Privacy-Enhanced and Efficient Federated Knowledge Transfer Framework in IoT

被引:0
作者
Pan, Yanghe [1 ]
Su, Zhou [1 ]
Wang, Yuntao [1 ]
Li, Ruidong [2 ]
Wu, Yuan [3 ]
机构
[1] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, Xian 710049, Peoples R China
[2] Kanazawa Univ, Inst Sci & Engn, Kanazawa 9201192, Japan
[3] Univ Macau, Fac Sci & Technol, Taipa, Macau, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 23期
关键词
Internet of Things; Data models; Training; Privacy; Knowledge transfer; Data privacy; Predictive models; Differential privacy; federated learning (FL); Internet of Things (IoT); knowledge transfer; MEMBERSHIP INFERENCE ATTACKS;
D O I
10.1109/JIOT.2024.3439599
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Federated learning (FL) has gained widespread adoption in Internet of Things (IoT) applications, promoting the evolution of IoT toward Artificial Intelligence of Things (AIoT). However, IoT devices are still vulnerable to various privacy inference attacks in FL. While current solutions aim to protect the privacy of devices during model training, the published model is still at risk from external privacy attacks during model deployment. To address the privacy concerns throughout the entire FL lifecycle, this article proposes a privacy-enhanced and efficient federated knowledge transfer framework for IoT, named PEFKT, which integrates the knowledge transfer method and local differential privacy (LDP) mechanism. In PEFKT, we devise a data diversity-driven grouping strategy to tackle the non-independent and identically distributed (non-IID) issue in IoT. Additionally, we design a quality-aware soft-label aggregation algorithm to facilitate effective knowledge transfer, thereby improving the performance of the student model. Finally, we provide rigorous privacy analysis and validate the feasibility and effectiveness of PEFKT through extensive experiments on real data sets.
引用
收藏
页码:37630 / 37644
页数:15
相关论文
共 44 条
  • [1] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [2] McMahan HB, 2018, Arxiv, DOI arXiv:1710.06963
  • [3] FLTrust: Byzantine-robust Federated Learning via Trust Bootstrapping
    Cao, Xiaoyu
    Fang, Minghong
    Liu, Jia
    Gong, Neil Zhenqiang
    [J]. 28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [4] Chang H., 2019, P NIPS WORKSH NEW FR, P1
  • [5] A CLASS OF BOUNDED APPROXIMATION ALGORITHMS FOR GRAPH PARTITIONING
    FEO, TA
    KHELLAF, M
    [J]. NETWORKS, 1990, 20 (02) : 181 - 195
  • [6] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
    Fredrikson, Matt
    Jha, Somesh
    Ristenpart, Thomas
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1322 - 1333
  • [7] Geiping J., 2020, Proc. Adv. Neural Inf. Process. Syst., V33, P16937
  • [8] Geyer R.C., 2017, arXiv
  • [9] Recent Advances on Federated Learning for Cybersecurity and Cybersecurity for Federated Learning for Internet of Things
    Ghimire, Bimal
    Rawat, Danda B.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8229 - 8249
  • [10] Goodfellow K., 2018, INT C LEARN REPR, P1