Privacy-Preserving Data Sharing Scheme with FL via MPC in Financial Permissioned Blockchain

被引:9
作者
Liu, Jingwei [1 ]
He, Xinyu [1 ]
Sun, Rong [2 ]
Du, Xiaojiang [3 ]
Guizani, Mohsen [4 ]
机构
[1] Xidian Univ, Shaanxi Key Lab Blockchain & Secure Comp, Xian 710071, Shaanxi, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
[4] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
来源
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021) | 2021年
关键词
D O I
10.1109/ICC42927.2021.9500868
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Each bank has different clients and each client may have transactions with multiple banks. Hence, clients' data in a single bank may be partial and incomplete. If the data can be combined, each bank obtains comprehensive information, so as to better carry out business and enhance the quality of service, such as recommending financial products and inquiring about personal credit records. However, after the promulgation of GDPR by European Union in 2018, it is illegal to directly consolidate data crossing enterprises due to privacy and security concerns, especially for privacy-sensitive industries. Emerging federated learning(FL) is very suitable for secure data sharing for distributed banks in privacy. To prevent from connection of clients' data and the certain bank, we adopt anonymity mechanism to hide the real identity of banks. In this paper, we first propose blockchain-empowered secure federated learning for distributed banks based on multi-party computation(MPC) with multi-key fully-homomorphic encryption(FHE) scheme. Then, we give detailed description of multi-key FHE based MPC protocol, anonymity mechanism and permissioned blockchain consensus protocol. Finally, we analyze the security and compare our scheme with several existed schemes. Numerical results show that the proposed data sharing scheme has good performance in terms of computational overhead and model accuracy.
引用
收藏
页数:6
相关论文
共 23 条
[1]  
[Anonymous], 2018, COMPLEXITY, DOI DOI 10.1155/2018/3491960
[2]  
Apple Differential Privacy Team, 2017, Learning with privacy at scale
[3]  
Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29
[4]   Machine Learning Classification over Encrypted Data [J].
Bost, Raphael ;
Popa, Raluca Ada ;
Tu, Stephen ;
Goldwasser, Shafi .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[5]   Detection of selective forwarding attacks in heterogeneous sensor networks [J].
Brown, Jeremy ;
Du, Xiaojiang .
2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, :1583-1587
[6]   On Key Recovery Attacks Against Existing Somewhat Homomorphic Encryption Schemes [J].
Chenal, Massimo ;
Tang, Qiang .
PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 :239-258
[7]  
Gang C., 2016, J CRYPTOLOGIC RES
[8]  
Hard A, 2018, CORR
[9]  
Hardy Stephen, 2017, PRIVATE FEDERATED LE
[10]  
Kairouz P., 2019, arXiv:1912.04977