
PRIVACY-PRESERVING MACHINE LEARNING: TECHNIQUES, CHALLENGES, AND FUTURE DIRECTIONS IN SAFEGUARDING PERSONAL DATA MANAGEMENT
Ashequr Rahman , Doctoral in Business Administration, Westcliff University, California, USA Asif Iqbal , Masters in Business Administration Management Information System, International American University, Los Angeles, California Emon Ahmed , Masters in Science Engineering Management, Westcliff University, California, USA Tanvirahmedshuvo , Masters in Business Administration, Business Analytics, International American University, Los Angeles, USA Md Risalat Hossain Ontor , Masters in Business Administration, Management Information System, International American University, Los Angeles, CaliforniaAbstract
This paper explores the intersection of machine learning and personal data privacy, examining the challenges and solutions for preserving privacy in data-driven systems. As machine learning algorithms increasingly rely on large datasets, concerns about data leakage and breaches have intensified. To address these issues, we investigate various privacy-preserving techniques, including differential privacy, federated learning, adversarial training, and data anonymization. The findings highlight the effectiveness of these methods in protecting sensitive information while maintaining model performance. However, trade-offs in accuracy, computational efficiency, and model interpretability remain significant challenges. The paper also emphasizes the need for transparent and explainable models to ensure ethical data use and foster trust in AI systems. Ultimately, the study concludes that while privacy-preserving machine learning methods show great promise, ongoing research is essential to balance privacy and performance in future applications.
Keywords
Machine learning, data privacy, differential privacy
References
Chowdhury, M. S., Shak, M. S., Devi, S., Miah, M. R., Al Mamun, A., Ahmed, E., ... & Mozumder, M. S. A. (2024). Optimizing E-Commerce Pricing Strategies: A Comparative Analysis of Machine Learning Models for Predicting Customer Satisfaction. The American Journal of Engineering and Technology, 6(09), 6-17.
Dwork, C., McSherry, F., Nissim, K., & Smith, A. (2006). Calibrating noise to sensitivity in private data analysis. Theory of Cryptography, 265-284. https://doi.org/10.1007/11681878_14
Abadi, M., Chu, A., Goodfellow, I., McMahan, H. B., Mironov, I., & Talwar, K. (2016). Deep learning with differential privacy. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 308-318. https://doi.org/10.1145/2976749.2978318
Zeng, Y., Zhang, X., & Zhou, M. (2020). A survey of privacy-preserving machine learning: Threats, techniques, and applications. IEEE Access, 8, 29699-29712. https://doi.org/10.1109/ACCESS.2020.2989600
Narayanan, A., Bonneau, J., Anderson, J., & Schechter, S. (2008). Privacy and security in online social networks. 2008 IEEE Security and Privacy Workshops, 13-20. https://doi.org/10.1109/SPW.2008.14
McMahan, B., Moore, E., Ramage, D., & Y. (2017). Federated learning: Collaborative machine learning without centralized training data. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, 1-12. https://arxiv.org/abs/1610.02527
Hard, A., Beaufays, F., McMahan, B., & others. (2018). Federated learning for mobile keyboard prediction. Proceedings of the 1st International Conference on Machine Learning, 1-8. https://arxiv.org/abs/1811.03604
Ribeiro, M. T., Singh, S., & Guestrin, C. (2016). Why should I trust you? Explaining the predictions of any classifier. Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 1135-1144. https://doi.org/10.1145/2939672.2939778
Carlini, N., & Wagner, D. (2017). Towards evaluating the robustness of neural networks. 2017 IEEE Symposium on Security and Privacy, 39-57. https://doi.org/10.1109/SP.2017.49
Shokri, R., Stronati, M., Song, L., & Shmatikov, V. (2017). Membership inference attacks against machine learning models. Proceedings of the 2017 IEEE Symposium on Security and Privacy, 3-18. https://doi.org/10.1109/SP.2017.41
Md Habibur Rahman, Ashim Chandra Das, Md Shujan Shak, Md Kafil Uddin, Md Imdadul Alam, Nafis Anjum, Md Nad Vi Al Bony, & Murshida Alam. (2024). TRANSFORMING CUSTOMER RETENTION IN FINTECH INDUSTRY THROUGH PREDICTIVE ANALYTICS AND MACHINE LEARNING. The American Journal of Engineering and Technology, 6(10), 150–163. https://doi.org/10.37547/tajet/Volume06Issue10-17
Nimmagadda, V. S. P. (2021). Artificial Intelligence and Blockchain Integration for Enhanced Security in Insurance: Techniques, Models, and Real-World Applications. African Journal of Artificial Intelligence and Sustainable Development, 1(2), 187-224.
Zhao, L., Zhang, Y., Chen, X., & Huang, Y. (2021). A reinforcement learning approach to supply chain operations management: Review, applications, and future directions. Computers & Operations Research, 132, 105306. https://doi.org/10.1016/j.cor.2021.105306
Md Al-Imran, Eftekhar Hossain Ayon, Md Rashedul Islam, Fuad Mahmud, Sharmin Akter, Md Khorshed Alam, Md Tarek Hasan, Sadia Afrin, Jannatul Ferdous Shorna, & Md Munna Aziz. (2024). TRANSFORMING BANKING SECURITY: THE ROLE OF DEEP LEARNING IN FRAUD DETECTION SYSTEMS. The American Journal of Engineering and Technology, 6(11), 20–32. https://doi.org/10.37547/tajet/Volume06Issue11-04
Shinde, N. K., Seth, A., & Kadam, P. (2023). Exploring the synergies: a comprehensive survey of blockchain integration with artificial intelligence, machine learning, and iot for diverse applications. Machine Learning and Optimization for Engineering Design, 85-119.
