TY - JOUR
T1 - When Machine Learning Meets Privacy in 6G
T2 - A Survey
AU - Sun, Yuanyuan
AU - Liu, Jiajia
AU - Wang, Jiadai
AU - Cao, Yurui
AU - Kato, Nei
N1 - Funding Information:
Manuscript received May 11, 2020; accepted July 13, 2020. Date of publication July 23, 2020; date of current version November 20, 2020. This work was supported in part by National Natural Science Foundation of China under Grant 61771374, Grant 61771373, Grant 61801360, and Grant 61601357; in part by Natural Science Basic Research Program of Shaanxi under Grant 2020JC-15 and Grant 2020JM-109; in part by Fundamental Research Funds for the Central Universities under Grant 3102019PY005, Grant 31020190QD040, and Grant 31020200QD010; in part by Special Funds for Central Universities Construction of World-Class Universities (Disciplines) and Special Development Guidance under Grant 06390-20GH020114; and in part by the China 111 Project under Grant B16037. (Corresponding author: Jiajia Liu.) Yuanyuan Sun, Jiadai Wang, and Yurui Cao are with the State Key Laboratory of Integrated Services Networks, School of Cyber Engineering, Xidian University, Xi’an 710071, China.
Publisher Copyright:
© 1998-2012 IEEE.
PY - 2020/10/1
Y1 - 2020/10/1
N2 - The rapid-developing Artificial Intelligence (AI) technology, fast-growing network traffic, and emerging intelligent applications (e.g., autonomous driving, virtual reality, etc.) urgently require a new, faster, more reliable and flexible network form. At this time, researchers in both industry and academia have turned their attention to the sixth generation (6G) communication networks. In the 6G vision, various intelligent application scenarios that utilize Machine Learning (ML) technology (the most important branch of AI) will bring rich heterogeneous connections, as well as massive information storage and operations. When ML meets 6G, new opportunities will emerge along with numerous privacy challenges. On one hand, a secure ML structure, or the correct application of ML, can protect privacy in 6G. On the other hand, ML may be attacked or abused, resulting in privacy violation. It is worth noting that the alliance between 6G and ML may also be a double-edged sword in many cases, rather than absolutely infringe or protect privacy. Therefore, based on lots of existing meaningful works, this paper aims to provide a comprehensive survey of ML and privacy in 6G, with a view to further promoting the development of 6G and privacy protection technologies.
AB - The rapid-developing Artificial Intelligence (AI) technology, fast-growing network traffic, and emerging intelligent applications (e.g., autonomous driving, virtual reality, etc.) urgently require a new, faster, more reliable and flexible network form. At this time, researchers in both industry and academia have turned their attention to the sixth generation (6G) communication networks. In the 6G vision, various intelligent application scenarios that utilize Machine Learning (ML) technology (the most important branch of AI) will bring rich heterogeneous connections, as well as massive information storage and operations. When ML meets 6G, new opportunities will emerge along with numerous privacy challenges. On one hand, a secure ML structure, or the correct application of ML, can protect privacy in 6G. On the other hand, ML may be attacked or abused, resulting in privacy violation. It is worth noting that the alliance between 6G and ML may also be a double-edged sword in many cases, rather than absolutely infringe or protect privacy. Therefore, based on lots of existing meaningful works, this paper aims to provide a comprehensive survey of ML and privacy in 6G, with a view to further promoting the development of 6G and privacy protection technologies.
KW - 6G
KW - communication
KW - double-edged sword
KW - machine learning
KW - Privacy
KW - protection
KW - violation
UR - http://www.scopus.com/inward/record.url?scp=85096771123&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85096771123&partnerID=8YFLogxK
U2 - 10.1109/COMST.2020.3011561
DO - 10.1109/COMST.2020.3011561
M3 - Review article
AN - SCOPUS:85096771123
SN - 1553-877X
VL - 22
SP - 2694
EP - 2724
JO - IEEE Communications Surveys and Tutorials
JF - IEEE Communications Surveys and Tutorials
IS - 4
M1 - 9146540
ER -