privacy and security
On the Security and Privacy of Federated Learning: A Survey with Attacks, Defenses, Frameworks, Applications, and Future Directions
Jimenez-Gutierrez, Daniel M., Falkouskaya, Yelizaveta, Hernandez-Ramos, Jose L., Anagnostopoulos, Aris, Chatzigiannakis, Ioannis, Vitaletti, Andrea
Federated Learning (FL) is an emerging distributed machine learning paradigm enabling multiple clients to train a global model collaboratively without sharing their raw data. While FL enhances data privacy by design, it remains vulnerable to various security and privacy threats. This survey provides a comprehensive overview of more than 200 papers regarding the state-of-the-art attacks and defense mechanisms developed to address these challenges, categorizing them into security-enhancing and privacy-preserving techniques. Security-enhancing methods aim to improve FL robustness against malicious behaviors such as byzantine attacks, poisoning, and Sybil attacks. At the same time, privacy-preserving techniques focus on protecting sensitive data through cryptographic approaches, differential privacy, and secure aggregation. We critically analyze the strengths and limitations of existing methods, highlight the trade-offs between privacy, security, and model performance, and discuss the implications of non-IID data distributions on the effectiveness of these defenses. Furthermore, we identify open research challenges and future directions, including the need for scalable, adaptive, and energy-efficient solutions operating in dynamic and heterogeneous FL environments. Our survey aims to guide researchers and practitioners in developing robust and privacy-preserving FL systems, fostering advancements safeguarding collaborative learning frameworks' integrity and confidentiality.
- Asia > India > Karnataka > Bengaluru (0.04)
- North America > United States > Virginia (0.04)
- Europe > Italy > Lazio > Rome (0.04)
- (2 more...)
- Overview (1.00)
- Research Report > New Finding (0.45)
- Research Report > Promising Solution (0.45)
Generative Artificial Intelligence for Internet of Things Computing: A Systematic Survey
Mangione, Fabrizio, Savaglio, Claudio, Fortino, Giancarlo
The integration of Generative Artificial Intelligence (GenAI) within the Internet of Things (IoT) is garnering considerable interest. This growing attention stems from the continuous evolution and widespread adoption they are both having individually, enough to spontaneously reshape numerous sectors, including Healthcare, Manufacturing, and Smart Cities. Hence, their increasing popularity has catalyzed further extensive research for understanding the potential of the duo GenAI-IoT, how they interplay, and to which extent their synergy can innovate the state-of-the-art in their individual scenarios. However, despite the increasing prominence of GenAI for IoT Computing, much of the existing research remains focused on specific, narrowly scoped applications. This fragmented approach highlights the need for a more comprehensive analysis of the potential, challenges, and implications of GenAI integration within the broader IoT ecosystem. This survey exactly aims to address this gap by providing a holistic overview of the opportunities, issues, and considerations arising from the convergence of these mainstream paradigms. Our contribution is realized through a systematic literature review following the PRISMA methodology. A comparison framework is presented, and well-defined research questions are outlined to comprehensively explore the past, present, and future directions of GenAI integration with IoT Computing, offering valuable insights for both experts and newcomers.
- Europe > Italy > Calabria (0.04)
- Asia > China (0.04)
- North America > United States > Pennsylvania > Philadelphia County > Philadelphia (0.04)
- (2 more...)
- Research Report > Promising Solution (0.67)
- Overview > Growing Problem (0.65)
- Information Technology > Security & Privacy (1.00)
- Energy (1.00)
- Information Technology > Smart Houses & Appliances (0.87)
- Education > Curriculum > Subject-Specific Education (0.45)
- Information Technology > Internet of Things (1.00)
- Information Technology > Data Science > Data Mining (1.00)
- Information Technology > Communications > Networks (1.00)
- (4 more...)
A new framework for prognostics in decentralized industries: Enhancing fairness, security, and transparency through Blockchain and Federated Learning
Pham, T. Q. D., Tran, K. D., Nguyen, Khanh T. P., Tran, X. V., Tran, K. P.
