Professional Documents
Culture Documents
Ai Analytics Ebook
Ai Analytics Ebook
Learning for
AI Analytics
CoSP Executive Handbook What does your business need to make the most of 5G?
IoT has changed AI for good
Edge, cloud computing, and central data centers are all essential to compete in
today’s high-tech world and the Internet of Things (IoT). Living on the edge or in
the cloud might be precarious at first, but the advantages outweigh the risks by
assisting in everything from traffic enforcement to medical research. None of this
can be efficiently accomplished without robust artificial intelligence (AI) and an
intuitive learning model.
To be trusted and effective, edge, cloud, and data center computing must
have the AI modeling and analytics that guarantee data privacy, security,
and accuracy. All algorithms used to process data must have embedded
security protocols to keep data safe and data owners from being
compromised. This is where distributed federated learning excels.
Federated learning was first introduced by the Google1 think tank as the
future for AI analytics. In 2016, Google debuted TensorFlow Federated
(TFF).2 This was a user-friendly implementation of federated learning.
Today’s business is hybrid, with remote and on-premises computing
demanded by users in many business sectors, which means AI must be
collaborative. Federated learning makes edge computing a viable way
for businesses to stay ahead of the curve and the competition. It does it
securely without exposing user data.
2 1
1 1
2
2
• Prevention of attacks against memory content • The risk of side-channel attacks by hackers
is also reduced. SGX helps isolate code and
• Option for hardware-based attestation
data from outside incursions.
Utilizing a federated learning architecture secured by technologies • Intel’s founding role in the Confidential
such as Intel SGX preserves owner data and enables training of Computing Consortium helps to quickly
algorithms on data with a flexible topology. Online availability is identify and mitigate areas where attacks can
continuous since training is done offline with results returned later. occur. Security vulnerabilities are regularly
Federated learning applications are becoming the most widely used updated.
and accepted privacy preservation technique in industry and medical
AI applications.12
Hardware-based security ‒ Protect data at Data backup – Create an exact copy of data
every layer of the IT infrastructure, not just and store it in a secure location where it can
the software. Intel® hardware-enabled security only be accessed by authorized administrators.
capabilities include protections built right Protect the backup and maintain a documented
into the silicon, creating trusted infrastructure backup policy.
helps to secure hardware, firmware, operating
systems, applications, networks, and the cloud.
Obtaining regulatory approval for clinical AI algorithms requires a varied set of diverse and detailed clinical
data that develops, validates, and optimizes unbiased algorithm models. These algorithms should be able to
consistently perform across wide-ranging patient populations, socioeconomic groups, and geographic locations.
They also need to be equipment agnostic. Because of these complicated parameters and limited data access,
few research groups or healthcare organizations have access to the high-quality data needed to accomplish this.
Federated learning expands their reach.
for the early detection of sensitive data leaving individual collaborators. The project is a three-
year, USD 1.2 million grant awarded to the Center for Biomedical Image
brain tumors, but it will
Computing and Analytics (CBICA) at UPenn.
require more data than
any single medical center Research and healthcare institutions from the US, the UK, Germany, the
holds to reach its full Netherlands, Switzerland, and India are participating in the study, which
potential.” uses a distributed learning approach to enable them to collaborate on
Money laundering is a nagging problem for financial institutions, with over 95 percent of anti‒money laundering
(AML) alerts offering false positives. Illicit actors profit by laundering trillions of dollars annually, despite massive
efforts to track and stop financial crime. The problem is very complicated:
Financial institutions have Concerns over data privacy Regulatory pressures instituted Compliance costs to financial
information-sharing constraints on a global basis have further by the Currency and Foreign institutions are over a hundred
because they work within compounded these barriers, Transactions Reporting Act of times greater than recovered
an existing AML/CF financial with no way to facilitate 1970 (the Bank Secrecy Act) and criminal funds, and banks,
governance system that interbank information sharing. expanded regulations in Title III taxpayers, and depositors are
operates as islands. This of the USA Patriot Act demand penalized more than criminals
means they work in isolation to financial institutions understand who concoct successful
identify and report a suspicious and manage their crime risk. laundering schemes.
customer or transaction to
a financial intelligence unit.
This type of system does not
encourage information sharing,
collective learning, or dynamic
feedback among enterprises.
Do Dozer/Intel SGX
ze
r/ GX
Int telS
el®
SG r / In
ze
X Do
Alg
o1 Algo 1.1 1 +∆
.4
= Algo
Alg =
.1
o1
.3 + lgo1
∆ A
Dozer/Intel SGX Algo 1.3 = Algo 1.2 +∆ Dozer/Intel SGX Algo 1.2 = Algo 1.1 +∆ Dozer/Intel SGX
Algo factory
BANK 4 BANK 3
Federated learning with Intel® SGX guarantees a level of security and flexibility
in AI analytics that centralized learning will never provide. Key advantages
include retention of sovereignty, flexible topology, collaboration, data privacy
retention, and security through homomorphic encryption. As our world
changes and technology advances, federated learning will be the logical choice.
What are you waiting for? Good things come to those who are first in line.
Find more information at intel.com/ai.
© Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands may be claimed as the property of others.
US/07/2021/PDF/JH/CMD