Dibaei, M., Zheng, X., Xia, Y., Xu, X., Jolfaei, A., Bashir, A. K., ... & Vasilakos, A. V. (2021). Investigating the prospect of leveraging blockchain and machine learning to secure vehicular networks: A survey. IEEE Transactions on Intelligent Transportation Systems, 23(2), 683-700.
Mozumder, M. A. S., Nguyen, T. N., Devi, S., Arif, M., Ahmed, M. P., Ahmed, E., ... & Uddin, A. (2024). Enhancing Customer Satisfaction Analysis Using Advanced Machine Learning Techniques in Fintech Industry. J. Comput. Sci. Technol. Stud, 6, 35-41.
Sweet, M. M. R., Arif, M., Uddin, A., Sharif, K. S., Tusher, M. I., Devi, S., ... & Sarkar, M. A. I. (2024). Credit risk assessment using statistical and machine learning: Basic methodology and risk modeling applications. International Journal on Computational Engineering, 1(3), 62-67.
Arif, M., Ahmed, M. P., Al Mamun, A., Uddin, M. K., Mahmud, F., Rahman, T., ... & Helal, M. (2024). DYNAMIC PRICING IN FINANCIAL TECHNOLOGY: EVALUATING MACHINE LEARNING SOLUTIONS FOR MARKET ADAPTABILITY. International Interdisciplinary Business Economics Advancement Journal, 5(10), 13-27.
Mozumder, M. A. S., Nguyen, T. N., Devi, S., Arif, M., Ahmed, M. P., Ahmed, E., ... & Uddin, A. (2024). Enhancing Customer Satisfaction Analysis Using Advanced Machine Learning Techniques in Fintech Industry. J. Comput. Sci. Technol. Stud, 6, 35-41.
Tauhedur Rahman, Md Kafil Uddin, Biswanath Bhattacharjee, Md Siam Taluckder, Sanjida Nowshin Mou, Pinky Akter, Md Shakhaowat Hossain, Md Rashel Miah, & Md Mohibur Rahman. (2024). BLOCKCHAIN APPLICATIONS IN BUSINESS OPERATIONS AND SUPPLY CHAIN MANAGEMENT BY MACHINE LEARNING. International Journal of Computer Science & Information System, 9(11), 17–30. https://doi.org/10.55640/ijcsis/Volume09Issue11-03
Hisham, S., Makhtar, M., & Aziz, A. A. (2022). Combining multiple classifiers using ensemble method for anomaly detection in blockchain networks: A comprehensive review. International Journal of Advanced Computer Science and Applications, 13(8).
Md Jamil Ahmmed, Md Mohibur Rahman, Ashim Chandra Das, Pritom Das, Tamanna Pervin, Sadia Afrin, Sanjida Akter Tisha, Md Mehedi Hassan, & Nabila Rahman. (2024). COMPARATIVE ANALYSIS OF MACHINE LEARNING ALGORITHMS FOR BANKING FRAUD DETECTION: A STUDY ON PERFORMANCE, PRECISION, AND REAL-TIME APPLICATION. International Journal of Computer Science & Information System, 9(11), 31–44. https://doi.org/10.55640/ijcsis/Volume09Issue11-04
Bhandari, A., Cherukuri, A. K., & Kamalov, F. (2023). Machine learning and blockchain integration for security applications. In Big Data Analytics and Intelligent Systems for Cyber Threat Intelligence (pp. 129-173). River Publishers.
Diro, A., Chilamkurti, N., Nguyen, V. D., & Heyne, W. (2021). A comprehensive study of anomaly detection schemes in IoT networks using machine learning algorithms. Sensors, 21(24), 8320.
Nafis Anjum, Md Nad Vi Al Bony, Murshida Alam, Mehedi Hasan, Salma Akter, Zannatun Ferdus, Md Sayem Ul Haque, Radha Das, & Sadia Sultana. (2024). COMPARATIVE ANALYSIS OF SENTIMENT ANALYSIS MODELS ON BANKING INVESTMENT IMPACT BY MACHINE LEARNING ALGORITHM. International Journal of Computer Science & Information System, 9(11), 5–16. https://doi.org/10.55640/ijcsis/Volume09Issue11-02
Shahbazi, Z., & Byun, Y. C. (2021). Integration of blockchain, IoT and machine learning for multistage quality control and enhancing security in smart manufacturing. Sensors, 21(4), 1467.
Md Nur Hossain, Nafis Anjum, Murshida Alam, Md Habibur Rahman, Md Siam Taluckder, Md Nad Vi Al Bony, S M Shadul Islam Rishad, & Afrin Hoque Jui. (2024). PERFORMANCE OF MACHINE LEARNING ALGORITHMS FOR LUNG CANCER PREDICTION: A COMPARATIVE STUDY. International Journal of Medical Science and Public Health Research, 5(11), 41–55. https://doi.org/10.37547/ijmsphr/Volume05Issue11-05
Article Statistics
Downloads
Copyright License
Copyright (c) 2024 Ashequr Rahman, Asif Iqbal, Emon Ahmed, Tanvirahmedshuvo, Md Risalat Hossain Ontor

This work is licensed under a Creative Commons Attribution 4.0 International License.