Smart City Gnosys

Smart city article details

Title Security For Distributed Machine Learning
ID_Doc 47930
Authors Gomez L.; Yu T.; Duverger P.
Year 2023
Published Proceedings of the International Conference on Security and Cryptography, 1
DOI http://dx.doi.org/10.5220/0012137700003555
Abstract With the adoption of IoT-like technologies, industrials aim to enhance the business value of their physical assets and improve their operational efficiency. However, IoT devices alone tend to strain enterprise systems with a sheer volume of unstructured and unfiltered data. To overcome this challenge, endowing (smart) devices with AI-based capabilities can significantly enhance enterprise system capabilities. However, deploying AI-based capabilities on potentially insecure edge hardware and platforms introduces new security risks, including AI model theft, poisoning, and data leaks. This paradigm shift necessitates the protection of distributed AI applications and data. In this paper, we propose a solution for safeguarding the Intellectual Property and data privacy of ML-based software. We utilize hardware-assisted Privacy Enhancing Technologies, specifically Trusted Execution Environments. We evaluate the effectiveness of our approach in the context of ML-based motion detection in CCTV cameras. This work is part of a co-innovation project with the Smart City of Antibes, France. © 2023 by SCITEPRESS - Science and Technology Publications, Lda. Under CC license (CC BY-NC-ND 4.0).
Author Keywords Data Privacy; Edge Computing; Intellectual Property; Machine Learning; Privacy Enhancing Technology; Trusted Execution Environment


Similar Articles


Id Similarity Authors Title Published
36064 View0.875Alfahaid A.; Alalwany E.; Almars A.M.; Alharbi F.; Atlam E.; Mahgoub I.Machine Learning-Based Security Solutions For Iot Networks: A Comprehensive SurveySensors, 25, 11 (2025)
47886 View0.859El-Husseini F.; Noura H.; Vernier F.Security And Privacy-Preserving For Machine Learning Models: Attacks, Countermeasures, And Future DirectionsProceedings of the 8th Cyber Security in Networking Conference: AI for Cybersecurity, CSNet 2024 (2024)
6593 View0.857Rao G.S.; Yuvaraj S.A.; Kondapi N.R.; Kumari A.R.; Palepu N.R.; Bharathi C.R.; Arulananth T.S.; Ebinezer M.J.D.Advancements In Machine Learning For Iot: Ai-Driven Optimization And SecurityJournal of Information Systems Engineering and Management, 10, 17 (2025)
1448 View0.855Muniswamy A.; Rathi R.A Detailed Review On Enhancing The Security In Internet Of Things-Based Smart City Environment Using Machine Learning AlgorithmsIEEE Access, 12 (2024)
43130 View0.854Chen Y.-C.; Hsu S.-Y.; Xie X.; Kumari S.; Kumar S.; Rodrigues J.; Alzahrani B.A.Privacy Preserving Support Vector Machine Based On Federated Learning For Distributed Iot-Enabled Data AnalysisComputational Intelligence, 40, 2 (2024)
32899 View0.853Sarker I.H.; Khan A.I.; Abushark Y.B.; Alsolami F.Internet Of Things (Iot) Security Intelligence: A Comprehensive Overview, Machine Learning Solutions And Research DirectionsMobile Networks and Applications, 28, 1 (2023)
5172 View0.851Rodríguez E.; Otero B.; Canal R.A Survey Of Machine And Deep Learning Methods For Privacy Protection In The Internet Of ThingsSensors, 23, 3 (2023)