Two-Stage Client Selection Scheme for Blockchain-Enabled Federated Learning in IoT

被引:1
作者
Jin, Xiaojun [1 ]
Ma, Chao [1 ]
Luo, Song [1 ]
Zeng, Pengyi [1 ]
Wei, Yifei [1 ]
机构
[1] China Acad Informat & Commun Technol, Inst Ind Internet & Internet Things, Beijing 100191, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 81卷 / 02期
关键词
Blockchain; federated learning; attribute-based encryption; client selection; proximal policy optimization;
D O I
10.32604/cmc.2024.055344
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Federated learning enables data owners in the Internet of Things (IoT) to collaborate in training models without sharing private data, creating new business opportunities for building a data market. However, in practical operation, there are still some problems with federated learning applications. Blockchain has the characteristics of decentralization, distribution, and security. The blockchain-enabled federated learning further improve the security and performance of model training, while also expanding the application scope of federated learning. Blockchain has natural financial attributes that help establish a federated learning data market. However, the data of federated learning tasks may be distributed across a large number of resource-constrained IoT devices, which have different computing, communication, and storage resources, and the data quality of each device may also vary. Therefore, how to effectively select the clients with the data required for federated learning task is a research hotspot. In this paper, a two-stage client selection scheme for blockchain-enabled federated learning is proposed, which first selects clients that satisfy federated learning task through attribute-based encryption, protecting the attribute privacy of clients. Then blockchain nodes select some clients for local model aggregation by proximal policy optimization algorithm. Experiments show that the model performance of our two-stage client selection scheme is higher than that of other client selection algorithms when some clients are offline and the data quality is poor.
引用
收藏
页码:2317 / 2336
页数:20
相关论文
共 33 条
[1]  
Balakrishnan R., 2022, INT C LEARN REPR, DOI [10.48550/arXiv.2107.11728, DOI 10.48550/ARXIV.2107.11728]
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]   SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS [J].
BLOOM, BH .
COMMUNICATIONS OF THE ACM, 1970, 13 (07) :422-&
[4]  
Caldas S., 2018, arXiv
[5]   A privacy-preserving and verifiable federated learning method based on blockchain [J].
Fang, Chen ;
Guo, Yuanbo ;
Ma, Jiali ;
Xie, Haodong ;
Wang, Yifeng .
COMPUTER COMMUNICATIONS, 2022, 186 :1-11
[6]  
Fraboni Y, 2021, PR MACH LEARN RES, V139
[7]   Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J].
Fredrikson, Matt ;
Jha, Somesh ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1322-1333
[8]   Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations [J].
Ganju, Karan ;
Wang, Qi ;
Yang, Wei ;
Gunter, Carl A. ;
Borisov, Nikita .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :619-633
[9]   TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain [J].
Gao, Sheng ;
Piao, Guirong ;
Zhu, Jianming ;
Ma, Xindi ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :5784-5798
[10]  
Goetz J, 2019, Arxiv, DOI arXiv:1909.12641