Challenges
Each privacy preservation approach has its drawbacks. Cryptographic methods guarantee a high level of privacy but suffer from significant efficiency drawbacks and may not defend against membership inference attacks. Differential privacy and adversarial regularization mitigate privacy attacks to some degree without introducing additional computation costs but may impact model performance. These challenges are often mutually incompatible. Furthermore, the strengths of these techniques can also be double-edged; cryptographic approaches prevent data leakage in communication but also hinder data auditing, potentially facilitating backdoor attacks and data poisoning. To mitigate these challenges, multiple techniques are often used together, with federated learning serving as a backbone to integrate with other techniques such as differential privacy, MPC, and cryptographic methods. Some studies introduce trusted third parties to address efficiency challenges.
DP
Lower
Similar
Low
FL
Similar
Sligntly slower
High
Gradient leakage
FHE
Much lower
Much slower
Low
MIA
TEE
Same
Much slower
Low
MIA
MPC
Same
Much slower
Very high
MIA
Last updated