Publication Type
Journal Article
Version
acceptedVersion
Publication Date
2-2024
Abstract
Recently, evolutionary computation (EC) has experienced significant advancements due to the integration of machine learning, distributed computing, and big data technologies. These developments have led to new research avenues in EC, such as distributed EC and surrogate-assisted EC. While these advancements have greatly enhanced the performance and applicability of EC, they have also raised concerns regarding privacy leakages, specifically the disclosure of optimal results and surrogate models. Consequently, the combination of evolutionary computation and privacy protection becomes an increasing necessity. However, a comprehensive exploration of privacy concerns in evolutionary computation is currently lacking, particularly in terms of identifying the object, motivation, position, and method of privacy protection. To address this gap, this paper aims to discuss three typical optimization paradigms, namely, centralized optimization, distributed optimization, and data-driven optimization, to characterize optimization modes of evolutionary computation and proposes BOOM (i.e., oBject, mOtivation, pOsition, and Method) to sort out privacy concerns related to evolutionary computation. In particular, the centralized optimization paradigm allows clients to outsource optimization problems to a centralized server and obtain optimization solutions from the server. The distributed optimization paradigm exploits the storage and computational power of distributed devices to solve optimization problems. On the other hand, the data-driven optimization paradigm utilizes historical data to address optimization problems without explicit objective functions. Within each of these paradigms, BOOM is used to characterize the object and motivation of privacy protection. Furthermore, this paper discuss the potential privacy-preserving technologies that strike a balance between optimization performance and privacy guarantees. Finally, this paper outlines several new research directions for privacy-preserving evolutionary computation.
Keywords
Centralized optimization, data-driven optimization, distributed optimization, evolutionary computation, privacy protection
Discipline
Databases and Information Systems | Information Security
Publication
IEEE Computational Intelligence Magazine
Volume
19
Issue
1
First Page
66
Last Page
74
ISSN
1556-603X
Identifier
10.1109/MCI.2023.3327892
Publisher
Institute of Electrical and Electronics Engineers
Citation
ZHAO, Bowen; CHEN, Wei-Neng; LI, Xiaoguo; LIU, Ximeng; PEI, Qingqi; and ZHANG, Jun.
When evolutionary computation meets privacy. (2024). IEEE Computational Intelligence Magazine. 19, (1), 66-74.
Available at: https://ink.library.smu.edu.sg/sis_research/8651
Copyright Owner and License
Authors
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1109/MCI.2023.3327892