FLPP: A Federated-Learning-Based Scheme for Privacy Protection in Mobile Edge Computing

被引:0
作者
Cheng, Zhimo [1 ]
Ji, Xinsheng [1 ,2 ]
You, Wei [1 ]
Bai, Yi [1 ]
Chen, Yunjie [1 ]
Qin, Xiaogang [1 ]
机构
[1] Informat Engn Univ, Dept Next Generat Mobile Commun & Cyber Space Secu, Zhengzhou 450001, Peoples R China
[2] Purple Mt Labs, Nanjing 211111, Peoples R China
关键词
mobile edge computing; privacy protection; federated learning; differential privacy; differential evolutionary; CHALLENGES; SECURITY; INTERNET;
D O I
10.3390/e25111551
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Data sharing and analyzing among different devices in mobile edge computing is valuable for social innovation and development. The limitation to the achievement of this goal is the data privacy risk. Therefore, existing studies mainly focus on enhancing the data privacy-protection capability. On the one hand, direct data leakage is avoided through federated learning by converting raw data into model parameters for transmission. On the other hand, the security of federated learning is further strengthened by privacy-protection techniques to defend against inference attack. However, privacy-protection techniques may reduce the training accuracy of the data while improving the security. Particularly, trading off data security and accuracy is a major challenge in dynamic mobile edge computing scenarios. To address this issue, we propose a federated-learning-based privacy-protection scheme, FLPP. Then, we build a layered adaptive differential privacy model to dynamically adjust the privacy-protection level in different situations. Finally, we design a differential evolutionary algorithm to derive the most suitable privacy-protection policy for achieving the optimal overall performance. The simulation results show that FLPP has an advantage of 8 similar to 34% in overall performance. This demonstrates that our scheme can enable data to be shared securely and accurately.
引用
收藏
页数:14
相关论文
共 32 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]   MiTFed: A Privacy Preserving Collaborative Network Attack Mitigation Framework Based on Federated Learning Using SDN and Blockchain [J].
Abou El Houda, Zakaria ;
Hafid, Abdelhakim Senhaji ;
Khoukhi, Lyes .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (04) :1985-2001
[3]   Federated learning and differential privacy for medical image analysis [J].
Adnan, Mohammed ;
Kalra, Shivam ;
Cresswell, Jesse C. ;
Taylor, Graham W. ;
Tizhoosh, Hamid R. .
SCIENTIFIC REPORTS, 2022, 12 (01)
[4]   Multi-Access Edge Computing Architecture, Data Security and Privacy: A Review [J].
Ali, Belal ;
Gregory, Mark A. ;
Li, Shuo .
IEEE ACCESS, 2021, 9 (09) :18706-18721
[5]   An Overview on Edge Computing Research [J].
Cao, Keyan ;
Liu, Yefan ;
Meng, Gongjie ;
Sun, Qimeng .
IEEE ACCESS, 2020, 8 :85714-85728
[6]   Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things [J].
Du, Miao ;
Wang, Kun ;
Chen, Yuanfang ;
Wang, Xiaoyan ;
Sun, Yanfei .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (08) :62-67
[7]   Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning [J].
Fang, Haokun ;
Qian, Quan .
FUTURE INTERNET, 2021, 13 (04)
[8]   SAFELearn: Secure Aggregation for private FEderated Learning [J].
Fereidooni, Hossein ;
Marchal, Samuel ;
Miettinen, Markus ;
Mirhoseini, Azalia ;
Moellering, Helen ;
Thien Duc Nguyen ;
Rieger, Phillip ;
Sadeghi, Ahmad-Reza ;
Schneider, Thomas ;
Yalame, Hossein ;
Zeitouni, Shaza .
2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, :56-62
[9]   Investigating the Applicability of Nested Secret Share for Drone Fleet Photo Storage [J].
Galletta, Antonino ;
Taheri, Javid ;
Celesti, Antonio ;
Fazio, Maria ;
Villari, Massimo .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (04) :2671-2683
[10]   Overcoming security limitations of Secret Share techniques: the Nested Secret Share [J].
Galletta, Antonino ;
Taheri, Javid ;
Fazio, Maria ;
Celesti, Antonio ;
Villari, Massimo .
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, :289-296