FedMLC: White-Box Model Watermarking for Copyright Protection in Federated Learning for IoT Environment

被引:0
作者
Chen, Weitong [1 ]
Zhang, Wei [1 ]
Wu, Di [2 ]
Keskinarkaus, Anja [3 ]
Seppanen, Tapio [3 ]
Zhang, Jiale [1 ,2 ]
Gao, Longxiang [2 ,4 ,5 ]
Luan, Tom H. [6 ]
机构
[1] Yangzhou Univ, Sch Informat Engn, Yangzhou 225009, Peoples R China
[2] Univ Southern Queensland, Sch Math Phys & Comp SoMPC, Toowoomba, Qld 4350, Australia
[3] Univ Oulu, Ctr Machine Vis & Signal Anal, Physiol Signal Anal Team, Oulu 90014, Finland
[4] Qilu Univ Technol, Key Lab Comp Power Network & Informat Secur, Shandong Acad Sci, Shandong Comp Sci Ctr,Minist Educ, Jinan 250353, Peoples R China
[5] Shandong Fundamental Res Ctr Comp Sci, Shandong Prov Key Lab Comp Networks, Jinan 250014, Peoples R China
[6] Xi An Jiao Tong Univ, Sch Cyber Sci & Engn, Xian 710049, Peoples R China
关键词
Watermarking; Internet of Things; Glass box; Servers; Closed box; Training; Security; Data models; Copyright protection; Robustness; Copyright verification; federated learning (FL); Internet of Things (IoT); leakage tracing; malicious client detection; model watermarking; OWNERSHIP VERIFICATION;
D O I
10.1109/JIOT.2025.3568049
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread application of the Internet of Things (IoT), data processing has gradually migrated to edge devices that are closer to the data source. This shift has significantly improved the ability of real-time data analysis while effectively reducing bandwidth requirements and latency. Furthermore, federated learning (FL) has been introduced as a decentralized training method to achieve collaborative training of multiple devices while ensuring local data privacy. However, malicious clients in FL may theft trained models for unauthorized use, which causes model misuse or copyright challenges. To address these issues, this article proposes malicious client detection, leakage tracing, and copyright verification (FedMLC), a server-side white-box watermarking scheme. FedMLC utilizes the embedded watermark at different stages to achieve both traceability and copyright verification, simplifying the watermarking process. Additionally, the watermarking can also detect malicious clients in FL. Specifically, FedMLC uses the regularization term to guide the parameter signs of the normalization layer to be consistent with the watermark sign, thereby achieving watermark embedding. Experimental results show that our FL model watermarking scheme excels in malicious client detection, leakage tracing, and copyright verification, with minimal impact on model performance, able to resist various attacks, such as fine-tuning, pruning, and quantization.
引用
收藏
页码:28899 / 28912
页数:14
相关论文
共 43 条
[1]  
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[2]   Federated Learning for Healthcare: Systematic Review and Architecture Proposal [J].
Antunes, Rodolfo Stoffel ;
da Costa, Cristiano Andre ;
Kuederle, Arne ;
Yari, Imrana Abdullahi ;
Eskofier, Bjoern .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2022, 13 (04)
[3]   Multicore Federated Learning for Mobile-Edge Computing Platforms [J].
Bai, Yang ;
Chen, Lixing ;
Li, Jianhua ;
Wu, Jun ;
Zhou, Pan ;
Xu, Zichuan ;
Xu, Jie .
IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (07) :5940-5952
[4]  
Bansal A, 2022, PR MACH LEARN RES
[5]  
Chen HL, 2018, Arxiv, DOI arXiv:1804.03648
[6]   FedRight: An effective model copyright protection for federated learning [J].
Chen, Jinyin ;
Li, Mingjun ;
Cheng, Yao ;
Zheng, Haibin .
COMPUTERS & SECURITY, 2023, 135
[7]  
Rouhani BD, 2018, Arxiv, DOI arXiv:1804.00750
[8]  
Fan LX, 2019, ADV NEUR IN, V32
[9]   DeepIPR: Deep Neural Network Ownership Verification With Passports [J].
Fan, Lixin ;
Ng, Kam Woh ;
Chan, Chee Seng ;
Yang, Qiang .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2022, 44 (10) :6122-6139
[10]  
Fang MH, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1623