Security-enhanced machine learning framework based on PATE

被引:0
作者
Guo, Xian [1 ]
Zheng, Kai [1 ]
Jiang, Yongbo [1 ]
Wang, Jing [1 ]
Fang, Junli [1 ]
机构
[1] Lanzhou Univ Technol, Sch Comp & Commun, Lanzhou 730050, Peoples R China
关键词
distributed learning; private aggregation of teacher ensemble; privacy-preserving; machine learning; PRIVACY;
D O I
10.1504/IJICS.2025.145126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy aggregated teacher ensembles (PATE) is a general machine learning framework that provides privacy-preserving for training data. However, this framework faces security risks in the distributed learning environment. Firstly, the involvement of illicit nodes in communication may lead to aggregation result inaccuracies. Secondly, the semi-honest aggregator and teacher nodes could potentially result in privacy leaks of other teacher nodes. Thirdly, the aggregation results are influenced by each teacher, and there may be poisoning attacks during the aggregation process. Fourthly, malicious aggregator may tamper with the information sent to student nodes or attempt to access relevant information about student node training labels. To address the above issues, we propose a machine learning framework with stronger security and privacy in a distributed learning environment based on principal component analysis and secures multi-party computing. The framework is subjected to security analysis and experimental validation. The security analysis establishes the framework's robustness and privacy-preserving characteristics, while experimental validation demonstrates its practical viability.
引用
收藏
页码:109 / 146
页数:39
相关论文
共 25 条
[1]  
Boenisch F., 2023, Proceedings on Privacy Enhancing Technologies, V12, P158
[2]  
Choquette C.A., 2021, INT C LEARN REPR ICL
[3]  
Choquette-Choo CA, 2021, PR MACH LEARN RES, V139
[4]   A new technique ensuring privacy in big data: K-anonymity without prior value of the threshold k [J].
El Ouazzani, Zakariae ;
El Bakkali, Hanan .
PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 :52-59
[5]   Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J].
Fredrikson, Matt ;
Jha, Somesh ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1322-1333
[6]   SEDML: Securely and efficiently harnessing distributed knowledge in machine learning [J].
Gao, Yansong ;
Li, Qun ;
Zheng, Yifeng ;
Wang, Guohong ;
Wei, Jiannan ;
Su, Mang .
COMPUTERS & SECURITY, 2022, 121
[7]  
Goodfellow I. J., 2017, 5 INT C LEARN REPR I
[8]   SPEED: secure, PrivatE, and efficient deep learning [J].
Grivet Sebert, Arnaud ;
Pinot, Rafael ;
Zuber, Martin ;
Gouy-Pailler, Cedric ;
Sirdey, Renaud .
MACHINE LEARNING, 2021, 110 (04) :675-694
[9]  
Hinton G.E., 2015, P NEURIPS DLRL WORKS
[10]  
Hu H., 2020, IEEE Signal Processing Letters, V29, P1197