Multi-Stage Asynchronous Federated Learning With Adaptive Differential Privacy

被引:5
作者
Li, Yanan [1 ,2 ]
Yang, Shusen [1 ,3 ]
Ren, Xuebin [1 ,3 ]
Shi, Liang [1 ,3 ]
Zhao, Cong [1 ,3 ]
机构
[1] Xi An Jiao Tong Univ, Natl Engn Lab Big Data Analyt NEL BDA, Xian 710049, Shaanxi, Peoples R China
[2] Henan Polytech Univ, Sch Software, Jiaozuo 454000, Peoples R China
[3] Xi An Jiao Tong Univ, Xian, Shaanxi, Peoples R China
关键词
Asynchronous learning; convergence; differential privacy; federated learning; DESCENT; ATTACKS;
D O I
10.1109/TPAMI.2023.3332428
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The fusion of federated learning and differential privacy can provide more comprehensive and rigorous privacy protection, thus attracting extensive interests from both academia and industry. However, facing the system-level challenge of device heterogeneity, most current synchronous FL paradigms exhibit low efficiency due to the straggler effect, which can be significantly reduced by Asynchronous FL (AFL). However, AFL has never been comprehensively studied, which imposes a major challenge in the utility optimization of DP-enhanced AFL. Here, theoretically motivated multi-stage adaptive private algorithms are proposed to improve the trade-off between model utility and privacy for DP-enhanced AFL. In particular, we first build two DP-enhanced AFL frameworks with consideration of universal factors for different adversary models. Then, we give a solid analysis on the model convergence of AFL, based on which, DP can be adaptively achieved with high utility. Through extensive experiments on different training models and benchmark datasets, we demonstrate that the proposed algorithms achieve the overall best performances and improve up to 24% test accuracy with the same privacy loss and have faster convergence compared with the state-of-the-art algorithms. Our frameworks provide an analytical way for private AFL and adapt to more complex FL application scenarios.
引用
收藏
页码:1243 / 1256
页数:14
相关论文
共 72 条
  • [1] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [2] Agarwal N, 2018, ADV NEUR IN, V31
  • [3] Reconstruction Attacks Against Mobile-Based Continuous Authentication Systems in the Cloud
    Al-Rubaie, Mohammad
    Chang, J. Morris
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (12) : 2648 - 2663
  • [4] Andrew G, 2021, ADV NEUR IN, V34
  • [5] Andrew Galen, 2019, arXiv
  • [6] Collaborative learning without sharing data
    不详
    [J]. NATURE MACHINE INTELLIGENCE, 2021, 3 (06) : 459 - 459
  • [7] Convex Optimization: Algorithms and Complexity
    不详
    [J]. FOUNDATIONS AND TRENDS IN MACHINE LEARNING, 2015, 8 (3-4): : 232 - +
  • [8] Aviv RZ, 2021, Arxiv, DOI arXiv:2106.12261
  • [9] Balle B, 2018, ADV NEUR IN, V31
  • [10] Banner R, 2019, ADV NEUR IN, V32