• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhou Chunyi, Chen Dawei, Wang Shang, Fu Anmin, Gao Yansong. Research and Challenge of Distributed Deep Learning Privacy and Security Attack[J]. Journal of Computer Research and Development, 2021, 58(5): 927-943. DOI: 10.7544/issn1000-1239.2021.20200966
Citation: Zhou Chunyi, Chen Dawei, Wang Shang, Fu Anmin, Gao Yansong. Research and Challenge of Distributed Deep Learning Privacy and Security Attack[J]. Journal of Computer Research and Development, 2021, 58(5): 927-943. DOI: 10.7544/issn1000-1239.2021.20200966

Research and Challenge of Distributed Deep Learning Privacy and Security Attack

Funds: This work was supported by the National Natural Science Foundation of China (62072239, 62002167), the Guangxi Key Laboratory of Trusted Software (KX202029), and the Fundamental Research Funds for the Central Universities (30920021129).
More Information
  • Published Date: April 30, 2021
  • Different from the centralized deep learning mode, distributed deep learning gets rid of the limitation that the data must be centralized during the model training process, which realizes the local operation of the data, and allows all participants to collaborate without exchanging data. It significantly reduces the risk of user privacy leakage, breaks the data island from the technical level, and improves the efficiency of deep learning. Distributed deep learning can be widely used in smart medical care, smart finance, smart retail and smart transportation. However, typical attacks such as generative adversarial network attacks, membership inference attacks and backdoor attacks, have revealed that distributed deep learning still has serious privacy vulnerabilities and security threats. This paper first compares and analyzes the characteristics of the three distributed deep learning modes and their core problems, including collaborative learning, federated learning and split learning. Secondly, from the perspective of privacy attacks, it comprehensively expounds various types of privacy attacks faced by distributed deep learning, and summarizes the existing privacy attack defense methods. At the same time, from the perspective of security attacks, the paper analyzes the attack process and inherent security threats of the three security attacks: data poisoning attacks, adversarial sample attacks, and backdoor attacks, and analyzes the existing security attack defense technology from the perspectives of defense principles, adversary capabilities, and defense effects. Finally, from the perspective of privacy and security attacks, the future research directions of distributed deep learning are discussed and prospected.
  • Related Articles

    [1]Lai Sichao, Wu Xiaoying, Peng Yuwei, Peng Zhiyong. Survey on Database Index Tuning Techniques[J]. Journal of Computer Research and Development, 2024, 61(4): 929-954. DOI: 10.7544/issn1000-1239.202220931
    [2]Zhang Qiang, Yang Jibin, Zhang Xiongwei, Cao Tieyong, Zheng Changyan. CS-Softmax: A Cosine Similarity-Based Softmax Loss Function[J]. Journal of Computer Research and Development, 2022, 59(4): 936-949. DOI: 10.7544/issn1000-1239.20200879
    [3]Sun Jing, Yu Hongliang, and Zheng Weimin. Index of Meta-Data Set of the Similar Files for Inline De-Duplication in Distributed Storage Systems[J]. Journal of Computer Research and Development, 2013, 50(1): 197-205.
    [4]Guo Huan, Tang Yong, Ye Xiaoping. Temporal Indexing Technique Based on Structural Summary[J]. Journal of Computer Research and Development, 2011, 48(11): 2177-2186.
    [5]Zeng Xiao, Chen Zhenyong, Chen Ming, and Xiong Zhang. Invertible Image Watermarking Based on Zero Coefficient Index[J]. Journal of Computer Research and Development, 2010, 47(7): 1304-1312.
    [6]Wang Bin, Guo Qing, Li Zhongbo, Yang Xiaochun. Index Structures for Supporting Block Edit Distance[J]. Journal of Computer Research and Development, 2010, 47(1): 191-199.
    [7]Lu Jing and Ma Shaoping. Automatic Image Annotation Based on Concept Indexing[J]. Journal of Computer Research and Development, 2007, 44(3).
    [8]Zhang Jing, Lu Hong, and Xue Xiangyang. Efficient Sports Video Retrieval Based on Index Structure[J]. Journal of Computer Research and Development, 2006, 43(11): 1953-1958.
    [9]Lei Xiangxin, Hu Yunfa, Yang Zhiying, Liu Yong, and Zhang Kai. XML Indexing Technology Based on IRST[J]. Journal of Computer Research and Development, 2005, 42(7): 1261-1271.
    [10]Lu Yan, Zhang Liang, Duan Qiyang, Shi Baile. DTD-Based XML Indexing[J]. Journal of Computer Research and Development, 2005, 42(1): 30-37.

Catalog

    Article views (1679) PDF downloads (1459) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return