ComAvg: Robust decentralized federated learning with random committees

被引:2
作者
Zhou, Sicong [1 ]
Huang, Huawei [2 ]
Li, Ruixin [1 ]
Liu, Jialiang [1 ]
Zheng, Zibin [1 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou, Peoples R China
[2] Sun Yat sen Univ, Sch Software Engn, Zhuhai, Peoples R China
关键词
Federated learning; IoT; Byzantine-resilient machine learning;
D O I
10.1016/j.comcom.2023.09.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Federated learning (FL) has been widely used in IoT applications. However, FL is vulnerable to various attacks in its each phase. Existing defense in federated learning mainly focus on the centralized setting. And centralized parameter-server settings require a trusted third party to collect and distribute model parameters. However, the requirement of a trusted third party cannot always be satisfied in many cases. Meanwhile, the centralized settings suffer from the inherent vulnerability of single-point-of-failure (SPOF), in which the whole system cease to function once the parameter server is broken. Therefore, decentralized federated learning has gain great attention recently. Existing conventional defense strategies are mostly designed for the centralized parameter-server architecture. The problem is that these conventional defense strategies cannot cope with new challenges occurred in highly decentralized settings of FL. Firstly, in a trustless setting, malicious participants can cause breakdown to the whole system on the communication level by disrupting model exchanges. Secondly, current defensive methods cannot effectively identify and rule out malicious participants. In either case, a harmful bias hurts the performance even if malicious participants do not perform model-level attacks. Therefore, defensive strategies for the decentralized-manner FL are in urgent need. To this end, we propose a committee-based FL system, named ComAvg, under a trustless setting. ComAvg provides a general coordination scheme for robust aggregation of distributed learning. With reliability assessment scheme to expel abnormal participants and fortified classic model exchange methods, the conventional centralized methods of FL can be easily modified into decentralized versions to cope with the two challenges aforementioned. Finally, we implement a prototype of ComAvg and perform various groups of evaluations on its robustness. The prototype-based evaluation results and theoretical analysis show that the proposed ComAvg is effective against model attacks such as sign-flipping and communication-level isolating attacks.
引用
收藏
页码:147 / 156
页数:10
相关论文
共 39 条
[1]   Towards a Scalable and Robust DHT [J].
Awerbuch, Baruch ;
Scheideler, Christian .
THEORY OF COMPUTING SYSTEMS, 2009, 45 (02) :234-260
[2]  
Baruch M, 2019, ADV NEUR IN, V32
[3]  
Bellet A, 2018, PR MACH LEARN RES, V84
[4]  
Blanchard P, 2017, ADV NEUR IN, V30
[5]  
Caldas S., 2018, arXiv
[6]  
Cao XY, 2022, Arxiv, DOI arXiv:2012.13995
[7]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[8]  
Chen BY, 2018, Arxiv, DOI arXiv:1811.03728
[9]  
Damaskinos G., 2019, PROC MACH LEARN SYST, P81, DOI DOI 10.1016/J.PROCS.2019.11.017
[10]  
Nguyen TD, 2022, Arxiv, DOI arXiv:2101.02281