Privacy-Preserving Incentive Mechanism Design for Federated Cloud-Edge Learning

被引:42
作者
Liu, Tianyu [1 ]
Di, Boya [1 ]
An, Peng [2 ]
Song, Lingyang [1 ]
机构
[1] Peking Univ, Dept Elect, Beijing 100871, Peoples R China
[2] Beijing Wondersoft Technol Corp, Beijing 100080, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2021年 / 8卷 / 03期
基金
中国国家自然科学基金;
关键词
Data models; Task analysis; Privacy; Data privacy; Training; Computational modeling; Servers; Cloud-edge computing; federated learning; differential privacy; incentive mechanism; RESOURCE-ALLOCATION; OPTIMIZATION;
D O I
10.1109/TNSE.2021.3100096
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
To avoid the original private data uploading in cloud-edgecomputing, the federated learning (FL) scheme is recently proposed which enhances the privacy preservation. However, the attacks against the uploaded model updates in FL can still cause private data leakage which demotivates the privacy-sensitive participating edge devices. To address this issue, we aim to design a privacy-preserving incentive mechanism for the federated cloud-edge learning (PFCEL) system such that 1) the privacy-sensitive edge devices are motivated to contribute to the local training and model uploading, 2) a trade-off between the private data leakage and the model accuracy is achieved. We first model the data leakage quantitatively from an adversarial perspective, and then formulate the incentive design problem as a three-layer Stackelberg game, where the interaction between the edge servers and edge devices is further formulated as an optimal contract design problem. Extensive theoretical analysis and numerical evaluations demonstrate the effectiveness of our designed mechanism in terms of privacy preservation and system utility.
引用
收藏
页码:2588 / 2600
页数:13
相关论文
共 37 条
[1]  
AI F., 2020, DATA MONETIZATION MA
[2]  
Basar T., 1998, SOC IND APPL MATH, V2nd
[3]   On the Lambert W function [J].
Corless, RM ;
Gonnet, GH ;
Hare, DEG ;
Jeffrey, DJ ;
Knuth, DE .
ADVANCES IN COMPUTATIONAL MATHEMATICS, 1996, 5 (04) :329-359
[4]  
Deng L., 2012, IEEE Signal Process. Mag., V29
[5]  
Du W., 2001, WORKSH NEW SEC PAR, P13
[6]   The Algorithmic Foundations of Differential Privacy [J].
Dwork, Cynthia ;
Roth, Aaron .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4) :211-406
[7]   A guide to deep learning in healthcare [J].
Esteva, Andre ;
Robicquet, Alexandre ;
Ramsundar, Bharath ;
Kuleshov, Volodymyr ;
DePristo, Mark ;
Chou, Katherine ;
Cui, Claire ;
Corrado, Greg ;
Thrun, Sebastian ;
Dean, Jeff .
NATURE MEDICINE, 2019, 25 (01) :24-29
[8]  
Geiping J, 2020, 34 C NEURAL INFORM P, V33
[9]  
Gentry C., 2009, Stanford University
[10]  
Goodfellow I, 2016, ADAPT COMPUT MACH LE, P1