A General Federated Learning Scheme with Blockchain on Non-IID Data

被引:0
作者
Wu, Hao [1 ,2 ]
Zhao, Shengnan [2 ]
Zhao, Chuan [2 ]
Jing, Shan [1 ,3 ]
机构
[1] Univ Jinan, Sch Informat Sci & Engn, Jinan 250022, Shandong, Peoples R China
[2] Quancheng Lab, Jinan 250103, Peoples R China
[3] Shandong Prov Key Lab Network Based Intelligent C, Jinan 250022, Shandong, Peoples R China
来源
INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I | 2024年 / 14526卷
基金
中国国家自然科学基金;
关键词
Federated learning; Non-IID problem; Data augmentation; Data privacy;
D O I
10.1007/978-981-97-0942-7_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of machine learning has received a lot of attention from the community. Federated learning enables more secure training processes of models in machine learning via local training and parameter interactions of participants. However, participants' data usually shows significant differences, i.e., the characteristics of non-IID, affecting the convergence speed and accuracy of models to a large extent. In this paper, we propose a general federated learning scheme with blockchain to cover the shortage of federated learning caused by non-IID data. Specifically, each participant trains a GAN via local data first and then shares the generator corresponding to the GAN with the assistance of the blockchain. Based on the generator parameters on the blockchain, each participant augments the local data and trains the local model, alleviating a series of problems caused by the non-IID data. The scheme achieves effective training of models while ensuring security. Experimental results show that the proposed scheme can speed up model convergence and improve the model's accuracy simultaneously. In the non-IID scenario, compared with the federated learning benchmark scheme, the accuracy in our scheme can be improved by up to 17%.
引用
收藏
页码:126 / 140
页数:15
相关论文
共 30 条
[1]   Integration of blockchain and federated learning for Internet of Things: Recent advances and future challenges [J].
Ali, Mansoor ;
Karimipour, Hadis ;
Tariq, Muhammad .
COMPUTERS & SECURITY, 2021, 108
[2]   GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models [J].
Chen, Dingfan ;
Yu, Ning ;
Zhang, Yang ;
Fritz, Mario .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :343-362
[3]  
Chen Dingfan, 2020, Advances in Neural Information Processing Systems, V33
[4]  
Collins L, 2021, PR MACH LEARN RES, V139
[5]   Blockchain-Aided Edge Computing Market: Smart Contract and Consensus Mechanisms [J].
Du, Yu ;
Wang, Zhe ;
Li, Jun ;
Shi, Long ;
Jayakody, Dushantha Nalin K. ;
Chen, Quan ;
Chen, Wen ;
Han, Zhu .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (06) :3193-3208
[6]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[7]   The Algorithmic Foundations of Differential Privacy [J].
Dwork, Cynthia ;
Roth, Aaron .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4) :211-406
[8]   A Firm Foundation for Private Data Analysis [J].
Dwork, Cynthia .
COMMUNICATIONS OF THE ACM, 2011, 54 (01) :86-95
[9]   Generative Adversarial Networks [J].
Goodfellow, Ian ;
Pouget-Abadie, Jean ;
Mirza, Mehdi ;
Xu, Bing ;
Warde-Farley, David ;
Ozair, Sherjil ;
Courville, Aaron ;
Bengio, Yoshua .
COMMUNICATIONS OF THE ACM, 2020, 63 (11) :139-144
[10]   Distributed SGD With Flexible Gradient Compression [J].
Iran Thi Phuong ;
Le Trieu Phong .
IEEE ACCESS, 2020, 8 :64707-64717