Feature Reconstruction Attacks and Countermeasures of DNN Training in Vertical Federated Learning

被引:0
作者
Ye, Peng [1 ]
Jiang, Zhifeng [1 ]
Wang, Wei [1 ]
Li, Bo [1 ]
Li, Baochun [2 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Comp Sci & Engn, Hong Kong, Peoples R China
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 1A1, Canada
关键词
Training; Vectors; Data models; Artificial neural networks; Adaptation models; Feature extraction; Computational modeling; Security; Protection; Federated learning; DNN; vertical federated learning; feature recovery attack; feature protection scheme;
D O I
10.1109/TDSC.2024.3521451
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Federated learning (FL) has increasingly been deployed, in its vertical form, among organizations to facilitate secure collaborative training. In vertical FL (VFL), participants hold disjoint features of the same set of sample instances. The one with labels - the active party, initiates training and interacts with other participants - the passive parties. It remains largely unknown whether and how an active party can extract private feature data owned by passive parties, especially when training deep neural network (DNN) models. This work examines the feature security problem of DNN training in VFL. We consider a DNN model partitioned between active and passive parties, where the passive party holds a subset of the input layer with some features of binary values. Though proved to be NP-hard. we demonstrate that, unless the feature dimension is exceedingly large, it remains feasible, both theoretically and practically, to launch a reconstruction attack with an efficient search-based algorithm that prevails over current feature protection. We propose a novel feature protection scheme by perturbing intermediate results and fabricated input features, which effectively misleads reconstruction attacks towards pre-specified random values. The evaluation shows it sustains feature reconstruction attack in various VFL applications with negligible impact on model performance.
引用
收藏
页码:2659 / 2669
页数:11
相关论文
共 32 条
[1]  
Ahmed M., 2022, Monkey-pox patients dataset
[2]  
[Anonymous], 2016, REGULATION EU 201667
[3]  
[Anonymous], 2018, CALIFORNIA CONSUMER
[4]   Comparative accuracies of artificial neural networks and discriminant analysis in predicting forest cover types from cartographic variables [J].
Blackard, JA ;
Dean, DJ .
COMPUTERS AND ELECTRONICS IN AGRICULTURE, 1999, 24 (03) :131-151
[5]   Distilling Knowledge via Knowledge Review [J].
Chen, Pengguang ;
Liu, Shu ;
Zhao, Hengshuang ;
Jia, Jiaya .
2021 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, CVPR 2021, 2021, :5006-5015
[6]  
Dua D., 2017, UCI MACHINE LEARNING
[7]  
Fu C., 2022, P 31 USENIX SEC S BO
[8]   BLINDFL: Vertical Federated Machine Learning without Peeking into Your Data [J].
Fu, Fangcheng ;
Xue, Huanran ;
Cheng, Yong ;
Tao, Yangyu ;
Cui, Bin .
PROCEEDINGS OF THE 2022 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA (SIGMOD '22), 2022, :1316-1330
[9]  
Harikrishnan H., 2020, Symptoms and COVID presence
[10]   APPROXIMATION CAPABILITIES OF MULTILAYER FEEDFORWARD NETWORKS [J].
HORNIK, K .
NEURAL NETWORKS, 1991, 4 (02) :251-257