Secure Decentralized Aggregation to Prevent Membership Privacy Leakage in Edge-Based Federated Learning

被引:6
作者
Shen, Meng [1 ]
Wang, Jing [1 ]
Zhang, Jie [2 ]
Zhao, Qinglin [3 ]
Peng, Bohan [1 ]
Wu, Tong [1 ]
Zhu, Liehuang [1 ]
Xu, Ke [4 ]
机构
[1] Beijing Inst Technol, Sch Cyberspace Sci & Technol, Beijing 100081, Peoples R China
[2] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[3] Macau Univ Sci & Technol, Sch Comp Sci & Engn, Macau 999078, Peoples R China
[4] Tsinghua Univ, Dept Comp Sci, Beijing 100084, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2024年 / 11卷 / 03期
关键词
Computational modeling; Privacy; Data models; Training; Blockchains; Cryptography; Servers; Federated learning; privacy preservation; decentralized aggregation; consortium blockchain;
D O I
10.1109/TNSE.2024.3360311
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Federated Learning (FL) is a machine learning approach that enables multiple users to share their local models for the aggregation of a global model, protecting data privacy by avoiding the sharing of raw data. However, frequent parameter sharing between users and the aggregator can incur high risk of membership privacy leakage. In this paper, we propose LiPFed, a computationally lightweight privacy preserving FL scheme using secure decentralized aggregation for edge networks. Under this scheme, we ensure privacy preservation on the aggregation side, and promote lightweight computation on the user side. By incorporating blockchain and additive secret sharing algorithm, we effectively protect the membership privacy of both local models and global models. Furthermore, the secure decentralized aggregation mechanism safeguards against potential compromises of the aggregator. Meanwhile, smart contract is introduced to identify malicious models uploaded by edge nodes and return trustworthy global models to users. Rigorous security analysis shows the effectiveness of this scheme in privacy preservation. Extensive experiments verify that LiPFed outperforms the state-of-the-art schemes in terms of training efficiency, model accuracy, and privacy preservation.
引用
收藏
页码:3105 / 3119
页数:15
相关论文
共 32 条
[1]  
Avent B, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P747
[2]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[3]   ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation [J].
Demmler, Daniel ;
Schneider, Thomas ;
Zohner, Michael .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[4]  
Fan Mo, 2021, MobiSys '21: Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, P94, DOI 10.1145/3458864.3466628
[5]  
Geyer Robin C., DIFFERENTIALLY PRIVA
[6]   Recent Advances on Federated Learning for Cybersecurity and Cybersecurity for Federated Learning for Internet of Things [J].
Ghimire, Bimal ;
Rawat, Danda B. .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) :8229-8249
[7]   Introduction and Preliminaries [J].
不详 .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2005, 1 (01) :1-124
[8]  
Goldreich Oded., 2009, FDN CRYPTOGRAPHY, V2
[9]  
Hard A, 2019, Arxiv, DOI [arXiv:1811.03604, 10.48550/ARXIV.1811.03604]
[10]   Deep Residual Learning for Image Recognition [J].
He, Kaiming ;
Zhang, Xiangyu ;
Ren, Shaoqing ;
Sun, Jian .
2016 IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2016, :770-778