2021
DOI: 10.1186/s42400-021-00092-8
|View full text |Cite
|
Sign up to set email alerts
|

Confidential machine learning on untrusted platforms: a survey

Abstract: With the ever-growing data and the need for developing powerful machine learning models, data owners increasingly depend on various untrusted platforms (e.g., public clouds, edges, and machine learning service providers) for scalable processing or collaborative learning. Thus, sensitive data and models are in danger of unauthorized access, misuse, and privacy compromises. A relatively new body of research confidentially trains machine learning models on protected data to address these concerns. In this survey,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 84 publications
0
3
0
Order By: Relevance
“…Unlike ours, the focus is on generic learning models and does not provide an in-depth analysis of neural network models. On a related study, Sagar and Keke [13] classify confidential learning techniques based on crypto-graphic primitives and hardware-based protocols. However, the authors' study is limited to SGX-based TEEs only.…”
Section: Related Surveysmentioning
confidence: 99%
See 1 more Smart Citation
“…Unlike ours, the focus is on generic learning models and does not provide an in-depth analysis of neural network models. On a related study, Sagar and Keke [13] classify confidential learning techniques based on crypto-graphic primitives and hardware-based protocols. However, the authors' study is limited to SGX-based TEEs only.…”
Section: Related Surveysmentioning
confidence: 99%
“…Researchers proposed various techniques to adapt existing TEE technology for executing resource-heavy learning models inside resource-constrained TEEs. While there has been some work understanding solutions in protecting the confidentiality of the learning models and data during computation [10], [11], [12], [13], [14], there exists no prior work that systematically summarizes trusted neural network 1 execution. In this survey, we provide an in-depth review of existing trustworthy neural network execution techniques that use off-the-shelf TEEs (viz., SGX and TrustZone).…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, the concept of cloud computing has emerged as one of the most important computing paradigms. Cloud computing has revolutionized information technology and access to processing and computing resources [1,2]. With cloud computing, individuals and organizations can access a shared network of managed and scalable IT resources such as servers, storage, and applications on-demand [3].…”
Section: Introductionmentioning
confidence: 99%