Distributed machine learning can give an adaptable but strong shared condition for the design of trusted AI applications; this is mainly due to lack of privacy of centralised remote learning mechanisms. This notwithstanding, also distributed approaches have been compromised by several attack models (mainly data poisoning): In such a situation, a malicious member of the learning party may inject bad data. As such applications are growing in criticality, learning models must face with security and protection just as with versatility issues. The aim of the paper is to improve these applications by providing extra security features for distributed and federated learning mechanisms: More in the details, the paper examines specific concerns such as the utilisation of blockchain, homomorphic cryptography and meta-modelling techniques to ensure protection as well as other non-functional properties.

On managing security in smart e-health applications

Marulli F.
Software
;
Bellini E.
Validation
;
Marrone S.
Methodology
2021

Abstract

Distributed machine learning can give an adaptable but strong shared condition for the design of trusted AI applications; this is mainly due to lack of privacy of centralised remote learning mechanisms. This notwithstanding, also distributed approaches have been compromised by several attack models (mainly data poisoning): In such a situation, a malicious member of the learning party may inject bad data. As such applications are growing in criticality, learning models must face with security and protection just as with versatility issues. The aim of the paper is to improve these applications by providing extra security features for distributed and federated learning mechanisms: More in the details, the paper examines specific concerns such as the utilisation of blockchain, homomorphic cryptography and meta-modelling techniques to ensure protection as well as other non-functional properties.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11591/463658
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? 12
social impact