Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning

被引:1
作者
Behnia, Rouzbeh [1 ]
Riasi, Arman [2 ]
Ebrahimi, Reza [1 ]
Chow, Sherman S. M. [3 ]
Padmanabhan, Balaji [4 ]
Hoang, Thang [2 ]
机构
[1] Univ S Florida, Tampa, FL 33620 USA
[2] Virginia Tech, Blacksburg, VA USA
[3] Chinese Univ Hong Kong, Hong Kong, Peoples R China
[4] Univ Maryland, College Pk, MD USA
来源
2024 ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC | 2024年
关键词
federated learning; secure aggregation; privacy;
D O I
10.1109/ACSAC63791.2024.00069
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Secure aggregation protocols ensure the privacy of users' data in federated learning by preventing the disclosure of local gradients. Many existing protocols impose significant communication and computational burdens on participants and may not efficiently handle the large update vectors typical of machine learning models. Correspondingly, we present e-SeaFL, an efficient verifiable secure aggregation protocol taking only one communication round during the aggregation phase. e-SeaFL allows the aggregation server to generate proof of honest aggregation to participants via authenticated homomorphic vector commitments. Our core idea is the use of assisting nodes to help the aggregation server, under similar trust assumptions existing works place upon the participating users. Our experiments show that the user enjoys an order of magnitude efficiency improvement over the state-of-the-art (IEEE S&P 2023) for large gradient vectors with thousands of parameters. Our open-source implementation is available at https://github.com/vt-asaplab/e-SeaFL.
引用
收藏
页码:778 / 793
页数:16
相关论文
共 45 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[3]   Towards Practical Post-quantum Signatures for Resource-Limited Internet of Things [J].
Behnia, Rouzbeh ;
Yavuz, Attila A. .
37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, :119-130
[4]   Secure Single-Server Aggregation with (Poly)Logarithmic Overhead [J].
Bell, James Henry ;
Bonawitz, Kallista A. ;
Gascon, Adria ;
Lepoint, Tancrede ;
Raykova, Mariana .
CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, :1253-1269
[5]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1976, P531
[6]  
Bhagoji AN, 2019, PR MACH LEARN RES, V97
[7]  
Bommasani R., 2021, OPPORTUNITIES RISKS, DOI [10.48550/arXiv.2108.07258, DOI 10.48550/ARXIV.2108.07258]
[8]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[9]  
Boneh D, 2013, LECT NOTES COMPUT SC, V8042, P410, DOI 10.1007/978-3-642-40041-4_23
[10]  
Caldas S., 2019, LEAF BENCHMARK FEDER