402.00896v1 fatcat:skmxehukqnd47hzf7t73tayjy4

Privacy-preserving Intelligent Resource Allocation for Federated Edge Learning in Quantum Internet [article]

Minrui Xu, Dusit Niyato, Zhaohui Yang, Zehui Xiong, Jiawen Kang, Dong In Kim, Xuemin Shen
2022 arXiv   pre-print
Therefore, in this paper, we propose a hierarchical architecture for quantum-secured FEL systems with ideal security based on the quantum key distribution (QKD) to facilitate public key and model encryption  ...  Federated edge learning (FEL) is a promising paradigm of distributed machine learning that can preserve data privacy while training the global model collaboratively.  ...  Within a QKD node, there is a global key server (GKS), a local key manager (LKM), and one or more quantum transmitters (QTs).  ... 
arXiv:2210.04308v1 fatcat:ljqtfiq6nvcirhxfp665vbq2ju

SoK: Privacy-Preserving Collaborative Tree-based Model Learning [article]

Sylvain Chatel, Apostolos Pyrgelis, Juan Ramon Troncoso-Pastoriza, Jean-Pierre Hubaux
2021 arXiv   pre-print
In this work, we survey the literature on distributed and privacy-preserving training of tree-based models and we systematize its knowledge based on four axes: the learning algorithm, the collaborative  ...  The recent orthogonal needs for more data and privacy protection call for collaborative privacy-preserving solutions.  ...  We are also grateful to Giovanni Cherubin, Andrew Janowczyk, Peizhao Hu, and the members of the EPFL Laboratory for Data Security for their helpful comments and suggestions.  ... 
arXiv:2103.08987v2 fatcat:3c6axws5zbeptn5q3bjomusbg4

A Survey of Machine and Deep Learning Methods for Privacy Protection in the Internet of Things

Eva Rodríguez, Beatriz Otero, Ramon Canal
2023 Sensors  
This paper presents a comprehensive survey of recent Machine Learning (ML)- and Deep Learning (DL)-based solutions for privacy in IoT.  ...  First, we present an in depth analysis of current privacy threats and attacks. Then, for each ML architecture proposed, we present the implementations, details, and the published results.  ...  Cybersecurity ML IoT Surveys on Privacy on Non-IoT Environments ML-based privacy protection surveys for mobile networks and cloud computing scenarios have been published in recent years.  ... 
doi:10.3390/s23031252 pmid:36772292 pmcid:PMC9921397 fatcat:sfoc5s7zqfht7cmggxoaafgdmi

Trusted AI in Multi-agent Systems: An Overview of Privacy and Security for Distributed Learning [article]

Chuan Ma, Jun Li, Kang Wei, Bo Liu, Ming Ding, Long Yuan, Zhu Han, H. Vincent Poor
2023 arXiv   pre-print
In this paper, we provide a survey of the emerging security and privacy risks of distributed ML from a unique perspective of information exchange levels, which are defined according to the key steps of  ...  a centralized ML process into a distributed one, and brings about significant benefits.  ...  Quantum computing operates on the basis of quantum mechanics, taking advantage of superposition to store and process information [277] , [278] .  ... 
arXiv:2202.09027v3 fatcat:fbcq4bjcd5ebdc526pgzsnjaiy

Recent Developments in Privacy-preserving Mining of Clinical Data

Chance Desmet, Diane J. Cook
2021 ACM/IMS Transactions on Data Science  
In this article, we survey recent research on classical methods of privacy-preserving data mining.  ...  Looking at dominant techniques and recent innovations to them, we examine the applicability of these methods to the privacy-preserving analysis of clinical data.  ...  Finally, Aaronson and Rothburn showed how a differential privacy-satisfying level of added noise can be abstracted to the gentle measurement of quantum states [1] .  ... 
doi:10.1145/3447774 pmid:35018368 pmcid:PMC8746818 fatcat:b43kc4hrhnfzzlcn5tzhai2ane

Empirical Evaluation of Privacy Efficiency in Blockchain Networks: Review and Open Challenges

Aisha Zahid Junejo, Manzoor Ahmed Hashmani, Mehak Maqbool Memon
2021 Applied Sciences  
The calculation of privacy precision will be based on the effectiveness and strength of various privacy protecting attributes of a solution and the associated risks.  ...  The findings depict that the majority of privacy solutions are validated based on computing resources i.e., memory, time, storage, throughput, etc., only, which is not sufficient.  ...  We infer that this study will enable successful development, deployment, testing, and empirical evaluation of privacy preserving techniques in blockchain networks, being a key driving force for future  ... 
doi:10.3390/app11157013 fatcat:3pvl77nsrbg63ntf6g3hoejwpu

Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities

Bernardo Pulido-Gaytan, Andrei Tchernykh, Jorge M. Cortés-Mendoza, Mikhail Babenko, Gleb Radchenko, Arutyun Avetisyan, Alexander Yu Drozdov
2021 Peer-to-Peer Networking and Applications  
AbstractClassical machine learning modeling demands considerable computing power for internal calculations and training with big data in a reasonable amount of time.  ...  We focus on the privacy-preserving homomorphic encryption cryptosystems targeted at neural networks identifying current solutions, open issues, challenges, opportunities, and potential research directions  ...  Acknowledgments This work was supported by the Ministry of Education and Science of the Russian Federation (Project 075-15-2020-788).  ... 
doi:10.1007/s12083-021-01076-8 fatcat:4ol6i5goizezxfbu24clxlfugu

Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain [article]

Vesal Ahsani, Ali Rahimi, Mehdi Letafati, Babak Hossein Khalaj
2023 arXiv   pre-print
In this article, the authors provide a comprehensive overview on three core pillars of metaverse-as-a-service (MaaS) platforms; privacy and security, edge computing, and blockchain technology.  ...  Then it goes through the privacy and security issues inside the metaverse from data-centric, learning-centric, and human-centric points-of-view.  ...  For a survey on the edge computing market, see [58] . An edge computing system includes the internet gateway, edge servers, and perception layer [59] .  ... 
arXiv:2301.01221v2 fatcat:njzop26brrculbncsuxhhry6c4

Deletion-Compliance in the Absence of Privacy [article]

Jonathan Godin, Philippe Lamontagne
2022 arXiv   pre-print
Our new definition has several appealing properties: - It is implied by the stronger definition of Garg et al. under natural conditions, and is equivalent when we add a privacy requirement. - It is naturally  ...  This allows broader class of data collectors to demonstrate compliance to deletion requests and to be paired with various notions of privacy.  ...  Cohen and Nissim [CN20] tackle this task of bridging legal and formal notions of privacy for the GDPR legislation [GDPR] .  ... 
arXiv:2201.03499v1 fatcat:hv4zjbxlqbek7fdqsa36axkhdm
« Previous Showing results 1 — 15 out of 1,855 results