SAEV: Secure Aggregation and Efficient Verification for Privacy-Preserving Federated Learning

被引:1
作者
Wang, Junkai [1 ]
Wang, Rong [1 ]
Xiong, Ling [1 ]
Xiong, Neal [2 ]
Liu, Zhicai [1 ]
机构
[1] Xihua Univ, Sch Comp & Software Engn, Chengdu 610039, Peoples R China
[2] Sul Ross State Univ, Sch Dept Comp Sci & Math, Alpine, TX 79830 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 24期
基金
中国国家自然科学基金;
关键词
Servers; Security; Privacy; Training; Federated learning; Protocols; Protection; Data security; federated learning (FL); privacy-preserving; secure aggregation;
D O I
10.1109/JIOT.2024.3445964
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Federated learning (FL) emerges as a promising paradigm, relentlessly pursuing excellence in efficiency, privacy preservation, and security-the holy trinity that underpins the fundamental philosophy and practical implementation of FL. However, previous scholarly works have predominantly focused on the privacy protection and secure aggregation in the realm of FL. Undoubtedly, efficiency still plays a pivotal role in determining FL's viability in real-world applications. To improve efficiency while ensuring privacy protection and secure aggregation, this work proposes a verifiable privacy-preserving federated learning framework tailored for practical applications. Firstly, a novel aggregation rule, constrained M maximum security aggregation, forces the server to securely aggregate the local gradients from M users without relying on any auxiliary servers, thereby considerably decreasing the communication overhead. Secondly, regardless of the dimension of the aggregated gradient being verified, our scheme performs a single verification per user per round. Through security analysis, our scheme could guarantee some given security requirements. Besides, extensive experiments show that under the proportion that the gradient dimension $(d)$ to the number of users $(n)$ is 1:2 and 2:1, ours is $\times 1.3$ and $\times 1$ faster for total runtime and is $\times 3$ and $\times 7$ lower for total communication cost compared with a state-of-the-art framework, respectively. Therefore, our FL framework is more suitable for practical application in real life.
引用
收藏
页码:39681 / 39696
页数:16
相关论文
共 37 条
[1]  
[Anonymous], 2007, JHUISI/charm
[2]  
[Anonymous], 1996, Dataset
[3]  
[Anonymous], 1994, Statlog (German credit data) Dataset
[4]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[5]  
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[6]   Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs [J].
Boyle, Elette ;
Chung, Kai-Min ;
Pass, Rafael .
ADVANCES IN CRYPTOLOGY, PT II, 2015, 9216 :742-762
[7]  
Bresson E, 2003, LECT NOTES COMPUT SC, V2894, P37
[8]   When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control [J].
Chen, Chaochao ;
Zhou, Jun ;
Wang, Li ;
Wu, Xibin ;
Fang, Wenjing ;
Tan, Jin ;
Wang, Lei ;
Liu, Alex X. ;
Wang, Hao ;
Hong, Cheng .
KDD '21: PROCEEDINGS OF THE 27TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY & DATA MINING, 2021, :2652-2662
[9]   SPDZ2k : Efficient MPC mod 2k for Dishonest Majority [J].
Cramer, Ronald ;
Damgard, Ivan ;
Escudero, Daniel ;
Scholl, Peter ;
Xing, Chaoping .
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 :769-798
[10]  
Dertouzos M. L., 1978, Foundations of Secure Computation, V4, P169