2020
DOI: 10.1007/978-3-030-58986-8_14
|View full text |Cite
|
Sign up to set email alerts
|

A Distributed Trust Framework for Privacy-Preserving Machine Learning

Abstract: When training a machine learning model, it is standard procedure for the researcher to have full knowledge of both the data and model. However, this engenders a lack of trust between data owners and data scientists. Data owners are justifiably reluctant to relinquish control of private information to third parties. Privacy-preserving techniques distribute computation in order to ensure that data remains in the control of the owner while learning takes place. However, architectures distributed amongst multiple … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(25 citation statements)
references
References 33 publications
0
25
0
Order By: Relevance
“…In this paper, we extended our previous work [27] by merging the privacy-preserving ML field with VCs and DIDs while addressing trust concerns within the data industry. These areas focus on people's security, privacy and especially on the protection of their sensitive data.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…In this paper, we extended our previous work [27] by merging the privacy-preserving ML field with VCs and DIDs while addressing trust concerns within the data industry. These areas focus on people's security, privacy and especially on the protection of their sensitive data.…”
Section: Discussionmentioning
confidence: 99%
“…The encryption techniques used by DIDComm include ElGamal [52], RSA [53] and elliptic curve-based [54]. Algorithm 1 DID Communication Between Alice and Bob [27] 1: Alice has a private key sk a and a DID Document for Bob containing an endpoint (endpoint bob ) and a public key (pk b ).…”
Section: Decentralised Identifiers Communication Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…Furthermore, critical medical information must be regularly updated and shared where proper consent is provided by the patient. Along with this we need strong availability, fast access and the appropriate encryption of these records [ 2 , 19 ].…”
Section: Related Workmentioning
confidence: 99%