Home > Research > Publications & Outputs > Securing Machine Learning (ML) in the Cloud

Electronic data

  • Qayyum2020securingcloudml

    Submitted manuscript, 1.9 MB, PDF document

Links

Text available via DOI:

View graph of relations

Securing Machine Learning (ML) in the Cloud: A Systematic Review of Cloud ML Security

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Securing Machine Learning (ML) in the Cloud: A Systematic Review of Cloud ML Security. / Qayyum, Adnan; Aneeqa, Ijaz; Usama, Muhammad et al.
In: Frontiers in Big Data, Vol. 3, 587139, 12.11.2020.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Qayyum, A, Aneeqa, I, Usama, M, Iqbal, W, Qadir, J, Elkhatib, Y & Al-Fuqaha, A 2020, 'Securing Machine Learning (ML) in the Cloud: A Systematic Review of Cloud ML Security', Frontiers in Big Data, vol. 3, 587139. https://doi.org/10.3389/fdata.2020.587139

APA

Qayyum, A., Aneeqa, I., Usama, M., Iqbal, W., Qadir, J., Elkhatib, Y., & Al-Fuqaha, A. (2020). Securing Machine Learning (ML) in the Cloud: A Systematic Review of Cloud ML Security. Frontiers in Big Data, 3, Article 587139. https://doi.org/10.3389/fdata.2020.587139

Vancouver

Qayyum A, Aneeqa I, Usama M, Iqbal W, Qadir J, Elkhatib Y et al. Securing Machine Learning (ML) in the Cloud: A Systematic Review of Cloud ML Security. Frontiers in Big Data. 2020 Nov 12;3:587139. doi: 10.3389/fdata.2020.587139

Author

Qayyum, Adnan ; Aneeqa, Ijaz ; Usama, Muhammad et al. / Securing Machine Learning (ML) in the Cloud : A Systematic Review of Cloud ML Security. In: Frontiers in Big Data. 2020 ; Vol. 3.

Bibtex

@article{5d849011fc604948bc4311210e0b00cb,
title = "Securing Machine Learning (ML) in the Cloud: A Systematic Review of Cloud ML Security",
abstract = "With the advances in machine learning (ML) and deep learning (DL) techniques, and the potency of cloud computing in offering services efficiently and cost-effectively, Machine Learning as a Service (MLaaS) cloud platforms have become popular. In addition, there is increasing adoption of third-party cloud services for outsourcing training of DL models, which requires substantial costly computational resources (e.g., high-performance graphics processing units (GPUs)). Such widespread usage of cloud-hosted ML/DL services opens a wide range of attack surfaces for adversaries to exploit the ML/DL system to achieve malicious goals. In this article, we conduct a systematic evaluation of literature of cloud-hosted ML/DL models along both the important dimensions—attacks and defenses—related to their security. Our systematic review identified a total of 31 related articles out of which 19 focused on attack, six focused on defense, and six focused on both attack and defense. Our evaluation reveals that there is an increasing interest from the research community on the perspective of attacking and defending different attacks on Machine Learning as a Service platforms. In addition, we identify the limitations and pitfalls of the analyzed articles and highlight open research issues that require further investigation.",
author = "Adnan Qayyum and Ijaz Aneeqa and Muhammad Usama and Waleed Iqbal and Junaid Qadir and Yehia Elkhatib and Ala Al-Fuqaha",
year = "2020",
month = nov,
day = "12",
doi = "10.3389/fdata.2020.587139",
language = "English",
volume = "3",
journal = "Frontiers in Big Data",
issn = "2624-909X",
publisher = "Frontiers Media S.A.",

}

RIS

TY - JOUR

T1 - Securing Machine Learning (ML) in the Cloud

T2 - A Systematic Review of Cloud ML Security

AU - Qayyum, Adnan

AU - Aneeqa, Ijaz

AU - Usama, Muhammad

AU - Iqbal, Waleed

AU - Qadir, Junaid

AU - Elkhatib, Yehia

AU - Al-Fuqaha, Ala

PY - 2020/11/12

Y1 - 2020/11/12

N2 - With the advances in machine learning (ML) and deep learning (DL) techniques, and the potency of cloud computing in offering services efficiently and cost-effectively, Machine Learning as a Service (MLaaS) cloud platforms have become popular. In addition, there is increasing adoption of third-party cloud services for outsourcing training of DL models, which requires substantial costly computational resources (e.g., high-performance graphics processing units (GPUs)). Such widespread usage of cloud-hosted ML/DL services opens a wide range of attack surfaces for adversaries to exploit the ML/DL system to achieve malicious goals. In this article, we conduct a systematic evaluation of literature of cloud-hosted ML/DL models along both the important dimensions—attacks and defenses—related to their security. Our systematic review identified a total of 31 related articles out of which 19 focused on attack, six focused on defense, and six focused on both attack and defense. Our evaluation reveals that there is an increasing interest from the research community on the perspective of attacking and defending different attacks on Machine Learning as a Service platforms. In addition, we identify the limitations and pitfalls of the analyzed articles and highlight open research issues that require further investigation.

AB - With the advances in machine learning (ML) and deep learning (DL) techniques, and the potency of cloud computing in offering services efficiently and cost-effectively, Machine Learning as a Service (MLaaS) cloud platforms have become popular. In addition, there is increasing adoption of third-party cloud services for outsourcing training of DL models, which requires substantial costly computational resources (e.g., high-performance graphics processing units (GPUs)). Such widespread usage of cloud-hosted ML/DL services opens a wide range of attack surfaces for adversaries to exploit the ML/DL system to achieve malicious goals. In this article, we conduct a systematic evaluation of literature of cloud-hosted ML/DL models along both the important dimensions—attacks and defenses—related to their security. Our systematic review identified a total of 31 related articles out of which 19 focused on attack, six focused on defense, and six focused on both attack and defense. Our evaluation reveals that there is an increasing interest from the research community on the perspective of attacking and defending different attacks on Machine Learning as a Service platforms. In addition, we identify the limitations and pitfalls of the analyzed articles and highlight open research issues that require further investigation.

U2 - 10.3389/fdata.2020.587139

DO - 10.3389/fdata.2020.587139

M3 - Journal article

VL - 3

JO - Frontiers in Big Data

JF - Frontiers in Big Data

SN - 2624-909X

M1 - 587139

ER -