Trust driven On-Demand scheme for client deployment in Federated Learning

被引:3
作者
Chahoud, Mario [1 ,2 ]
Mourad, Azzam [1 ,3 ]
Otrok, Hadi [4 ]
Bentahar, Jamal [2 ,3 ]
Guizani, Mohsen [5 ]
机构
[1] Lebanese Amer Univ, Artificial Intelligence & Cyber Syst Res Ctr, Dept CSM, Beirut, Lebanon
[2] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
[3] Khalifa Univ, KU Res Ctr 6G, Dept CS, Abu Dhabi, U Arab Emirates
[4] Khalifa Univ, Ctr Cyber Phys Syst C2PS, Dept CS, Abu Dhabi, U Arab Emirates
[5] Mohammad Bin Zayed Univ Artificial Intelligence, Abu Dhabi, U Arab Emirates
关键词
Federated Learning; Client selection and deployment; Trust; Malicious clients; Containerization technology;
D O I
10.1016/j.ipm.2024.103991
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Containerization technology plays a crucial role in Federated Learning (FL) setups, expanding the pool of potential clients and ensuring the availability of specific subsets for each learning iteration. However, doubts arise about the trustworthiness of devices deployed as clients in FL scenarios, especially when container deployment processes are involved. Addressing these challenges is important, particularly in managing potentially malicious clients capable of disrupting the learning process or compromising the entire model. In our research, we are motivated to integrate a trust element into the client selection and model deployment processes within our system architecture. This is a feature lacking in the initial client selection and deployment mechanism of the On-Demand architecture. We introduce a trust mechanism, named "Trusted-On-Demand-FL", which establishes a relationship of trust between the server and the pool of eligible clients. Utilizing Docker in our deployment strategy enables us to monitor and validate participant actions effectively, ensuring strict adherence to agreed- upon protocols while strengthening defenses against unauthorized data access or tampering. Our simulations rely on continuous user behavior datasets, deploying an optimization model powered by a genetic algorithm to efficiently select clients for participation. By assigning trust values to individual clients and dynamically adjusting these values, combined with penalizing malicious clients through decreased trust scores, our proposed framework identifies and isolates harmful clients. This approach not only reduces disruptions to regular rounds but also minimizes instances of round dismissal, Consequently enhancing both system stability and security.
引用
收藏
页数:21
相关论文
共 42 条
[31]   Federated against the cold: A trust-based federated learning approach to counter the cold start problem in recommendation systems [J].
Wahab, Omar Abdel ;
Rjoub, Gaith ;
Bentahar, Jamal ;
Cohen, Robin .
INFORMATION SCIENCES, 2022, 601 :189-206
[32]   An endorsement-based trust bootstrapping approach for newcomer cloud services [J].
Wahab, Omar Abdel ;
Cohen, Robin ;
Bentahar, Jamal ;
Otrok, Hadi ;
Mourad, Azzam ;
Rjoub, Gaith .
INFORMATION SCIENCES, 2020, 527 :159-175
[33]   Privacy-Preserving Continuous Authentication for Mobile and IoT Systems Using Warmup-Based Federated Learning [J].
Wazzeh, Mohamad ;
Ould-Slimane, Hakima ;
Talhi, Chamseddine ;
Mourad, Azzam ;
Guizani, Mohsen .
IEEE NETWORK, 2023, 37 (03) :224-230
[34]  
Wehbi Osama, 2022, arXiv
[35]   On Designing Context-Aware Trust Model and Service Delegation for Social Internet of Things [J].
Wei, Lijun ;
Wu, Jing ;
Long, Chengnian ;
Li, Bo .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (06) :4775-4787
[36]   Decentralized Task Assignment for Mobile Crowdsensing With Multi-Agent Deep Reinforcement Learning [J].
Xu, Chenghao ;
Song, Wei .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (18) :16564-16578
[37]   Byzantine-robust Federated Learning through Collaborative Malicious Gradient Filtering [J].
Xu, Jian ;
Huang, Shao-Lun ;
Song, Linqi ;
Lan, Tian .
2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022), 2022, :1223-1235
[38]   Client Selection and Bandwidth Allocation in Wireless Federated Learning Networks: A Long-Term Perspective [J].
Xu, Jie ;
Wang, Heqiang .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (02) :1188-1200
[39]   An energy-efficient artificial bee colony-based clustering in the internet of things [J].
Yousefi, Shamim ;
Derakhshan, Farnaz ;
Aghdasi, Hadi S. ;
Karimipour, Hadis .
COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86
[40]  
Zhang ZX, 2022, Arxiv, DOI [arXiv:2207.09209, 10.48550/ARXIV.2207.09209, DOI 10.48550/ARXIV.2207.09209]