FVFL: A Flexible and Verifiable Privacy-Preserving Federated Learning Scheme

被引:6
作者
Wang, Gang [1 ]
Zhou, Li [1 ]
Li, Qingming [2 ]
Yan, Xiaoran [1 ]
Liu, Ximeng [3 ]
Wu, Yuncheng [4 ]
机构
[1] Zhejiang Lab, Hangzhou 310000, Peoples R China
[2] Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310058, Peoples R China
[3] Fuzhou Univ, Coll Comp & Big Data, Key Lab Informat Secur Network Syst, Fuzhou 310058, Peoples R China
[4] Natl Univ Singapore, Sch Comp, Singapore 117417, Singapore
关键词
Federated learning; Security; Servers; Cryptography; Reliability; Interpolation; Threat modeling; Deep learning; federated learning; privacy-preserving; verifiable; SECURE;
D O I
10.1109/JIOT.2024.3385479
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of deep learning, people are more and more concerned about the security of data. Federated learning can solve the problem of data island, but it also brings more serious data privacy problems. Furthermore, in the process of multisource data collaboration, the efficiency of the whole federated learning system is usually not high. In this article, we introduce a scheme named FVFL, which ensure the local data security and resistance to collusive attacks, more importantly it can well support client flexible participate federated learning. We adopt Paillier encryption and secret sharing to guarantee client's data security and resistance to collusive attacks. Moreover, our encryption mechanism allows client to participate in federated learning flexibly, and the correctness of the encryption algorithm is not affected by client's drop out. The super-increasing sequence is introduced to reduce the communication overhead of the whole system, the simulation result shows that the result is significant; the Lagrange interpolation polynomial and secret Sharing is introduced to implement verification mechanism, to prevent malicious forgery of aggregation results in the cloud. The verification mechanism ensures the clients to obtain real and reliable aggregation results in the cloud. Moreover, our verification mechanism allows client to participate in federated learning flexibly, and the correctness of the verification algorithm is not affected by client's drop out. And the experimental results show that FVFL has high accuracy and efficiency.
引用
收藏
页码:23268 / 23281
页数:14
相关论文
共 25 条
[11]   Privacy-Enhanced Federated Learning Against Poisoning Adversaries [J].
Liu, Xiaoyuan ;
Li, Hongwei ;
Xu, Guowen ;
Chen, Zongqi ;
Huang, Xiaoming ;
Lu, Rongxing .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 :4574-4588
[12]   How to Democratise and Protect AI: Fair and Differentially Private Decentralised Deep Learning [J].
Lyu, Lingjuan ;
Li, Yitong ;
Nandakumar, Karthik ;
Yu, Jiangshan ;
Ma, Xingjun .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) :1003-1017
[13]   Privacy preserving multi-party computation delegation for deep learning in cloud computing [J].
Ma, Xu ;
Zhang, Fangguo ;
Chen, Xiaofeng ;
Shen, Jian .
INFORMATION SCIENCES, 2018, 459 :103-116
[14]  
Ma Z., 2020, P IEEE GLOB COMM C, P1
[15]  
Mohassel P, 2017, P IEEE S SECUR PRIV, P19, DOI [10.1109/SP.2017.12, 10.1145/3132747.3132768]
[16]   ABY3: A Mixed Protocol Framework for Machine Learning [J].
Mohassel, Payman ;
Rindal, Peter .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :35-52
[17]   Privacy-Preserving Deep Learning via Additively Homomorphic Encryption [J].
Phong, Le Trieu ;
Aono, Yoshinori ;
Hayashi, Takuya ;
Wang, Lihua ;
Moriai, Shiho .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) :1333-1345
[18]   Toward Personalized Federated Learning [J].
Tan, Alysa Ziying ;
Yu, Han ;
Cui, Lizhen ;
Yang, Qiang .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2023, 34 (12) :9587-9603
[19]  
Truex S, 2019, PROCEEDINGS OF THE 12TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2019, P1, DOI 10.1145/3338501.3357370
[20]   Federated Learning With Differential Privacy: Algorithms and Performance Analysis [J].
Wei, Kang ;
Li, Jun ;
Ding, Ming ;
Ma, Chuan ;
Yang, Howard H. ;
Farokhi, Farhad ;
Jin, Shi ;
Quek, Tony Q. S. ;
Vincent Poor, H. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :3454-3469