Vol. 3 No. 1 (2023): Journal of AI-Assisted Scientific Discovery
Articles

Privacy-Preserving Machine Learning Models for Autonomous Vehicle Data Analysis

Dr. Akiko Yoshikawa
Associate Professor of Mechanical Engineering, Tokyo Institute of Technology, Japan
Cover

Published 30-06-2023

How to Cite

[1]
Dr. Akiko Yoshikawa, “Privacy-Preserving Machine Learning Models for Autonomous Vehicle Data Analysis”, Journal of AI-Assisted Scientific Discovery, vol. 3, no. 1, pp. 90–110, Jun. 2023, Accessed: Sep. 17, 2024. [Online]. Available: https://scienceacadpress.com/index.php/jaasd/article/view/93

Abstract

The ability to motivate secure communication protocols that maintain both data privacy and training model owner safety has drawn a lot of attention to PPML design [1]. However, this area is relatively new, and most of the work is centered around supervised learning, where the server can easily identify each data point. In cooperative learning, less attention is given to privacy protection, but the cooperation model can potentially exploit the privacy requirements of the various players involved. This fact becomes more important when we combine the standard cooperative learning model with a setup with several possible sources of heterogeneity between the data of the various devices. This has led to research directions that are often considered in isolation from each other. However, due to the fast-paced nature of these technologies, the reality is that these aspects are likely to be influential in combined form during the next-generation technologies.

Autonomous vehicles (AVs) have tremendous potential to change future commuting and transportation [2]. Cars possess the ability to utilize sensor data to anticipate and mitigate traffic accidents, driver errors and poor road conditions. But for these tasks to be carried out effectively, the AVs must be equipped with robust learning algorithms to interpret sensor data. However, these algorithms are also put at risk because of privacy concerns. People are more wary of sharing personal data now than they were a few years ago. Research has shown that people are more accepting of partial data sharing concepts than full data sharing.

Downloads

Download data is not yet available.

