When Evolutionary Computation Meets Privacy

Recently, evolutionary computation (EC) has been promoted by machine learning, distributed computing, and big data technologies, resulting in new research directions of EC like distributed EC and surrogate-assisted EC. These advances have significantly improved the performance and the application scope of EC, but also trigger privacy leakages, such as the leakage of optimal results and surrogate model. Accordingly, evolutionary computation combined with privacy protection is becoming an emerging topic. However, privacy concerns in evolutionary computation lack a systematic exploration, especially for the object, motivation, position, and method of privacy protection. To this end, in this paper, we discuss three typical optimization paradigms (i.e., \textit{centralized optimization, distributed optimization, and data-driven optimization}) to characterize optimization modes of evolutionary computation and propose BOOM to sort out privacy concerns in evolutionary computation. Specifically, the centralized optimization paradigm allows clients to outsource optimization problems to the centralized server and obtain optimization solutions from the server. While the distributed optimization paradigm exploits the storage and computational power of distributed devices to solve optimization problems. Also, the data-driven optimization paradigm utilizes data collected in history to tackle optimization problems lacking explicit objective functions. Particularly, this paper adopts BOOM to characterize the object and motivation of privacy protection in three typical optimization paradigms and discusses potential privacy-preserving technologies balancing optimization performance and privacy guarantees in three typical optimization paradigms. Furthermore, this paper attempts to foresee some new research directions of privacy-preserving evolutionary computation.

[1]  K. Lai,et al.  PriMPSO: A Privacy-Preserving Multiagent Particle Swarm Optimization Algorithm. , 2022, IEEE transactions on cybernetics.

[2]  J. Kůdela A critical problem in benchmarking and analysis of evolutionary computation methods , 2022, Nat. Mac. Intell..

[3]  Yaochu Jin,et al.  A Secure Federated Data-Driven Evolutionary Multi-objective Optimization Algorithm , 2022, ArXiv.

[4]  Ximeng Liu,et al.  Evolution as a Service: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization , 2022, ArXiv.

[5]  Sergio Pastrana,et al.  SoK: Privacy-Preserving Computation Techniques for Deep Learning , 2021, Proc. Priv. Enhancing Technol..

[6]  Petr Bujok,et al.  Differential Evolution with Distance-based Mutation-selection Applied to CEC 2021 Single Objective Numerical Optimisation , 2021, 2021 IEEE Congress on Evolutionary Computation (CEC).

[7]  Héctor-Gabriel Acosta-Mesa,et al.  A Review on Convolutional Neural Network Encodings for Neuroevolution , 2021, IEEE Transactions on Evolutionary Computation.

[8]  Zhi-hui Zhan,et al.  A New Evolutionary Computation Framework for Privacy-Preserving Optimization , 2021, 2021 13th International Conference on Advanced Computational Intelligence (ICACI).

[9]  Jun Zhang,et al.  A Classifier-Assisted Level-Based Learning Swarm Optimizer for Expensive Optimization , 2020, IEEE Transactions on Evolutionary Computation.

[10]  Qi Li,et al.  Attribute-based Encryption for Cloud Computing Access Control , 2020, ACM Comput. Surv..

[11]  Jun Zhang,et al.  A Distributed Swarm Optimizer With Adaptive Communication for Large-Scale Optimization , 2020, IEEE Transactions on Cybernetics.

[12]  Abdelouahid Derhab,et al.  A review of privacy-preserving techniques for deep learning , 2020, Neurocomputing.

[13]  Fenghua Li,et al.  Privacy Computing: Concept, Computing Framework And Future Development Trends , 2019, IACR Cryptol. ePrint Arch..

[14]  Dan Guo,et al.  Data-Driven Evolutionary Optimization: An Overview and Case Studies , 2019, IEEE Transactions on Evolutionary Computation.

[15]  Zhiqiang Lin,et al.  Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[16]  Hubert Eichner,et al.  Towards Federated Learning at Scale: System Design , 2019, SysML.

[17]  Payman Mohassel,et al.  SecureML: A System for Scalable Privacy-Preserving Machine Learning , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[18]  Qingfu Zhang,et al.  A Self-Organizing Multiobjective Evolutionary Algorithm , 2016, IEEE Transactions on Evolutionary Computation.

[19]  Qingfu Zhang,et al.  Distributed evolutionary algorithms and their models: A survey of the state-of-the-art , 2015, Appl. Soft Comput..

[20]  Florian Kerschbaum,et al.  Privacy-Preserving Multi-Objective Evolutionary Algorithms , 2010, PPSN.

[21]  Shuguo Han,et al.  Privacy-Preserving Genetic Algorithms for Rule Discovery , 2007, DaWaK.

[22]  Erkam Uzun,et al.  Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search , 2021, USENIX Security Symposium.

[23]  Leqi Jiang,et al.  Privacy-Preserving Genetic Algorithm Outsourcing in Cloud Computing , 2020 .

[24]  Ruxu Du,et al.  Micro manufacturing techniques and applications : selected, peer reviewed papers from the 2nd International Forum on Micro Manufacturing (IFMM2012), December 17-18, 2012, South China University of Technology, Guangzhou, China , 2013 .