Highly efficient federated learning with strong privacy preservation in cloud computing

被引:72
作者
Fang, Chen [1 ]
Guo, Yuanbo [1 ]
Wang, Na [1 ]
Ju, Ankang [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Highly efficient; Federated learning; Privacy preservation; Optimization strategy; Secure multi-party computation;
D O I
10.1016/j.cose.2020.101889
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Federated learning is a new machine learning framework that allows mutually distrusting clients to reap the benefits from the joint training model without explicitly disclosing their private datasets. However, the high communication cost between the cloud server and clients has become the main challenge due to the limited network bandwidth. Moreover, the model parameters it shares may be utilized to perform model inversion attacks. Aimed at these problems, a new scheme for highly efficient federated learning with strong privacy preservation in cloud computing is presented. We design a lightweight encryption protocol to provide provably privacy preservation while maintaining desirable model utility. Additionally, an efficient optimization strategy is employed to enhance the training efficiency. Under the defined threat model, we prove the proposed scheme is secure against the honest-but-curious server and extreme collusion. We evaluate the effectiveness of our scheme and compare it with existing related works on MNIST and UCI Human Activity Recognition Dataset. Results show that our scheme reduces the execution time by 20% and transmitted ciphertext size by 85% on average while achieving similar accuracy as the compared secure multiparty computation (SMC) based methods. (C) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 26 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
Anguita D., 2012, Proceedings, VVolume 7657, P216
[3]  
Badsha S, 2019, 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P708, DOI 10.1109/CCWC.2019.8666477
[4]   The Algorithmic Foundations of Differential Privacy [J].
Dwork, Cynthia ;
Roth, Aaron .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4) :211-406
[5]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[6]   CPS data streams analytics based on machine learning for Cloud and Fog Computing: A survey [J].
Fei, Xiang ;
Shah, Nazaraf ;
Verba, Nandor ;
Chao, Kuo-Ming ;
Sanchez-Anguix, Victor ;
Lewandowski, Jacek ;
James, Anne ;
Usman, Zahid .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 90 :435-450
[7]   Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures [J].
Fredrikson, Matt ;
Jha, Somesh ;
Ristenpart, Thomas .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :1322-1333
[8]  
Graves A, 2013, INT CONF ACOUST SPEE, P6645, DOI 10.1109/ICASSP.2013.6638947
[9]   Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning [J].
Hitaj, Briland ;
Ateniese, Giuseppe ;
Perez-Cruz, Fernando .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :603-618
[10]  
Li N., 2010, 2010 2 INT C COMP EN, V4