Privacy protection federated learning system based on blockchain and edge computing in mobile crowdsourcing

被引:30
作者
Wang, Weilong [1 ,2 ]
Wang, Yingjie [1 ,2 ]
Huang, Yan [3 ]
Mu, Chunxiao [1 ,2 ]
Sun, Zice [1 ,2 ]
Tong, Xiangrong [1 ,2 ]
Cai, Zhipeng [4 ]
机构
[1] Yantai Univ, Sch Comp & Control Engn, Yantai 264005, Peoples R China
[2] Yantai Key Lab High End Ocean Engn Equipment & In, Yantai 264005, Peoples R China
[3] Kennesaw State Univ, Dept Software Enportraitgineering & Game Dev, 1100 South Marietta Pkwy, Marietta, GA 30060 USA
[4] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30303 USA
基金
中国国家自然科学基金;
关键词
Mobile crowdsourcing; Privacy protection; Blockchain; Edge computing; Federated learning; Localized Differential Privacy; INCENTIVE MECHANISM; AGGREGATION;
D O I
10.1016/j.comnet.2022.109206
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid popularization and development of the Internet of Things (IoT) and 5G networks, mobile crowdsourcing (MCS) has become an indispensable part in today's society. However, when task participants submit tasks, they are likely to expose their data privacy and location privacy. These privacy will be maliciously attacked and exploited by attackers (external attackers and untrusted third party). With the rapid increase of MCS data throughput, traditional cloud platforms can no longer meet the huge data processing needs. To solve these problems, this paper proposes an MCS federated learning system based on Blockchain and edge computing. This paper uses federated learning as the framework of the MCS system. The system protects data privacy and location privacy by using the Double local disturbance Localized Differential Privacy (DLD-LDP) proposed in this paper. Because the sensed data exists in multiple modalities (text, video, audio, etc.), this paper uses the Multi-modal Transformer (MulT) method to merge the multi-modal data before subsequent operations. To solve the problem that the third party is untrusted, we utilize Blockchain to distribute tasks and collect models in a distributed way. A reputation calculation method (Sig-RCU) is proposed to calculate the real-time reputation of task participants. Through conducting experiments on real data sets, the effectiveness and adaptation of the proposed DLD-LDP algorithm and Sig-RCU algorithm are verified.
引用
收藏
页数:16
相关论文
共 68 条
[21]   Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning [J].
Jagielski, Matthew ;
Oprea, Alina ;
Biggio, Battista ;
Liu, Chang ;
Nita-Rotaru, Cristina ;
Li, Bo .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :19-35
[22]   Hashtag Recommendation Based on Multi-Features of Microblogs [J].
Kou, Fei-Fei ;
Du, Jun-Ping ;
Yang, Cong-Xian ;
Shi, Yan-Song ;
Cui, Wan-Qiu ;
Liang, Mei-Yu ;
Geng, Yue .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (04) :711-726
[23]   A semantic modeling method for social network short text based on spatial and temporal characteristics [J].
Kou, Feifei ;
Du, Junping ;
Lin, Zijian ;
Liang, Meiyu ;
Li, Haisheng ;
Shi, Lei ;
Yang, Congxian .
JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 28 :281-293
[24]   Prior Knowledge-Based Probabilistic Collaborative Representation for Visual Recognition [J].
Lan, Rushi ;
Zhou, Yicong ;
Liu, Zhenbing ;
Luo, Xiaonan .
IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (04) :1498-1508
[25]   A Differentially Private Data Aggregation Method Based on Worker Partition and Location Obfuscation for Mobile Crowdsensing [J].
Li, Shuyu ;
Zhang, Guozheng .
CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (01) :223-241
[26]   Optimized Content Caching and User Association for Edge Computing in Densely Deployed Heterogeneous Networks [J].
Li, Yun ;
Ma, Hui ;
Wang, Lei ;
Mao, Shiwen ;
Wang, Guoyin .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (06) :2130-2142
[27]   CrowdSFL: A Secure Crowd Computing Framework Based on Blockchain and Federated Learning [J].
Li, Ziyuan ;
Liu, Jian ;
Hao, Jialu ;
Wang, Huimei ;
Xian, Ming .
ELECTRONICS, 2020, 9 (05)
[28]   Abstractive social media text summarization using selective reinforced Seq2Seq attention model [J].
Liang, Zeyu ;
Du, Junping ;
Li, Chaoyang .
NEUROCOMPUTING, 2020, 410 :432-440
[29]   Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT [J].
Liu, Tianen ;
Wang, Yingjie ;
Li, Yingshu ;
Tong, Xiangrong ;
Qi, Lianyong ;
Jiang, Nan .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09) :7928-7940
[30]  
Liu X., 2016, CHIN J NETW INF SECU, V2, P11