As global industries transition towards Industry 5.0 predictive maintenance PM remains crucial for cost effective operations resilience and minimizing downtime in increasingly smart manufacturing environments In this chapter we explore how the integration of Federated Learning FL and blockchain BC technologies enhances the prediction of machinerys Remaining Useful Life RUL within decentralized and human centric industrial ecosystems Traditional centralized data approaches raise concerns over privacy security and scalability especially as Artificial intelligence AI driven smart manufacturing becomes more prevalent This chapter leverages FL to enable localized model training across multiple sites while utilizing BC to ensure trust transparency and data integrity across the network This BC integrated FL framework optimizes RUL predictions enhances data privacy and security establishes transparency and promotes collaboration in decentralized manufacturing It addresses key challenges such as maintaining privacy and security ensuring transparency and fairness and incentivizing participation in decentralized networks Experimental validation using the NASA CMAPSS dataset demonstrates the model effectiveness in real world scenarios and we extend our findings to the broader research community through open source code on GitHub inviting collaborative development to drive innovation in Industry 5.0
- North America > United States (0.34)
- Europe > France > Hauts-de-France > Nord > Lille (0.04)
- Europe > Belgium (0.04)
- (3 more...)
The 'dangerous' iPhone settings that are sharing your data... and how to turn them off
These settings allow your iPhone to share data that helps third parties target advertisements to you and measure advertisement engagement. Chip Hallett, author of The Ultimate Privacy Playbook, explained how to turn these'dangerous' settings off to ensure that your data is always kept private. To disable them, start by opening the settings app. Then scroll down and tap'Safari.' Then scroll all the way down to the bottom of the screen where it says'Advanced.' Tap this tab, and you should see a toggle on/off button next to'Privacy Preserving Ad Measurement.'
- Information Technology > Security & Privacy (1.00)
- Information Technology > Artificial Intelligence (1.00)
- Information Technology > Communications > Mobile (0.77)
Enhancing Privacy in Federated Learning through Quantum Teleportation Integration
Federated learning enables collaborative model training across multiple clients without sharing raw data, thereby enhancing privacy. However, the exchange of model updates can still expose sensitive information. Quantum teleportation, a process that transfers quantum states between distant locations without physical transmission of the particles themselves, has recently been implemented in real-world networks. This position paper explores the potential of integrating quantum teleportation into federated learning frameworks to bolster privacy. By leveraging quantum entanglement and the no-cloning theorem, quantum teleportation ensures that data remains secure during transmission, as any eavesdropping attempt would be detectable. We propose a novel architecture where quantum teleportation facilitates the secure exchange of model parameters and gradients among clients and servers. This integration aims to mitigate risks associated with data leakage and adversarial attacks inherent in classical federated learning setups. We also discuss the practical challenges of implementing such a system, including the current limitations of quantum network infrastructure and the need for hybrid quantum-classical protocols. Our analysis suggests that, despite these challenges, the convergence of quantum communication technologies and federated learning presents a promising avenue for achieving unprecedented levels of privacy in distributed machine learning.
From Federated Learning to Quantum Federated Learning for Space-Air-Ground Integrated Networks
Quy, Vu Khanh, Quy, Nguyen Minh, Hoai, Tran Thi, Shaon, Shaba, Uddin, Md Raihan, Nguyen, Tien, Nguyen, Dinh C., Kaushik, Aryan, Chatzimisios, Periklis
6G wireless networks are expected to provide seamless and data-based connections that cover space-air-ground and underwater networks. As a core partition of future 6G networks, Space-Air-Ground Integrated Networks (SAGIN) have been envisioned to provide countless real-time intelligent applications. To realize this, promoting AI techniques into SAGIN is an inevitable trend. Due to the distributed and heterogeneous architecture of SAGIN, federated learning (FL) and then quantum FL are emerging AI model training techniques for enabling future privacy-enhanced and computation-efficient SAGINs. In this work, we explore the vision of using FL/QFL in SAGINs. We present a few representative applications enabled by the integration of FL and QFL in SAGINs. A case study of QFL over UAV networks is also given, showing the merit of quantum-enabled training approach over the conventional FL benchmark. Research challenges along with standardization for QFL adoption in future SAGINs are also highlighted.
