Efficient and Secure Federated Learning With Verifiable Weighted Average Aggregation

被引:20
作者
Yang, Zhen [1 ]
Zhou, Ming [1 ]
Yu, Haiyang [1 ]
Sinnott, Richard O. [2 ]
Liu, Huan [3 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Univ Melbourne, Fac Engn & Informat Technol, Sch Comp & Informat Syst, Melbourne, Vic 3040, Australia
[3] Arizona State Univ, Sch Comp Informat & Decis Syst, Ira A Fulton Sch Engn, Tempe, AZ 85281 USA
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2023年 / 10卷 / 01期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Servers; Hash functions; Collaborative work; Cryptography; Training; Privacy; Data models; Federated learning; homomorphic hash function; verifiability; weighted average aggregation; PRIVACY;
D O I
10.1109/TNSE.2022.3206243
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Federated learning allows a large number of participants to collaboratively train a global model without sharing participant's local data. Participants train local models with their local data and send gradients to the cloud server for aggregation. Unfortunately, as a third party, the cloud server cannot be fully trusted. Existing research has shown that a compromised cloud server can extract sensitive information of participant's local data from gradients. In addition, it can even forge the aggregation result to corrupt the global model without being detected. Therefore, in a secure federated learning system, both the privacy and aggregation correctness of the uploaded gradients should be guaranteed. In this article, we propose a secure and efficient federated learning scheme with verifiable weighted average aggregation. By adopting the masking technique to encrypt both weighted gradients and data size, our scheme can support the privacy-preserving weighted average aggregation of gradients. Moreover, we design the verifiable aggregation tag and propose an efficient verification method to validate the weighted average aggregation result, which greatly improves the performance of the aggregation verification. Security analysis shows that our scheme is provably secure. Extensive experiments demonstrate the efficiency of our scheme compared with the state-of-the-art approaches.
引用
收藏
页码:205 / 222
页数:18
相关论文
共 46 条
[1]  
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[2]  
Beimel A., 1996, Ph.D. Thesis
[3]  
Bisong E, 2019, BUILDING MACHINE LEA
[4]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]  
Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
[7]   Communication-Efficient Federated Deep Learning With Layerwise Asynchronous Model Update and Temporally Weighted Aggregation [J].
Chen, Yang ;
Sun, Xiaoyan ;
Jin, Yaochu .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2020, 31 (10) :4229-4238
[8]   SecureBoost: A Lossless Federated Learning Framework [J].
Cheng, Kewei ;
Fan, Tao ;
Jin, Yilun ;
Liu, Yang ;
Chen, Tianjian ;
Papadopoulos, Dimitrios ;
Yang, Qiang .
IEEE INTELLIGENT SYSTEMS, 2021, 36 (06) :87-98
[9]   Differential privacy: A survey of results [J].
Dwork, Cynthia .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 :1-19
[10]   The EU General Data Protection Regulation (GDPR): European regulation that has a global impact [J].
Goddard, Michelle .
INTERNATIONAL JOURNAL OF MARKET RESEARCH, 2017, 59 (06) :703-705