Privacy-Preserving and Reliable Decentralized Federated Learning

被引:28
作者
Gao, Yuanyuan [1 ,2 ,3 ]
Zhang, Lei [1 ,2 ,3 ]
Wang, Lulu [1 ,2 ,3 ]
Choo, Kim-Kwang Raymond [4 ]
Zhang, Rui [1 ,2 ,3 ]
机构
[1] East China Normal Univ, Engn Res Ctr Software Hardware Codesign Technol &, Minist Educ, Shanghai 200062, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[3] Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[4] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
关键词
Broadcast encryption; data privacy; federated learning; local differential privacy;
D O I
10.1109/TSC.2023.3250705
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conventional federated learning (FL) approaches generally rely on a centralized server, and there has been a trend of designing asynchronous FL approaches for distributed applications partly to mitigate limitations associated with conventional (synchronous) FL approaches (e.g., single point of failure / attack). In this paper, we first introduce two new tools, namely: a quality-based aggregation method and an extended dynamic contribution broadcast encryption (DConBE). Building on these two new tools and local differential privacy, we then propose a privacy-preserving and reliable decentralized FL scheme, designed to support batch joining/leaving of clients while incurring minimal delay and achieving high model accuracy. In other words, our scheme seeks to ensure an optimal trade-off between model accuracy and data privacy, which is also demonstrated in our simulation results. For example, the results show that our aggregation method can effectively avoid low-quality updates in the sense that the scheme guarantees high model accuracy even in the presence of bad clients who may submit low-quality updates. In addition, our scheme incurs a lower loss and the extended DConBE only slightly affects the efficiency of our scheme. With the extended dynamic contribution broadcast encryption, our scheme can efficiently support batch joining/leaving of clients.
引用
收藏
页码:2879 / 2891
页数:13
相关论文
共 43 条
[1]  
Cruz-Roa AA, 2013, LECT NOTES COMPUT SC, V8150, P403, DOI 10.1007/978-3-642-40763-5_50
[2]   A Generic Deep Learning Based Cough Analysis System From Clinically Validated Samples for Point-of-Need Covid-19 Test and Severity Levels [J].
Andreu-Perez, Javier ;
Perez-Espinosa, Humberto ;
Timonet, Eva ;
Kiani, Mehrin ;
Giron-Perez, Manuel, I ;
Benitez-Trinidad, Alma B. ;
Jarchi, Delaram ;
Rosales-Perez, Alejandro ;
Gkatzoulis, Nick ;
Reyes-Galaviz, Orion F. ;
Torres-Garcia, Alejandro ;
Reyes-Garcia, Carlos A. ;
Ali, Zulfiqar ;
Rivas, Francisco .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (03) :1220-1232
[3]  
Apple Differential Privacy Team, 2017, LEARNING PRIVACY SCA
[4]   Private Empirical Risk Minimization: Efficient Algorithms and Tight Error Bounds [J].
Bassily, Raef ;
Smith, Adam ;
Thakurta, Abhradeep .
2014 55TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2014), 2014, :464-473
[5]  
Bhagoji AN, 2019, PR MACH LEARN RES, V97
[6]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[7]   DeepDriving: Learning Affordance for Direct Perception in Autonomous Driving [J].
Chen, Chenyi ;
Seff, Ari ;
Kornhauser, Alain ;
Xiao, Jianxiong .
2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV), 2015, :2722-2730
[8]   Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems [J].
Chen, Tong ;
Zhang, Lei ;
Choo, Kim-Kwang Raymond ;
Zhang, Rui ;
Meng, Xinyu .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) :10766-10778
[9]   Communication-Efficient Federated Deep Learning With Layerwise Asynchronous Model Update and Temporally Weighted Aggregation [J].
Chen, Yang ;
Sun, Xiaoyan ;
Jin, Yaochu .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2020, 31 (10) :4229-4238
[10]  
Collobert R., 2008, ICML 08 P 25 INT C M