Secure Federated Matrix Factorization

被引:245
作者
Chai, Di [1 ]
Wang, Leye [2 ]
Chen, Kai [3 ]
Yang, Qiang [3 ]
机构
[1] Hong Kong Univ Sci & Technol, Comp Sci & Engn, Hong Kong, Peoples R China
[2] Peking Univ, Key Lab High Confidence Software Technol, Beijing, Peoples R China
[3] Hong Kong Univ Sci & Technol, Hong Kong, Peoples R China
关键词
Servers; Encryption; Privacy; Data models; Mathematical model; Machine learning; IEEE Intelligent system; Security and Privacy Protection; Distributed system;
D O I
10.1109/MIS.2020.3014880
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
To protect user privacy and meet law regulations, federated (machine) learning is obtaining vast interests in recent years. The key principle of federated learning is training a machine learning model without needing to know each user's personal raw private data. In this article, we propose a secure matrix factorization framework under the federated learning setting, called FedMF. First, we design a user-level distributed matrix factorization framework where the model can be learned when each user only uploads the gradient information (instead of the raw preference data) to the server. While gradient information seems secure, we prove that it could still leak users' raw data. To this end, we enhance the distributed matrix factorization framework with homomorphic encryption. We implement the prototype of FedMF and test it with a real movie rating dataset. Results verify the feasibility of FedMF. We also discuss the challenges for applying FedMF in practice for future research.
引用
收藏
页码:11 / 19
页数:9
相关论文
共 10 条
[1]  
Ammad-ud-din M, 2019, ARXIV190109888 CORR
[2]  
Berlioz A., 2015, P 9 ACM C REC SYST S, DOI DOI 10.1145/2792838.2800173
[3]   Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption [J].
Kim, Sungwook ;
Kim, Jinsu ;
Koo, Dongyoung ;
Kim, Yuna ;
Yoon, Hyunsoo ;
Shin, Junbum .
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :617-628
[4]   MATRIX FACTORIZATION TECHNIQUES FOR RECOMMENDER SYSTEMS [J].
Koren, Yehuda ;
Bell, Robert ;
Volinsky, Chris .
COMPUTER, 2009, 42 (08) :30-37
[5]  
Paillier P, 1999, LECT NOTES COMPUT SC, V1592, P223
[6]   Privacy-Preserving Deep Learning via Additively Homomorphic Encryption [J].
Phong, Le Trieu ;
Aono, Yoshinori ;
Hayashi, Takuya ;
Wang, Lihua ;
Moriai, Shiho .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (05) :1333-1345
[7]   Sparse Mobile Crowdsensing: Challenges and Opportunities [J].
Wang, Leye ;
Zhang, Daqing ;
Wang, Yasha ;
Chen, Chao ;
Han, Xiao ;
M'hamed, Abdallah .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (07) :161-167
[8]  
Yang Q., 2019, Federated learning, V13, P1
[9]   Federated Machine Learning: Concept and Applications [J].
Yang, Qiang ;
Liu, Yang ;
Chen, Tianjian ;
Tong, Yongxin .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2019, 10 (02)
[10]  
Zhu LG, 2019, ADV NEUR IN, V32