A Privacy-Preserving Federated Learning Framework Based on Homomorphic Encryption

被引:0
作者
Chen, Liangjiang [1 ]
Wang, Junkai [1 ]
Xiong, Ling [1 ]
Zeng, Shengke [1 ]
Geng, Jiazhou [1 ]
机构
[1] Xihua Univ, Coll Comp & Software Engn, Chengdu 610000, Sichuan, Peoples R China
来源
2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS | 2024年
基金
中国国家自然科学基金;
关键词
Federated Learning; Privacy Preservation; Homomorphic Encryption; Weight-based Encryption;
D O I
10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics60724.2023.00099
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Federated learning is a collaborative machine learning approach that enables distributed users totrain diverse models on resource-constrained devices by sharing gradients, thereby mitigating storage and computational burdens. However, due to a lack of full trust in cloud service providers, users oftenprefer to outsource sensitive data in an encrypted manner, which introduces significant complexities indata processing, analysis, and access control. In this context, the privacy leakage issue in the processof federated learning highlights a critical concern. To address these issues, this paper presents a newfederated learning framework based on homomorphic encryption to protect data privacy and achievecollaborative model training, the proposed framework presents two notable benefits. Firstly, it employsproxy homomorphic encryption to ensure the security of gradients, especially in situations where theserver's reliability is constrained. This strategy effectively preserves gradient confidentiality within anenvironment of partial trust in the server. Secondly, the framework allocates gradient weights basedon the caliber of user data, ensuring privacy preservation even when operating asynchronously. Byfactoring in data quality, the model accommodates disparities in data contributions and adapts gradientweights correspondingly. This not only enhances overall model performance but also bolsters the privacyof individual data. Through a series of experiments, we validate the efficacy of the proposed frameworkin both privacy preservation and model performance, demonstrating its capability to uphold excellent-model performance while ensuring data privacy
引用
收藏
页码:512 / 517
页数:6
相关论文
共 18 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[3]  
Benaissa Ayoub, 2020, PhD thesis
[4]  
Bonawitz K., 2019, Machine Learning and Systems
[5]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[6]   A Syntactic Approach for Privacy-Preserving Federated Learning [J].
Choudhury, Olivia ;
Gkoulalas-Divanis, Aris ;
Salonidis, Theodoros ;
Sylla, Issa ;
Park, Yoonyoung ;
Hsu, Grace ;
Das, Amar .
ECAI 2020: 24TH EUROPEAN CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2020, 325 :1762-1769
[7]   A Nonlocal Similarity Learning-Based Tensor Completion Model With Its Application in Intelligent Transportation System [J].
Dai, Cheng ;
Zhang, Ying ;
Zheng, Zhigao .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (03) :3140-3151
[8]   A sparse attack method on skeleton-based human action recognition for intelligent metaverse application [J].
Dai, Cheng ;
Huang, Yinqin ;
Chien, Wei-Che .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 143 :51-60
[9]   A tucker decomposition based knowledge distillation for intelligent edge applications [J].
Dai, Cheng ;
Liu, Xingang ;
Li, Zhuolin ;
Chen, Mu-Yen .
APPLIED SOFT COMPUTING, 2021, 101
[10]  
Dertouzos M. L., 1978, Foundations of Secure Computation, V4, P169