Efficient federated learning privacy preservation method with heterogeneous differential privacy

被引:16
作者
Ling, Jie [1 ]
Zheng, Junchang [1 ]
Chen, Jiahui [1 ]
机构
[1] Guangdong Univ Technol, Sch Comp Sci & Technol, Guangzhou 510006, Peoples R China
关键词
Federated learning; Differential privacy; Privacy computing; Heterogeneous differential privacy; Privacy-utility tradeoff;
D O I
10.1016/j.cose.2024.103715
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Federated learning (FL) is a distributed machine learning method that effectively protects personal data. Many studies on federated learning assumed that all clients have consistent privacy parameters. However, in practice, different clients have different privacy requirements, and heterogeneous differential privacy can personalize privacy protection according to each client's privacy budget and requirements. In this study, we propose an improved efficient FL privacy preservation method with heterogeneous differential privacy, which can compute the corresponding privacy budget weights for each client according to noise size using the secure differential privacy stochastic gradient descent protocol, histogram of oriented gradients feature extraction and weighted averaging of the heterogeneous privacy budgets. Through this method, the noisier clients are given smaller privacy budgets weights to mitigate their negative impact on the aggregation model. Experiments comparing the baseline method were performed on the MNIST, fMNIST and cifar10 datasets. More precisely, the experimental results showed that our method improves the model accuracy by 6.68% and 7.18% of 20 to 50 clients and 16.08% and 17.37% of 60 to 100 clients, respectively. Moreover, the communication overhead time was reduced by 23.85%, which validates the effectiveness and usability of the proposed method.
引用
收藏
页数:10
相关论文
共 31 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
Alaggan M, 2015, Arxiv, DOI arXiv:1504.06998
[3]   PROCHLO: Strong Privacy for Analytics in the Crowd [J].
Bittau, Andrea ;
Erlingsson, Ulfar ;
Maniatis, Petros ;
Mironov, Ilya ;
Raghunathan, Ananth ;
Lie, David ;
Rudominer, Mitch ;
Kode, Ushasree ;
Tinnes, Julien ;
Seefeld, Bernhard .
PROCEEDINGS OF THE TWENTY-SIXTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '17), 2017, :441-459
[4]  
McMahan HB, 2018, Arxiv, DOI arXiv:1710.06963
[5]  
Ding BL, 2017, ADV NEUR IN, V30
[6]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1
[7]  
Feng TT, 2022, Arxiv, DOI arXiv:2204.02500
[8]  
Gao D., 2022, arXiv
[9]  
Ge Yang, 2021, 2021 IEEE 6th International Conference on Computer and Communication Systems (ICCCS), P484, DOI 10.1109/ICCCS52626.2021.9449232
[10]  
Girgis Antonious, 2021, PMLR, P2521