Trust driven On-Demand scheme for client deployment in Federated Learning

被引:3
作者
Chahoud, Mario [1 ,2 ]
Mourad, Azzam [1 ,3 ]
Otrok, Hadi [4 ]
Bentahar, Jamal [2 ,3 ]
Guizani, Mohsen [5 ]
机构
[1] Lebanese Amer Univ, Artificial Intelligence & Cyber Syst Res Ctr, Dept CSM, Beirut, Lebanon
[2] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
[3] Khalifa Univ, KU Res Ctr 6G, Dept CS, Abu Dhabi, U Arab Emirates
[4] Khalifa Univ, Ctr Cyber Phys Syst C2PS, Dept CS, Abu Dhabi, U Arab Emirates
[5] Mohammad Bin Zayed Univ Artificial Intelligence, Abu Dhabi, U Arab Emirates
关键词
Federated Learning; Client selection and deployment; Trust; Malicious clients; Containerization technology;
D O I
10.1016/j.ipm.2024.103991
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Containerization technology plays a crucial role in Federated Learning (FL) setups, expanding the pool of potential clients and ensuring the availability of specific subsets for each learning iteration. However, doubts arise about the trustworthiness of devices deployed as clients in FL scenarios, especially when container deployment processes are involved. Addressing these challenges is important, particularly in managing potentially malicious clients capable of disrupting the learning process or compromising the entire model. In our research, we are motivated to integrate a trust element into the client selection and model deployment processes within our system architecture. This is a feature lacking in the initial client selection and deployment mechanism of the On-Demand architecture. We introduce a trust mechanism, named "Trusted-On-Demand-FL", which establishes a relationship of trust between the server and the pool of eligible clients. Utilizing Docker in our deployment strategy enables us to monitor and validate participant actions effectively, ensuring strict adherence to agreed- upon protocols while strengthening defenses against unauthorized data access or tampering. Our simulations rely on continuous user behavior datasets, deploying an optimization model powered by a genetic algorithm to efficiently select clients for participation. By assigning trust values to individual clients and dynamically adjusting these values, combined with penalizing malicious clients through decreased trust scores, our proposed framework identifies and isolates harmful clients. This approach not only reduces disruptions to regular rounds but also minimizes instances of round dismissal, Consequently enhancing both system stability and security.
引用
收藏
页数:21
相关论文
共 42 条
[11]  
He CY, 2020, Arxiv, DOI arXiv:1910.04956
[12]   Toward Federated Learning Models Resistant to Adversarial Attacks [J].
Hu, Fei ;
Zhou, Wuneng ;
Liao, Kaili ;
Li, Hongliang ;
Tong, Dongbing .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (19) :16917-16930
[13]  
Krizhevsky A., 2009, Cifar-10
[14]  
Laurila J.K., 2012, Mobile Data Challenge by Nokia Workshop
[15]   Federated Learning in Mobile Edge Networks: A Comprehensive Survey [J].
Lim, Wei Yang Bryan ;
Nguyen Cong Luong ;
Dinh Thai Hoang ;
Jiao, Yutao ;
Liang, Ying-Chang ;
Yang, Qiang ;
Niyato, Dusit ;
Miao, Chunyan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03) :2031-2063
[16]   Leveraging heuristic client selection for enhanced secure federated submodel learning [J].
Liu, Panyu ;
Zhou, Tongqing ;
Cai, Zhiping ;
Liu, Fang ;
Guo, Yeting .
INFORMATION PROCESSING & MANAGEMENT, 2023, 60 (03)
[17]   Privacy-preserving Byzantine-robust federated learning [J].
Ma, Xu ;
Zhou, Yuqing ;
Wang, Laihua ;
Miao, Meixia .
COMPUTER STANDARDS & INTERFACES, 2022, 80
[18]  
McMahan HB, 2017, PR MACH LEARN RES, V54, P1273
[19]   New data preprocessing trends based on ensemble of multiple preprocessing techniques [J].
Mishra, Puneet ;
Biancolillo, Alessandra ;
Roger, Jean Michel ;
Marini, Federico ;
Rutledge, Douglas N. .
TRAC-TRENDS IN ANALYTICAL CHEMISTRY, 2020, 132
[20]  
Mitchell M, 1998, An introduction to genetic algorithms