Enterprise model education: A privacy -preserving strategy
Keywords:
privacy-preserving model training, enterprise data security, differential privacy, federated learning,Abstract
Organizations increasingly rely on ML models in the modern data-centric environment in order to get insights & guide decisions. Particularly in cases involving sensitive data, the growing awareness for data privacy presents significant challenges for training these models. This work explores new approaches to build machine learning models stressing privacy without sacrificing accuracy or speed. While protecting private data by means of federated learning, differential privacy & the homomorphic encryption, organizations may teach models on distributed data sources. This approach follows legislative requirements on data security & reduces the risks connected to data breaches. The focus is on creating a structure that lets companies utilize their data while preserving personal privacy. This article emphasizes the importance of harmonizing technological development with ethical concerns so that data privacy and business success live peacefully in the future.
References
1. Agrawal, R., & Srikant, R. (2000, May). Privacy-preserving data mining.
In Proceedings of the 2000 ACM SIGMOD international conference on Management of data (pp. 439-450).
2. Li, X. B., & Sarkar, S. (2014). Digression and value concatenation to enable privacy-preserving regression. MIS quarterly: management information systems, 38(3), 679.
3. Evfimievski, A., Srikant, R., Agrawal, R., & Gehrke, J. (2002, July). Privacy preserving mining of association rules. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 217-228).
4. Fung, B. C., Wang, K., Chen, R., & Yu, P. S. (2010). Privacy-preserving data publishing: A survey of recent developments. ACM Computing Surveys (Csur), 42(4), 1-53.
5. Wang, C., Chow, S. S., Wang, Q., Ren, K., & Lou, W. (2011). Privacy-preserving public auditing for secure cloud storage. IEEE transactions on computers, 62(2), 362-375.
6. Xu, L., Jiang, C., Wang, J., Yuan, J., & Ren, Y. (2014). Information security in big data: privacy and data mining. Ieee Access, 2, 1149-1176.
7. Lindell, & Pinkas. (2002). Privacy preserving data mining. Journal of cryptology, 15, 177-206.
8. Naor, M., Pinkas, B., & Sumner, R. (1999, November). Privacy preserving auctions and mechanism design. In Proceedings of the 1st ACM Conference on Electronic Commerce (pp. 129-139).
9. Xiao, Z., & Xiao, Y. (2012). Security and privacy in cloud computing. IEEE communications surveys & tutorials, 15(2), 843-859.
10.Ziegeldorf, J. H., Morchon, O. G., & Wehrle, K. (2014). Privacy in the Internet of Things: threats and challenges. Security and Communication Networks, 7(12), 2728-2742.
11.Tramèr, F., Zhang, F., Juels, A., Reiter, M. K., & Ristenpart, T. (2016). Stealing machine learning models via prediction {APIs}. In 25th USENIX security symposium (USENIX Security 16) (pp. 601-618).
12. Islam, S., Keung, J., Lee, K., & Liu, A. (2012). Empirical prediction models for adaptive resource provisioning in the cloud. Future Generation Computer Systems, 28(1), 155-162.
13. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of network and computer applications, 34(1), 1-11.
14. Roman, R., Zhou, J., & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer networks, 57(10), 2266-2279.
15. Fernández-Alemán, J. L., Señor, I. C., Lozoya, P. Á. O., & Toval, A. (2013). Security and privacy in electronic health records: A systematic literature review. Journal of biomedical informatics, 46(3), 541-562.
16. Gade, K. R. (2018). Real-Time Analytics: Challenges and Opportunities. Innovative Computer Sciences Journal, 4(1).
17. Gade, K. R. (2017). Integrations: ETL vs. ELT: Comparative analysis and best practices. Innovative Computer Sciences Journal, 3(1).
18. Komandla, V. Transforming Financial Interactions: Best Practices for Mobile Banking App Design and Functionality to Boost User Engagement and Satisfaction.
19. Gade, K. R. (2017). Migrations: Challenges and Best Practices for Migrating Legacy Systems to Cloud-Based Platforms. Innovative Computer Sciences Journal, 3(1).
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.