SLC: A Permissioned Blockchain for Secure Distributed Machine Learning against Byzantine Attacks

被引:1
作者
Liang, Lun [1 ]
Cao, Xianghui [1 ]
Zhang, Jun [2 ]
Sun, Changyin [1 ]
机构
[1] Southeast Univ, Sch Automat, Nanjing, Peoples R China
[2] Wuhan Univ, Sch Elect Engn & Automat, Wuhan, Peoples R China
来源
2020 CHINESE AUTOMATION CONGRESS (CAC 2020) | 2020年
关键词
Distributed Machine Learning; Byzantine Attacks; Secure Learning Chain; INTERNET;
D O I
10.1109/CAC51589.2020.9327384
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As data volume and complexity of the machine learning model increase, designing a secure and effective distributed machine learning (DML) algorithm is in direct need. Most traditional master-worker type of DML algorithms assume a trusted central server and study security issues on workers. Several researchers bridged DML and blockchain to defend against malicious central servers. However, some critical challenges remain, such as not being able to identify Byzantine nodes, not being robust to Byzantine attacks, requiring large communication overhead. To address these issues, in this paper, we propose a permissioned blockchain framework for secure DML. called Secure Learning Chain (SLC). Specifically, we design an Identifiable Practical Byzantine Fault Tolerance (IPBFT) consensus algorithm to defend against malicious central servers. This algorithm can also identify malicious central servers and reduce communication complexity. In addition, we propose a Mixed Ace-based multi-Krum Aggregation (MAKA) algorithm to prevent Byzantine attacks from malicious workers. Finally, our experiment results demonstrate our proposed model's efficiency and effectiveness.
引用
收藏
页码:7073 / 7078
页数:6
相关论文
共 44 条
  • [31] Secure Feedback to Edge Servers in Distributed Machine Learning Using Rich Clients
    Takano, Saki
    Nakao, Akihiro
    Yamagchi, Saneyasu
    Oguchi, Masato
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 934 - 939
  • [32] SDCBM: A Secure Data Collection Model With Blockchain and Machine Learning Integration for Wireless Sensor Networks
    Raj, P. V. Pravija
    Khedr, Ahmed M.
    IEEE SENSORS JOURNAL, 2025, 25 (04) : 7457 - 7466
  • [33] Malicious Node Detection Using Machine Learning and Distributed Data Storage Using Blockchain in WSNs
    Nouman, Muhammad
    Qasim, Umar
    Nasir, Hina
    Almasoud, Abdullah
    Imran, Muhammad
    Javaid, Nadeem
    IEEE ACCESS, 2023, 11 : 6106 - 6121
  • [34] Rigorous Evaluation of Machine Learning-based Intrusion Detection Against Adversarial Attacks
    Gungor, Onat
    Li, Elvin
    Shang, Zhengli
    Guo, Yutong
    Chen, Jing
    Davis, Johnathan
    Rosing, Tajana
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 152 - 158
  • [35] Towards Secure Fitness Framework Based on IoT-Enabled Blockchain Network Integrated with Machine Learning Algorithms
    Jamil, Faisal
    Kahng, Hyun Kook
    Kim, Suyeon
    Kim, Do-Hyeun
    SENSORS, 2021, 21 (05) : 1 - 31
  • [36] An Effective Classification of DDoS Attacks in a Distributed Network by Adopting Hierarchical Machine Learning and Hyperparameters Optimization Techniques
    Dasari, Sandeep
    Kaluri, Rajesh
    IEEE ACCESS, 2024, 12 : 10834 - 10845
  • [37] IS HIDDEN SAFE? LOCATION PROTECTION AGAINST MACHINE-LEARNING PREDICTION ATTACKS IN SOCIAL NETWORKS
    Han, Xiao
    Wang, Leye
    Fan, Weiguo
    MIS QUARTERLY, 2021, 45 (02) : 821 - 858
  • [38] Adversary-Resilient Distributed and Decentralized Statistical Inference and Machine Learning: An Overview of Recent Advances Under the Byzantine Threat Model
    Yang, Zhixiong
    Gang, Arpita
    Bajwa, Waheed U.
    IEEE SIGNAL PROCESSING MAGAZINE, 2020, 37 (03) : 146 - 159
  • [39] ICMPv6-Based DoS and DDoS Attacks Detection Using Machine Learning Techniques, Open Challenges, and Blockchain Applicability: A Review
    Tayyab, Mohammad
    Belaton, Bahari
    Anbar, Mohammed
    IEEE ACCESS, 2020, 8 : 170529 - 170547
  • [40] Defense Against Machine Learning Based Attacks in Multi-UAV Networks: A Network Coding Based Approach
    Chen, Yu-Jia
    Chen, Xiao-Chun
    Pan, Miao
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (04): : 2562 - 2578