Secure peer-to-peer learning using feature embeddings

被引:1
|
作者
Kasturi, Anirudh [1 ]
Agrawal, Akshat [1 ]
Hota, Chittaranjan [1 ]
机构
[1] BITS Pilani, Comp Sci Dept, Hyderabad Campus, Hyderabad 500078, Telangana, India
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 03期
关键词
Distributed learning; Communication efficiency; Privacy; Peer-to-Peer learning; Serverless computing;
D O I
10.1007/s10586-023-04155-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With more personal devices being connected to the internet, individuals are becoming increasingly concerned about privacy. Therefore, it is important to develop machine learning algorithms that can use customer data to create personalized models while still adhering to strict privacy laws. In this paper, we propose a robust solution to this problem in a distributed, asynchronous environment with a verifiable convergence rate. Our proposed framework trains a Convolutional Neural Network on each client and sends the feature embeddings to other clients for data aggregation. This allows each client to train a deep-learning model on feature embeddings gathered from various clients in a single communication cycle. We provide a detailed description of the architecture and execution of our suggested approach. Our technique's effectiveness is evaluated by comparing it to the top central training and federated learning (FL) algorithms, and our tests on diverse datasets demonstrate that our method outperforms FL in terms of accuracy and is comparable to central training algorithms. Our findings also show that our proposed method reduces data transfer by over 75% compared to FL, resulting in significant bandwidth savings. As a result, model training can assist companies with high security and data protection concerns in setting up reliable collaboration platforms without requiring a central service provider.
引用
收藏
页码:3471 / 3479
页数:9
相关论文
共 50 条
  • [11] Efficient Parameter Synchronization for Peer-to-Peer Distributed Learning With Selective Multicast
    Luo, Shouxi
    Fan, Pingzhi
    Li, Ke
    Xing, Huanlai
    Luo, Long
    Yu, Hongfang
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2025, 18 (01) : 156 - 168
  • [12] WebFLex: A Framework for Web Browsers-Based Peer-to-Peer Federated Learning Systems Using WebRTC
    Alzamel, Mai
    Rizvi, Hamza Ali
    Altwaijry, Najwa
    Al-Turaiki, Isra
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 78 (03): : 4177 - 4204
  • [13] PPAA: peer-to-peer anonymous authentication
    Tsang, Patrick P.
    Smith, Sean W.
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 55 - 74
  • [14] Using a Structured Interactive Peer-to-Peer Video Tool to Facilitate Learning in Development Level Speed Skaters
    Hillis, Tracy L.
    Milajerdi, Homa Rafiei
    Katz, Larry
    9TH INTERNATIONAL PERFORMANCE ANALYSIS WORKSHOP AND CONFERENCE & 5TH IACSS CONFERENCE, 2022, : 138 - 144
  • [15] Simple Peer-to-Peer SIP Privacy
    Koskela, Joakim
    Tarkoma, Sasu
    SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 226 - +
  • [16] SparSFA: Towards robust and communication-efficient peer-to-peer federated learning
    Wang, Han
    Munoz-Gonzalez, Luis
    Hameed, Muhammad Zaid
    Eklund, David
    Raza, Shahid
    COMPUTERS & SECURITY, 2023, 129
  • [17] CFL: Cluster Federated Learning in Large-Scale Peer-to-Peer Networks
    Chen, Qian
    Wang, Zilong
    Zhou, Yilin
    Chen, Jiawei
    Xiao, Dan
    Lin, Xiaodong
    INFORMATION SECURITY, ISC 2022, 2022, 13640 : 464 - 472
  • [18] Using recurring costs for reputation management in peer-to-peer streaming systems
    Rossberg, Michael
    Schaefer, Guenter
    Strufe, Thorsten
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 283 - 292
  • [19] Survey on Anonymity in Unstructured Peer-to-Peer Systems
    Ren-Yi Xiao
    Journal of Computer Science and Technology, 2008, 23 : 660 - 671
  • [20] Survey on anonymity in unstructured Peer-to-Peer systems
    Xiao, Ren-Yi
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2008, 23 (04) : 660 - 671