- Oceania > Australia > Tasmania > Hobart (0.04)
- North America > United States > Alabama (0.04)
- Europe > Greece > Central Macedonia > Thessaloniki (0.04)
- Asia > Vietnam > Hưng Yên Province > Hưng Yên (0.04)
- Information Technology > Security & Privacy (1.00)
- Government (0.94)
- Telecommunications (0.68)
A Global Cybersecurity Standardization Framework for Healthcare Informatics
Gupta, Kishu, Mishra, Vinaytosh, Makkar, Aaisha
Healthcare has witnessed an increased digitalization in the post-COVID world. Technologies such as the medical internet of things and wearable devices are generating a plethora of data available on the cloud anytime from anywhere. This data can be analyzed using advanced artificial intelligence techniques for diagnosis, prognosis, or even treatment of disease. This advancement comes with a major risk to protecting and securing protected health information (PHI). The prevailing regulations for preserving PHI are neither comprehensive nor easy to implement. The study first identifies twenty activities crucial for privacy and security, then categorizes them into five homogeneous categories namely: $\complement_1$ (Policy and Compliance Management), $\complement_2$ (Employee Training and Awareness), $\complement_3$ (Data Protection and Privacy Control), $\complement_4$ (Monitoring and Response), and $\complement_5$ (Technology and Infrastructure Security) and prioritizes these categories to provide a framework for the implementation of privacy and security in a wise manner. The framework utilized the Delphi Method to identify activities, criteria for categorization, and prioritization. Categorization is based on the Density-Based Spatial Clustering of Applications with Noise (DBSCAN), and prioritization is performed using a Technique for Order of Preference by Similarity to the Ideal Solution (TOPSIS). The outcomes conclude that $\complement_3$ activities should be given first preference in implementation and followed by $\complement_1$ and $\complement_2$ activities. Finally, $\complement_4$ and $\complement_5$ should be implemented. The prioritized view of identified clustered healthcare activities related to security and privacy, are useful for healthcare policymakers and healthcare informatics professionals.
- Asia > India (0.14)
- Europe > United Kingdom > England > Derbyshire > Derby (0.05)
- Asia > Taiwan > Takao Province > Kaohsiung (0.04)
- (7 more...)
- Information Technology > Security & Privacy (1.00)
- Health & Medicine (1.00)
- Government > Military > Cyberwarfare (0.50)
A Global Medical Data Security and Privacy Preserving Standards Identification Framework for Electronic Healthcare Consumers
Mishra, Vinaytosh, Gupta, Kishu, Saxena, Deepika, Singh, Ashutosh Kumar
Electronic Health Records (EHR) are crucial for the success of digital healthcare, with a focus on putting consumers at the center of this transformation. However, the digitalization of healthcare records brings along security and privacy risks for personal data. The major concern is that different countries have varying standards for the security and privacy of medical data. This paper proposed a novel and comprehensive framework to standardize these rules globally, bringing them together on a common platform. To support this proposal, the study reviews existing literature to understand the research interest in this issue. It also examines six key laws and standards related to security and privacy, identifying twenty concepts. The proposed framework utilized K-means clustering to categorize these concepts and identify five key factors. Finally, an Ordinal Priority Approach is applied to determine the preferred implementation of these factors in the context of EHRs. The proposed study provides a descriptive then prescriptive framework for the implementation of privacy and security in the context of electronic health records. Therefore, the findings of the proposed framework are useful for professionals and policymakers in improving the security and privacy associated with EHRs.
- Europe > Poland > Masovia Province > Warsaw (0.04)
- Asia > India > Madhya Pradesh > Bhopal (0.04)
- Asia > Taiwan > Takao Province > Kaohsiung (0.04)
- (9 more...)
- Research Report > New Finding (1.00)
- Research Report > Experimental Study (1.00)
Apple Intelligence Will Infuse the iPhone With Generative AI
Apple is finally getting into the generative artificial intelligence game. Apple CEO Tim Cook announced Apple's long-awaited AI reboot at the company's Worldwide Developer Conference in Cupertino, California, today. What the company is calling "Apple Intelligence" includes a handful of features that will shape the iOS experience in ways large and small. Apple also gave Siri, its currently limited voice assistant, a significant generative AI overhaul. Apple also announced that it will incorporate outside AI models into its software, starting with OpenAI's ChatGPT later this year, making clear that the experience will be opt-in only and won't require a ChatGPT subscription.
Mozilla: Your New Car Is a Data Privacy Nightmare
Last week, WIRED published a deep-dive investigation into Trickbot, the prolific Russian ransomware gang. This week, US and UK authorities sanctioned 11 alleged members of Trickbot and its related group, Conti, including Maksim Galochkin, aka Bentley, one of the alleged members whose real-world identity we confirmed through our investigation. In addition to the US and UK sanctions, the US Justice Department also unsealed indictments filed in three US federal courts against Galochkin and eight other alleged Trickbot members for ransomware attacks against entities in Ohio, Tennessee, and California. Because everyone charged is a Russian national, however, it is unlikely they will ever be arrested or face trial. While Russian cybercriminals typically enjoy immunity, the same may not remain true for the country's military hackers.
- Asia > Russia (0.54)
- Asia > China (0.35)
- North America > United States > Tennessee (0.25)
- (4 more...)
- Law (1.00)
- Information Technology > Security & Privacy (1.00)
- Government > Regional Government > North America Government > United States Government (0.90)
- (3 more...)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Social Media (0.32)
- Information Technology > Artificial Intelligence > Natural Language > Chatbot (0.31)