Federated Learning With Unreliable Clients: Performance Analysis and Mechanism Design

被引:21
作者
Ma, Chuan [1 ]
Li, Jun [1 ]
Ding, Ming [2 ]
Wei, Kang [1 ]
Chen, Wen [3 ]
Poor, H. Vincent [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Elect & Opt Engn, Nanjing 210094, Peoples R China
[2] CSIRO, Data61, Sydney, NSW 2015, Australia
[3] Princeton Univ, Dept Elect & Comp Engn, Princeton, NJ 08544 USA
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Training; Servers; Hidden Markov models; Data models; Convergence; Computational modeling; Biological system modeling; Convergence bound; defensive mechanism; federated learning (FL); unreliable clients; NETWORKS; SECURITY; PRIVACY;
D O I
10.1109/JIOT.2021.3079472
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Owing to the low communication costs and privacy-promoting capabilities, federated learning (FL) has become a promising tool for training effective machine learning models among distributed clients. However, with the distributed architecture, low-quality models could be uploaded to the aggregator server by unreliable clients, leading to a degradation or even a collapse of training. In this article, we model these unreliable behaviors of clients and propose a defensive mechanism to mitigate such a security risk. Specifically, we first investigate the impact on the models caused by unreliable clients by deriving a convergence upper bound on the loss function based on the gradient descent updates. Our bounds reveal that with a fixed amount of total computational resources, there exists an optimal number of local training iterations in terms of convergence performance. We further design a novel defensive mechanism, named deep neural network-based secure aggregation (DeepSA). Our experimental results validate our theoretical analysis. In addition, the effectiveness of DeepSA is verified by comparing with other state-of-the-art defensive mechanisms.
引用
收藏
页码:17308 / 17319
页数:12
相关论文
共 34 条
  • [1] Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
  • [2] Baruch M, 2019, ADV NEUR IN, V32
  • [3] Bhagoji AN, 2019, PR MACH LEARN RES, V97
  • [4] Biggio B., 2012, P 29 INT C MACH LEAR
  • [5] Security Evaluation of Pattern Classifiers under Attack
    Biggio, Battista
    Fumera, Giorgio
    Roli, Fabio
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (04) : 984 - 996
  • [6] Blanchard P, 2017, ADV NEUR IN, V30
  • [7] Real-time Collision Risk Estimation based on Pearson's Correlation Coefficient: comparative analysis with real distance from the Velodyne 3D laser scanner
    Bravo Solis, E. D.
    Miranda Neto, A.
    Nina Huallpa, B.
    [J]. PROCEEDINGS OF 13TH LATIN AMERICAN ROBOTICS SYMPOSIUM AND 4TH BRAZILIAN SYMPOSIUM ON ROBOTICS - LARS/SBR 2016, 2016, : 234 - 238
  • [8] Fog and IoT: An Overview of Research Opportunities
    Chiang, Mung
    Zhang, Tao
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06): : 854 - 864
  • [9] Fang MH, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1623
  • [10] Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
    Hitaj, Briland
    Ateniese, Giuseppe
    Perez-Cruz, Fernando
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 603 - 618