References

  1. [1] S. Rass, S. König, J. Wachter, M. Egger et al., "Supervised Machine Learning with Plausible Deniability," 2021. [PDF]
  2. [2] T. Hagendorff, "Linking Human And Machine Behavior: A New Approach to Evaluate Training Data Quality for Beneficial Machine Learning," 2021. ncbi.nlm.nih.gov
  3. [3] C. Xie, Z. Cao, Y. Long, D. Yang et al., "Privacy of Autonomous Vehicles: Risks, Protection Methods, and Future Directions," 2022. [PDF]
  4. [4] J. Xu, Y. Zhang, H. Yu, B. Lin et al., "High performance of privacy-preserving acute myocardial infarction auxiliary diagnosis based on federated learning: a multicenter retrospective study," 2022. ncbi.nlm.nih.gov
  5. Tatineni, Sumanth. "Ethical Considerations in AI and Data Science: Bias, Fairness, and Accountability." International Journal of Information Technology and Management Information Systems (IJITMIS) 10.1 (2019): 11-21.
  6. Vemoori, V. “Towards Secure and Trustworthy Autonomous Vehicles: Leveraging Distributed Ledger Technology for Secure Communication and Exploring Explainable Artificial Intelligence for Robust Decision-Making and Comprehensive Testing”. Journal of Science & Technology, vol. 1, no. 1, Nov. 2020, pp. 130-7, https://thesciencebrigade.com/jst/article/view/224.
  7. Shaik, Mahammad, et al. "Granular Access Control for the Perpetually Expanding Internet of Things: A Deep Dive into Implementing Role-Based Access Control (RBAC) for Enhanced Device Security and Privacy." British Journal of Multidisciplinary and Advanced Studies 2.2 (2018): 136-160.
  8. Vemori, Vamsi. "Human-in-the-Loop Moral Decision-Making Frameworks for Situationally Aware Multi-Modal Autonomous Vehicle Networks: An Accessibility-Focused Approach." Journal of Computational Intelligence and Robotics 2.1 (2022): 54-87.
  9. [8] I. Laña, J. J. Sanchez-Medina, E. I. Vlahogianni, and J. Del Ser, "From Data to Actions in Intelligent Transportation Systems: A Prescription of Functional Requirements for Model Actionability," 2021. ncbi.nlm.nih.gov
  10. [9] J. Diego Ortega, P. Natalia Cañas, M. Nieto, O. Otaegui et al., "Challenges of Large-Scale Multi-Camera Datasets for Driver Monitoring Systems," 2022. ncbi.nlm.nih.gov
  11. [10] A. Rahman Sani, M. Ul Hassan, and J. Chen, "Privacy Preserving Machine Learning for Electric Vehicles: A Survey," 2022. [PDF]
  12. [11] C. Hati, G. Kumar, and N. Mahajan, "$bar{B}rightarrow D^{(ast)}tau bar{nu}$ excesses in ALRSM constrained from $B$, $D$ decays and $D^{0}-bar{D}^{0}$ mixing," 2015. [PDF]
  13. [12] F. Berman, E. Cabrera, A. Jebari, and W. Marrakchi, "The impact universe—a framework for prioritizing the public interest in the Internet of Things," 2022. ncbi.nlm.nih.gov
  14. [13] S. A. Abdel Hakeem, H. H. Hussein, and H. W. Kim, "Security Requirements and Challenges of 6G Technologies and Applications," 2022. ncbi.nlm.nih.gov
  15. [14] M. Ul Hassan, M. Husain Rehmani, and J. Chen, "Differential Privacy Techniques for Cyber Physical Systems: A Survey," 2018. [PDF]
  16. [15] B. Carsten Stahl, "Ethical Issues of AI," 2021. ncbi.nlm.nih.gov
  17. [16] S. Blake, "A Simple Method for Computing Some Pseudo-Elliptic Integrals in Terms of Elementary Functions," 2020. [PDF]
  18. [17] A. Acharya, "Are We Ready for Driver-less Vehicles? Security vs. Privacy- A Social Perspective," 2014. [PDF]
  19. [18] F. Zheng, "Efficient Private Machine Learning by Differentiable Random Transformations," 2020. [PDF]
  20. [19] E. Novikova, D. Fomichov, I. Kholod, and E. Filippov, "Analysis of Privacy-Enhancing Technologies in Open-Source Federated Learning Frameworks for Driver Activity Recognition," 2022. ncbi.nlm.nih.gov
  21. [20] Z. Shen and T. Zhong, "Analysis of Application Examples of Differential Privacy in Deep Learning," 2021. ncbi.nlm.nih.gov
  22. [21] A. Vizitiu, C. Ioan Niƫă, A. Puiu, C. Suciu et al., "Applying Deep Neural Networks over Homomorphic Encrypted Medical Data," 2020. ncbi.nlm.nih.gov
  23. [22] A. Qayyum, A. Ijaz, M. Usama, W. Iqbal et al., "Securing Machine Learning in the Cloud: A Systematic Review of Cloud Machine Learning Security," 2020. ncbi.nlm.nih.gov
  24. [23] N. Rizzo, E. Sprissler, Y. Hong, and S. Goel, "Privacy Preserving Driving Style Recognition," 2015. [PDF]
  25. [24] C. Zhang, "State-of-the-Art Approaches to Enhancing Privacy Preservation of Machine Learning Datasets: A Survey," 2024. [PDF]
  26. [25] F. Lang and Y. Zhong, "Application of Personal Information Privacy Protection Based on Machine Learning Algorithm," 2022. ncbi.nlm.nih.gov
  27. [26] F. Ezzeddine, M. Saad, O. Ayoub, D. Andreoletti et al., "Differential Privacy for Anomaly Detection: Analyzing the Trade-off Between Privacy and Explainability," 2024. [PDF]
  28. [27] M. Yang, M. Ding, Y. Qu, W. Ni et al., "Privacy at a Price: Exploring its Dual Impact on AI Fairness," 2024. [PDF]
  29. [28] E. De Cristofaro, "An Overview of Privacy in Machine Learning," 2020. [PDF]
  30. [29] S. Fritz-Morgenthal, B. Hein, and J. Papenbrock, "Financial Risk Management and Explainable, Trustworthy, Responsible AI," 2022. ncbi.nlm.nih.gov
  31. [30] E. Angulo, J. Márquez, and R. Villanueva-Polanco, "Training of Classification Models via Federated Learning and Homomorphic Encryption," 2023. ncbi.nlm.nih.gov
  32. [31] D. Dhinakaran, S. M. Udhaya Sankar, D. Selvaraj, and S. Edwin Raja, "Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration," 2024. [PDF]
  33. [32] E. Rodríguez, B. Otero, and R. Canal, "A Survey of Machine and Deep Learning Methods for Privacy Protection in the Internet of Things," 2023. ncbi.nlm.nih.gov