MLChain: a privacy-preserving model learning framework using blockchain

被引:0
作者
Bansal, Vidhi [1 ]
Baliyan, Niyati [2 ]
Ghosh, Mohona [1 ]
机构
[1] Indira Gandhi Delhi Tech Univ Women, Dept Informat Technol, New Delhi, India
[2] Natl Inst Technol Kurukshetra, Dept Comp Engn, Kurukshetra, India
关键词
Machine learning; Blockchain; Classification; Privacy-preserving; Predictive modeling; PROPAGATION LOGISTIC-REGRESSION;
D O I
10.1007/s10207-023-00754-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this work, we present a blockchain-based secure and flexible distributed privacy-preserving online model that helps in sharing key features of datasets across multiple organizations without violating the privacy of data. In our model, all members are encouraged to participate, discouraged to write fake data. Learning is carried out without sharing of raw data, and data sharing is immutable that improves prediction results of the data held by each member of an industry. We also propose a new consensus algorithm-Proof of Share for adding a valid transaction to the blockchain, thus preventing non participating members from reading any of the data shared by the peer and discouraging fake writes. We evaluated our model on 3, 5, and 10 members setup by applying decision tree, logistic regression, Gaussian naive Bayes, and support vector machine classifiers. The maximum increase of 26.9231% was observed in accuracy where results of a member's data were taken as baseline. F-beta(beta = 0.5) score increased by 0.4533 and F-1 score by 0.0800. The proposed model to the best of our knowledge is the only one that encourages all members to participate, rather than being passive listeners and discourages a member from forging results thus rendering it suitable for utilization in domains like health care, finance, education, etc. where data are unevenly split and secrecy of data and peers is required.
引用
收藏
页码:649 / 677
页数:29
相关论文
共 48 条
  • [41] Federated Learning With Differential Privacy: Algorithms and Performance Analysis
    Wei, Kang
    Li, Jun
    Ding, Ming
    Ma, Chuan
    Yang, Howard H.
    Farokhi, Farhad
    Jin, Shi
    Quek, Tony Q. S.
    Vincent Poor, H.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3454 - 3469
  • [42] AUTHENTICATION FOR DISTRIBUTED SYSTEMS
    WOO, TYC
    LAM, SS
    [J]. COMPUTER, 1992, 25 (01) : 39 - 52
  • [43] Wright R.E., 1995, READING UNDERSTANDIN, P217
  • [44] Grid Binary LOgistic REgression (GLORE): building shared models without sharing data
    Wu, Yuan
    Jiang, Xiaoqian
    Kim, Jihoon
    Ohno-Machado, Lucila
    [J]. JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2012, 19 (05) : 758 - 764
  • [45] Xie M., 2020, ARXIV
  • [46] A Comprehensive Survey of Privacy-preserving Federated Learning: A Taxonomy, Review, and Future Directions
    Yin, Xuefei
    Zhu, Yanming
    Hu, Jiankun
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (06)
  • [47] Zhang YL, 2017, PROCEEDINGS OF THE TWENTY-SIXTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES (SOSP '17), P19, DOI [10.1109/SP.2017.12, 10.1145/3132747.3132768]
  • [48] Blockchain challenges and opportunities: a survey
    Zheng, Zibin
    Xie, Shaoan
    Dai, Hong-Ning
    Chen, Xiangping
    Wang, Huaimin
    [J]. INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (04) : 352 - 375