RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning

被引:21
作者
Liu, Yang [1 ]
Ma, Zhuo [1 ]
Yang, Yilong [1 ]
Liu, Ximeng [2 ,3 ]
Ma, Jianfeng [1 ]
Ren, Kui [4 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Fuzhou Univ, Coll Math & Comp Sci, Fuzhou 350108, Peoples R China
[3] Peng Cheng Lab, Cyberspace Secur Res Ctr, Shenzhen 518066, Peoples R China
[4] Zhejiang Univ, Inst Cyberspace Res, Hangzhou 310027, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Radio frequency; Collaborative work; Companies; Data models; Servers; Privacy; Data privacy; Privacy-preserving; random forest; revocable federated learning;
D O I
10.1109/TDSC.2021.3104842
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Random forest is one of the most heated machine learning tools in a wide range of industrial scenarios. Recently, federated learning enables efficient distributed machine learning without direct revealing of private participant data. In this article, we present a novel framework of federated random forest (RevFRF), and further emphatically discuss the participant revocation problem of federated learning based on RevFRF. Specifically, RevFRF first introduces a suite of homomorphic encryption based secure protocols to implement federated random forest (RF). The protocols cover the whole lifecycle of an RF model, including construction, prediction and participant revocation. Then, referring to the practical application scenarios of RevFRF, the existing federated learning frameworks ignore a fact that even every participant in federated learning cannot maintain the cooperation with others forever. In company-level cooperation, allowing the remaining companies to use a trained model that contains the memories from an off-lying company potentially leads to a significant conflict of interest. Therefore, we propose the revocable federated learning concept and illustrate how RevFRF implements participant revocation in applications. Through theoretical analysis and experiments, we show that the protocols can efficiently implement federated RF and ensure the memories of a revoked participant in the trained RF to be securely removed.
引用
收藏
页码:3671 / 3685
页数:15
相关论文
共 43 条
[1]  
Abspoel Mark, 2021, Proceedings on Privacy Enhancing Technologies, V2021, P167, DOI 10.2478/popets-2021-0010
[2]  
Ali J., 2012, INT J COMPUT SCI ISS, V9, P272
[3]  
[Anonymous], 2014, The art of computer programming: seminumerical algorithms
[4]  
Bonawitz K, 2019, Arxiv, DOI arXiv:1902.01046
[5]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[6]   Machine Learning Classification over Encrypted Data [J].
Bost, Raphael ;
Popa, Raluca Ada ;
Tu, Stephen ;
Goldwasser, Shafi .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[7]  
Bourtoule L, 2020, Arxiv, DOI arXiv:1912.03817
[8]   Random forests [J].
Breiman, L .
MACHINE LEARNING, 2001, 45 (01) :5-32
[9]  
McMahan HB, 2018, Arxiv, DOI arXiv:1710.06963
[10]  
Bresson E, 2003, LECT NOTES COMPUT SC, V2894, P37