Privacy and Integrity Preserving Training Using Trusted Hardware.
Hanieh HashemiYongqin WangMurali AnnavaramPublished in: CoRR (2021)
Keyphrases
- trusted computing
- outsourced databases
- real time
- low cost
- training set
- training process
- privacy preserving
- hardware and software
- remote attestation
- computing platform
- data confidentiality
- data protection
- third party
- hardware implementation
- cloud computing
- computing systems
- private information
- training samples
- supervised learning
- online learning
- computer software
- data integrity
- privacy protection
- security issues