A Survey of Model Extraction Attacks and Defenses in Distributed Computing Environments