Secure Multi Party Learning: From Secure Computation to Secure Learning

被引:0
|
作者
Han W.-L. [1 ]
Song L.-S. [1 ]
Ruan W.-Q. [1 ]
Lin G.-P. [1 ]
Wang Z.-X. [1 ]
机构
[1] School of Computer Science, Fudan University, Shanghai
来源
基金
中国国家自然科学基金;
关键词
access control; data privacy; machine learning; privacy-preserving machine learning; secure multi-party computation; secure multi-party learning;
D O I
10.11897/SP.J.1016.2023.01494
中图分类号
学科分类号
摘要
How to leverage the data distributed among/between multiple parties to efficiently and securely enforce high-performance machine learning training and inference with privacy preservation has become a hot spot of two research topics, i. e., secure multi-party computation and machine learning. This paper proposes the concept of secure multi-party learning based on the investigation of the latest developments in the hot spot. Secure multi-party learning, a research topic in (secure) software engineering rather than cryptography, hereby refers to the methods, frameworks, and platforms that enforce privacy-preserving machine learning based on secure multi-party computation. It enables multiple parties to perform secure training and secure inference of machine learning models without directly leveraging their plaintext data and any private information beyond the final result. Therefore, secure multi-party learning can be applied to several practical fields involving private data, such as risk control in the financial field and medical diagnosis. Researchers have proposed a dozen of secure multi-party learning frameworks recently. Considering the rapid development of secure multi-party learning, a comprehensive and systematic survey, which covers the underlying technologies and classification of secure multi-party learning frameworks, is still absent so far. Therefore, this paper is motivated to conduct a literature review of the categories, characteristics, and frameworks of secure multi-party learning to help researchers choose suitable secure multi-party learning frameworks for various scenarios» further identify research gaps» and improve the weaknesses of secure multi-party learning frameworks. This paper analyzes the security models, system deployment methods, and functional scenarios in secure multi-party learning and starts with the underlying secure multi-party computation primitives and the privacy-preserving technologies to summarize secure multi-party learning frameworks systematically and comprehensively. The underlying technologies used in secure multi-party learning include holomorphic encryption, oblivious transfer, garbled circuit» and secret sharing. According to these underlying technologies, secure multi-party learning frameworks are classified into four categories: homomorphic encryption-based secure multi-party learning frameworks» garbled circuit-based secure multiparty learning frameworks, secret sharing-based secure multi-party learning frameworks» and mixed-protocol-based secure multi-party learning frameworks. Besides, this paper summarizes the characteristics of these four categories of secure multi-party learning frameworks from six aspects: computational complexity, communication rounds, communication size, linear operation efficiency, nonlinear operation efficiency, and functional scenarios supported. Further, this paper investigates 38 typical secure multi-party learning frameworks and compares them regarding the number of parties supported, security models, functional scenarios supported, machine learning models supported, activation functions supported, pooling implemented, and accuracy. Then, this paper analyzes the differences between secure multi-party learning and other privacy-preserving machine learning techniques» including federated learning and confidential computing based on trusted execution environment. Finally, this paper presents suggestions for future development of secure multiparty learning as follows: (1) to improve security, including support for a security model with stronger security guarantees, access control to the final model, and protection of the final model; (2) to prove the security of secure multi-party learning processes by the universally composable scheme; (3) to improve performance and efficiency by reducing the online communication overhead, accelerating the local computation with GPU and designing the machine learning models that adapt to the underlying technologies of secure multi-party learning; (4) to realize interoperability between secure multi-party learning frameworks. © 2023 Science Press. All rights reserved.
引用
收藏
页码:1494 / 1512
页数:18
相关论文
共 107 条
  • [1] Rastegari M, Ordonez V, Reclmon J, Et al., XNOR-Net: ImageNet classification using binary convolutional neural networks, Proceedings of the European Conference on Computer Vision, pp. 525-542, (2016)
  • [2] Povey D, Ghoshal A, Boulianne G, Et al., The Kaldi speech recognition toolkit, Proceedings of the IEEE 2011 Workshop on Automatic Speech Recognition and Understanding, pp. 6465-6469, (2011)
  • [3] Gu Y, Tinn R, Cheng H, Et al., Domain-specific language model pretraining for biomedical natural language processing, ACM Transactions on Computing for Healthcare (HEALTH), 3, 1, pp. 1-23, (2021)
  • [4] Kou G, Chao X, Peng Y, Et al., Machine learning methods for systemic risk analysis in financial sectors, Technological and Economic Development of Economy, 25, 5, pp. 716-742, (2019)
  • [5] Fakoor R, Ladhak F, Nazi A, Et al., Using deep learning to enhance cancer diagnosis and classification, Proceedings of the International Conference on Machine Learning, 28, pp. 3937-3949, (2013)
  • [6] Voigt P, von dem Bussche A., The EU General Data Protection Regulation (GDPR): A Practical Guide, (2017)
  • [7] Song Lei, Ma Chun-Guang, Duan Guang-Han, Machine learning security and privacy: A survey, Chinese Journal of Network and Information Security, 4, 8, pp. 1-11, (2018)
  • [8] Tan Zuo-Wen, Zhang Lian-Fu, Survey on privacy preserving techniques for machine learning, Journal of Software, 31, 7, pp. 2127-2156, (2020)
  • [9] Jiang Han, Liu Yi-Ran, Song Xiang-Fu, Et al., Cryptographic approaches for privacy-preserving machine learning, Journal of ElectronicsInformation Technology, 42, 5, pp. 1068-1078, (2020)
  • [10] Song L, Wu H, Ruan W, Et al., SoK: Training machine learning models over multiple sources with privacy preservation, (2020)