A two-stage federated optimization algorithm for privacy computing in Internet of Things

被引:9
作者
Zhang, Jiangjiang [1 ]
Ning, Zhenhu [1 ]
Xue, Fei [2 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Beijing Wuzi Univ, Sch Informat, Beijing 101149, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2023年 / 145卷
基金
中国国家自然科学基金;
关键词
Federated optimization algorithm; Robust; Multitasking learning; Privacy protection; Two-stage; CLIENT SELECTION; NETWORKS;
D O I
10.1016/j.future.2023.03.042
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the advent of the Internet of things (IoT) era, federated learning plays an important role in breaking through traditional data barriers and effectively realizing data privacy and security in the process of sharing. However, the demand of the practical problems makes the algorithm still have great challenges in effectively balancing various factors, such as privacy security, accuracy, computing efficiency and so on. To challenge this problem, a two-stage federated optimization algorithm based on robust and multitasking learning is designed. In optimization client local model stage, an adaptive weight assignment mechanism is adopted to guide robust learning based on multiple untrusted sources data, which aims to ensure the credibility and robustness of the client model and obtain a reliable client model. To address the information leakage problem during the server-client global model optimization stage, a privacy patch layer is added to the client local model in multitask learning and maintain its privacy parameters stored on the client model during the global model parameter aggregation process, which aims to meet the personalized requirements and performance requirements of protecting the model privacy. To effectively measure the performance of our algorithm, two extensive experiments are carried out to verify the robustness and accuracy of model under different datasets, respectively. In addition, simulation results show that our algorithm successfully suppresses the impact of corrupted or irrelevant sources on performance, and its performance is better than the other two robust distributed learning baseline methods in the client local model optimization stage. At the same time, our algorithm achieves better accuracy performance than other advanced personalized optimization algorithms in the server-client global model optimization stage. Finally, it achieves a good balance between robustness, computational efficiency and model privacy protection.(c) 2023 Elsevier B.V. All rights reserved.
引用
收藏
页码:354 / 366
页数:13
相关论文
共 50 条
[21]   Research on a Two-stage Optimization Algorithm for Multi-objective Reactive Power Optimization of Distribution Network [J].
Gao, Fei ;
Zhang, Yu ;
Li, Jianfang ;
Feng, Xueping ;
Song, Xiaohui .
2015 5TH INTERNATIONAL CONFERENCE ON ELECTRIC UTILITY DEREGULATION AND RESTRUCTURING AND POWER TECHNOLOGIES (DRPT 2015), 2015, :626-631
[22]   A two-stage evolutionary algorithm for large-scale sparse multiobjective optimization problems [J].
Jiang, Jing ;
Han, Fei ;
Wang, Jie ;
Ling, Qinghua ;
Han, Henry ;
Wang, Yue .
SWARM AND EVOLUTIONARY COMPUTATION, 2022, 72
[23]   A two-stage federated learning method for personalization via selective collaboration [J].
Xu, Jiuyun ;
Zhou, Liang ;
Zhao, Yingzhi ;
Li, Xiaowen ;
Zhu, Kongshang ;
Xu, Xiangrui ;
Duan, Qiang ;
Zhang, Ruru .
COMPUTER COMMUNICATIONS, 2025, 232
[24]   Heterogeneous Personalized Privacy Protection for Internet of Medical Things: A Blockchain-based Federated Learning Approach [J].
Gao, Peisen ;
Su, Jingyi ;
Xu, Zerui ;
Yuan, Xiaoming ;
Fu, Yuchuan .
2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS, 2024, :377-382
[25]   Optimization of two-stage thermoelectric coolers with two design configurations [J].
Xuan, XC ;
Ng, KC ;
Yap, C ;
Chua, HT .
ENERGY CONVERSION AND MANAGEMENT, 2002, 43 (15) :2041-2052
[26]   Big Data Privacy Preserving in Multi-Access Edge Computing for Heterogeneous Internet of Things [J].
Du, Miao ;
Wang, Kun ;
Chen, Yuanfang ;
Wang, Xiaoyan ;
Sun, Yanfei .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (08) :62-67
[27]   Numerical optimization of heat recovery steam cycles: Mathematical model, two-stage algorithm and applications [J].
Martelli, Emanuele ;
Amaldi, Edoardo ;
Consonni, Stefano .
COMPUTERS & CHEMICAL ENGINEERING, 2011, 35 (12) :2799-2823
[28]   A two-stage evolutionary algorithm based on three indicators for constrained multi-objective optimization [J].
Dong, Jun ;
Gong, Wenyin ;
Ming, Fei ;
Wang, Ling .
EXPERT SYSTEMS WITH APPLICATIONS, 2022, 195
[29]   Competition-based two-stage evolutionary algorithm for constrained multi-objective optimization [J].
Hao, Lupeng ;
Peng, Weihang ;
Liu, Junhua ;
Zhang, Wei ;
Li, Yuan ;
Qin, Kaixuan .
MATHEMATICS AND COMPUTERS IN SIMULATION, 2025, 230 :207-226
[30]   A two-stage privacy protection mechanism based on blockchain in mobile crowdsourcing [J].
Sun, Zice ;
Wang, Yingjie ;
Cai, Zhipeng ;
Liu, Tianen ;
Tong, Xiangrong ;
Jiang, Nan .
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2021, 36 (05) :2058-2080