Privacy-Preserving machine learning in edge computing environments

Authors

  • Deni Kurniawan Universitas Bina Sarana Infotmatika, Jakarta, DKI Jakarta, Indonesia
  • Dedi Triyanto Universitas Bina Sarana Infotmatika, Jakarta, DKI Jakarta, Indonesia
  • Mochamad Wahyudi Universitas Bina Sarana Infotmatika, Jakarta, DKI Jakarta, Indonesia
  • Lise Pujiastuti STMIK Antar Bangsa, Tangerang, Banten, Indonesia

DOI:

https://doi.org/10.35335/cit.Vol15.2023.621.pp118-125

Keywords:

Data Privacy, Decentralized Computing, Edge Computing, Federated Learning, Privacy-Preserving Machine Learning

Abstract

Edge computing has transformed data processing by moving computation closer to the source, enabling real-time analysis and decision-making. Edge devices are decentralized, which creates privacy and confidentiality concerns, especially when applying machine learning algorithms to sensitive data. Privacy-preserving machine learning methods for edge computing are examined in this research. Federated learning, homomorphic encryption, differential privacy, and secure aggregation are examined as data protection methods for network edge machine learning. A thorough study of these methods shows the challenges of balancing privacy, computational economy, and model correctness. Federated learning has promise for collaborative model training without raw data sharing, but communication overhead and convergence speed remain. A fictional healthcare use case shows how federated learning may be used to train collaborative models across many edge devices while protecting patient data. The case study stresses the necessity for sophisticated optimizations to overcome edge device limits and regulatory compliance. Federated learning algorithms, privacy-preserving procedures, and ethics must be improved, according to the research. Future directions include improving heterogeneous edge algorithms, addressing data ownership and consent ethics, and increasing model decision-making openness. This paper presents essential insights on privacy-preserving machine learning in edge computing and advocates for robust techniques for different edge environments. The paper emphasizes the importance of technological advances, ethical frameworks, and regulatory compliance for secure and privacy-aware machine learning in decentralized edge computing

Downloads

Download data is not yet available.

References

D. Liu, Z. Yan, W. Ding, and M. Atiquzzaman, “A survey on secure data analytics in edge computing,” IEEE Internet Things J., vol. 6, no. 3, pp. 4946–4967, 2019.

J.-H. Huh and Y.-S. Seo, “Understanding edge computing: Engineering evolution with artificial intelligence,” IEEE Access, vol. 7, pp. 164229–164245, 2019.

W. Rafique, L. Qi, I. Yaqoob, M. Imran, R. U. Rasool, and W. Dou, “Complementing IoT services through software defined networking and edge computing: A comprehensive survey,” IEEE Commun. Surv. Tutorials, vol. 22, no. 3, pp. 1761–1804, 2020.

N. A. Angel, D. Ravindran, P. M. D. R. Vincent, K. Srinivasan, and Y.-C. Hu, “Recent advances in evolving computing paradigms: Cloud, edge, and fog technologies,” Sensors, vol. 22, no. 1, p. 196, 2021.

S. Shukla, M. F. Hassan, L. T. Jung, and A. Awang, “Architecture for latency reduction in healthcare internet-of-things using reinforcement learning and fuzzy based fog computing,” in Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018), Springer, 2019, pp. 372–383.

A. Alwarafy, K. A. Al-Thelaya, M. Abdallah, J. Schneider, and M. Hamdi, “A survey on security and privacy issues in edge-computing-assisted internet of things,” IEEE Internet Things J., vol. 8, no. 6, pp. 4004–4022, 2020.

J. Zhang, B. Chen, Y. Zhao, X. Cheng, and F. Hu, “Data security and privacy-preserving in edge computing paradigm: Survey and open issues,” IEEE access, vol. 6, pp. 18209–18237, 2018.

B. Ali, M. A. Gregory, and S. Li, “Multi-access edge computing architecture, data security and privacy: A review,” IEEE Access, vol. 9, pp. 18706–18721, 2021.

V. Hayyolalam, M. Aloqaily, Ö. Özkasap, and M. Guizani, “Edge-assisted solutions for IoT-based connected healthcare systems: A literature review,” IEEE Internet Things J., vol. 9, no. 12, pp. 9419–9443, 2021.

K. Toczé and S. Nadjm-Tehrani, “A taxonomy for management and optimization of multiple resources in edge computing,” Wirel. Commun. Mob. Comput., vol. 2018, 2018.

U. A. Butt et al., “A review of machine learning algorithms for cloud computing security,” Electronics, vol. 9, no. 9, p. 1379, 2020.

H. Tabrizchi and M. Kuchaki Rafsanjani, “A survey on security challenges in cloud computing: issues, threats, and solutions,” J. Supercomput., vol. 76, no. 12, pp. 9493–9532, 2020.

J. Geng, “Taking Computation to Data: Integrating Privacy-preserving AI techniques and Blockchain Allowing Secure Analysis of Sensitive Data on Premise,” 2023.

J. Grover and R. Misra, “Keeping it Low-Key: Modern-Day Approaches to Privacy-Preserving Machine Learning,” in Data Protection in a Post-Pandemic Society: Laws, Regulations, Best Practices and Recent Solutions, Springer, 2023, pp. 49–78.

H. Ren, H. Li, Y. Dai, K. Yang, and X. Lin, “Querying in internet of things with privacy preserving: Challenges, solutions and opportunities,” IEEE Netw., vol. 32, no. 6, pp. 144–151, 2018.

