EconPapers    
Economics at your fingertips  
 

Security in Machine Learning (ML) Workflows

Dinesh Reddy Chittibala () and Srujan Reddy Jabbireddy ()

International Journal of Computing and Engineering, 2024, vol. 5, issue 1, 52 - 63

Abstract: Purpose: This paper addresses the comprehensive security challenges inherent in the lifecycle of machine learning (ML) systems, including data collection, processing, model training, evaluation, and deployment. The imperative for robust security mechanisms within ML workflows has become increasingly paramount in the rapidly advancing field of ML, as these challenges encompass data privacy breaches, unauthorized access, model theft, adversarial attacks, and vulnerabilities within the computational infrastructure. Methodology: To counteract these threats, we propose a holistic suite of strategies designed to enhance the security of ML workflows. These strategies include advanced data protection techniques like anonymization and encryption, model security enhancements through adversarial training and hardening, and the fortification of infrastructure security via secure computing environments and continuous monitoring. Findings: The multifaceted nature of security challenges in ML workflows poses significant risks to the confidentiality, integrity, and availability of ML systems, potentially leading to severe consequences such as financial loss, erosion of trust, and misuse of sensitive information. Unique Contribution to Theory, Policy and Practice: Additionally, this paper advocates for the integration of legal and ethical considerations into a proactive and layered security approach, aiming to mitigate the risks associated with ML workflows effectively. By implementing these comprehensive security measures, stakeholders can significantly reinforce the trustworthiness and efficacy of ML applications across sensitive and critical sectors, ensuring their resilience against an evolving landscape of threats.

Keywords: Data Privacy; Model Hardening; Encryption; Secure Computing; Infrastructure Security (search for similar items in EconPapers)
Date: 2024
References: Add references at CitEc
Citations:

Downloads: (external link)
https://carijournals.org/journals/index.php/IJCE/article/view/1714/2088 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:bhx:ojijce:v:5:y:2024:i:1:p:52-63:id:1714

Access Statistics for this article

More articles in International Journal of Computing and Engineering from CARI Journals Limited
Bibliographic data for series maintained by Chief Editor ().

 
Page updated 2025-03-19
Handle: RePEc:bhx:ojijce:v:5:y:2024:i:1:p:52-63:id:1714