Proposal of security preserving machine learning of IoT
Abstract
The use of cloud computing system, which is the basic technology supporting ICT, is expanding. However, as the number of terminals connected to it increases, the limit of the capability is also becoming apparent. The limit of its capacity leads to the delay of significant processing time. As an architecture to improve this, the edge computing system has been proposed. This is known as a new paradigm corresponding the conventional cloud system. In the conventional cloud system, a terminal sends all data to the cloud and the cloud returns the result to the terminal or a thing directly connected to it. On the other hand, in the edge system, a plural of servers called edges are connected directly or to close distance between the cloud and the terminal (or thing). Then, let us consider the case of machine learning that requires big data. The purpose of learning is to find out the relationship (information) lurking in from the collected data. In order to realize this, a system with several parameters is assumed and estimated by repeatedly updating the parameters with learning data. Further, there is the problem of the security for learning data. In other words, users of cloud computing cannot escape the concern about the risk of information leakage. How can we build a cloud computing system to avoid such risks? Secure multiparty computation is known as one method of realizing safe computation. It is called SMC (Secure Multiparty Computation). Many studies on learning methods considering on SMC have also been proposed. Then, what kind of learning method is suitable for edge computing considering on SMC? In this paper, learning method suitable for edge computing considering on SMC is proposed. It is shown using an edge system composed of a client and m servers. Learning data are shared m pieces of subsets for m servers, learning is performed simultaneously in each server and system parameters are updated in the client using their results. The idea of learning method is shown using BP algorithm for neural network. The effectiveness is shown by numerical simulations.
Full Text:
PDFDOI: https://doi.org/10.5430/air.v7n2p26
Refbacks
- There are currently no refbacks.
Artificial Intelligence Research
ISSN 1927-6974 (Print) ISSN 1927-6982 (Online)
Copyright © Sciedu Press
To make sure that you can receive messages from us, please add the 'Sciedupress.com' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.