J. B. Bernabe, J. L. Canovas, J. L. Hernandez-Ramos, R. T. Moreno, and A. Skarmeta, “Privacy-preserving solutions for blockchain: Review and challenges,” IEEE Access, vol. 7, pp. 164908–164940, 2019.

A. Boulemtafes, A. Derhab, and Y. Challal, “A review of privacy-preserving techniques for deep learning,” Neurocomputing, vol. 384, pp. 21–45, 2020.

R. Xu, N. Baracaldo, and J. Joshi, “Privacy-preserving machine learning: Methods, challenges and directions,” arXiv Prepr. arXiv2108.04417, 2021.

S. Chenthara, K. Ahmed, H. Wang, and F. Whittaker, “Security and privacy-preserving challenges of e-health solutions in cloud computing,” IEEE access, vol. 7, pp. 74361–74382, 2019.

H. G. Abreha, M. Hayajneh, and M. A. Serhani, “Federated learning in edge computing: a systematic survey,” Sensors, vol. 22, no. 2, p. 450, 2022.

B. Zhang, G. Lu, P. Qiu, X. Gui, and Y. Shi, “Advancing Federated Learning through Verifiable Computations and Homomorphic Encryption,” Entropy, vol. 25, no. 11, p. 1550, 2023.

J. Böhler, “Input Secrecy & Output Privacy: Efficient Secure Computation of Differential Privacy Mechanisms.” Karlsruhe Institute of Technology, Germany, 2021.

K. K. K. Thissen, I. L. Schoenmakers, I. R. Koster, and I. P. van Liesdonk, “Achieving differential privacy in secure multiparty computation.” Master’s Thesis, Technische Universiteit Eindhoven, Eindhoven, 2019.

A.-T. Tran, T.-D. Luong, J. Karnjana, and V.-N. Huynh, “An efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation,” Neurocomputing, vol. 422, pp. 245–262, 2021.

K. Sundarakantham and E. Sivasankar, “A hybrid deep learning framework for privacy preservation in edge computing,” Comput. Secur., vol. 129, p. 103209, 2023.

L. Gao, T. H. Luan, B. Gu, Y. Qu, and Y. Xiang, Privacy-preserving in edge computing. Springer, 2021.

S. Deng, H. Zhao, W. Fang, J. Yin, S. Dustdar, and A. Y. Zomaya, “Edge intelligence: The confluence of edge computing and artificial intelligence,” IEEE Internet Things J., vol. 7, no. 8, pp. 7457–7469, 2020.

C. Jiang et al., “Energy aware edge computing: A survey,” Comput. Commun., vol. 151, pp. 556–580, 2020.

A. K. Tyagi and P. Chahal, “Artificial intelligence and machine learning algorithms,” in Research Anthology on Machine Learning Techniques, Methods, and Applications, IGI Global, 2022, pp. 421–446.

J. Alzubi, A. Nayyar, and A. Kumar, “Machine learning from theory to algorithms: an overview,” in Journal of physics: conference series, IOP Publishing, 2018, p. 12012.

E. F. Morales and H. J. Escalante, “A brief introduction to supervised, unsupervised, and reinforcement learning,” in Biosignal processing and classification using computational learning and intelligence, Elsevier, 2022, pp. 111–129.

M. Alloghani, D. Al-Jumeily, J. Mustafina, A. Hussain, and A. J. Aljaaf, “A systematic review on supervised and unsupervised machine learning algorithms for data science,” Supervised unsupervised Learn. data Sci., pp. 3–21, 2020.

P. C. Sen, M. Hajra, and M. Ghosh, “Supervised classification algorithms in machine learning: A survey and review,” in Emerging Technology in Modelling and Graphics: Proceedings of IEM Graph 2018, Springer, 2020, pp. 99–111.

A. Iscen, G. Tolias, Y. Avrithis, and O. Chum, “Label propagation for deep semi-supervised learning,” in Proceedings of the IEEE/CVF conference on computer vision and pattern recognition, 2019, pp. 5070–5079.

Y. Ho and S. Wookey, “The real-world-weight cross-entropy loss function: Modeling the costs of mislabeling,” IEEE access, vol. 8, pp. 4806–4813, 2019.

B. Johnston, A. Jones, and C. Kruger, Applied Unsupervised Learning with Python: Discover hidden patterns and relationships in unstructured data with Python. Packt Publishing Ltd, 2019.

A. A. Patel, Hands-on unsupervised learning using Python: how to build applied machine learning solutions from unlabeled data. O’Reilly Media, 2019.

K. Zhang, Z. Yang, and T. Ba?ar, “Multi-agent reinforcement learning: A selective overview of theories and algorithms,” Handb. Reinf. Learn. Control, pp. 321–384, 2021.

S. Gronauer and K. Diepold, “Multi-agent deep reinforcement learning: a survey,” Artif. Intell. Rev., pp. 1–49, 2022.

Downloads

Published

2023-07-30

How to Cite

Kurniawan, D., Triyanto, D., Wahyudi, M., & Pujiastuti, L. (2023). Privacy-Preserving machine learning in edge computing environments. Jurnal Teknik Informatika C.I.T Medicom, 15(3), 118–125. https://doi.org/10.35335/cit.Vol15.2023.621.pp118-125

Issue

Section

OPTIMIZATION AND ARTIFICIAL INTELLIGENCE