FVFL: A Flexible and Verifiable Privacy-Preserving Federated Learning Scheme

被引:6
作者
Wang, Gang [1 ]
Zhou, Li [1 ]
Li, Qingming [2 ]
Yan, Xiaoran [1 ]
Liu, Ximeng [3 ]
Wu, Yuncheng [4 ]
机构
[1] Zhejiang Lab, Hangzhou 310000, Peoples R China
[2] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
[3] Fuzhou Univ, Coll Comp & Big Data, Key Lab Informat Secur Network Syst, Fuzhou 310058, Peoples R China
[4] Natl Univ Singapore, Sch Comp, Singapore 117417, Singapore
关键词
Federated learning; Security; Servers; Cryptography; Reliability; Interpolation; Threat modeling; Deep learning; federated learning; privacy-preserving; verifiable; SECURE;
D O I
10.1109/JIOT.2024.3385479
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of deep learning, people are more and more concerned about the security of data. Federated learning can solve the problem of data island, but it also brings more serious data privacy problems. Furthermore, in the process of multisource data collaboration, the efficiency of the whole federated learning system is usually not high. In this article, we introduce a scheme named FVFL, which ensure the local data security and resistance to collusive attacks, more importantly it can well support client flexible participate federated learning. We adopt Paillier encryption and secret sharing to guarantee client's data security and resistance to collusive attacks. Moreover, our encryption mechanism allows client to participate in federated learning flexibly, and the correctness of the encryption algorithm is not affected by client's drop out. The super-increasing sequence is introduced to reduce the communication overhead of the whole system, the simulation result shows that the result is significant; the Lagrange interpolation polynomial and secret Sharing is introduced to implement verification mechanism, to prevent malicious forgery of aggregation results in the cloud. The verification mechanism ensures the clients to obtain real and reliable aggregation results in the cloud. Moreover, our verification mechanism allows client to participate in federated learning flexibly, and the correctness of the verification algorithm is not affected by client's drop out. And the experimental results show that FVFL has high accuracy and efficiency.
引用
收藏
页码:23268 / 23281
页数:14
相关论文
共 25 条
[1]   QUOTIENT: Two-Party Secure Neural Network Training and Prediction [J].
Agrawal, Nitin ;
Shamsabadi, Ali Shahin ;
Kusner, Matt J. ;
Gascon, Adria .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :1231-1247
[2]   Poster: A Reliable and Accountable Privacy-Preserving Federated Learning Framework using the Blockchain [J].
Awan, Sana ;
Li, Fengjun ;
Luo, Bo ;
Liu, Mei .
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, :2561-2563
[3]   Secure Collaborative Deep Learning Against GAN Attacks in the Internet of Things [J].
Chen, Zhenzhu ;
Fu, Anmin ;
Zhang, Yinghui ;
Liu, Zhe ;
Zeng, Fanjian ;
Deng, Robert H. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5839-5849
[4]   VFL: A Verifiable Federated Learning With Privacy-Preserving for Big Data in Industrial IoT [J].
Fu, Anmin ;
Zhang, Xianglong ;
Xiong, Naixue ;
Gao, Yansong ;
Wang, Huaqun ;
Zhang, Jing .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (05) :3316-3326
[5]   VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning [J].
Guo, Xiaojie ;
Liu, Zheli ;
Li, Jin ;
Gao, Jiqiang ;
Hou, Boyu ;
Dong, Changyu ;
Baker, Thar .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :1736-1751
[6]   Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning [J].
Hitaj, Briland ;
Ateniese, Giuseppe ;
Perez-Cruz, Fernando .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :603-618
[7]   A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing [J].
Huang, Kai ;
Liu, Ximeng ;
Fu, Shaojing ;
Guo, Deke ;
Xu, Ming .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) :1441-1455
[8]   Secure and Differentially Private Logistic Regression for Horizontally Distributed Data [J].
Kim, Miran ;
Lee, Junghye ;
Ohno-Machado, Lucila ;
Jiang, Xiaoqian .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :695-710
[9]   Trustworthy AI: From Principles to Practices [J].
Li, Bo ;
Qi, Peng ;
Liu, Bo ;
Di, Shuai ;
Liu, Jingen ;
Pei, Jiquan ;
Yi, Jinfeng ;
Zhou, Bowen .
ACM COMPUTING SURVEYS, 2023, 55 (09)
[10]  
Li Y., 2019, P IEEE GLOB COMM C G, P1