DetectPMFL: Privacy-Preserving Momentum Federated Learning Considering Unreliable Industrial Agents

被引:12
作者
Zhang, Zehui [1 ]
He, Ningxin [1 ]
Li, Qingdan [1 ]
Wang, Kunshu [1 ]
Gao, Hang [2 ]
Gao, Tiegang [1 ]
机构
[1] Nankai Univ, Coll Software, Tianjin 300071, Peoples R China
[2] Tsinghua Univ, Inst Publ Safety Res, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
Servers; Privacy; Computational modeling; Data models; Collaborative work; Homomorphic encryption; Companies; Federated learning; homomorphic encryption; industrial cyber-physical systems; unreliable industrial agent;
D O I
10.1109/TII.2022.3140806
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Federated learning (FL) as an emerging learning paradigm, has been achieved widespread attention since it allows distributed industrial agents to collaboratively develop a global model while keeping their data locally. Although various FL-based algorithms were proposed to solve engineering tasks in industrial cyber-physical systems, existing works rarely study a practical problem that the training samples collected by certain industrial agents (called unreliable industrial agents) may be of low quality. Obviously, the unreliable industrial agent would degrade the model accuracy. In this article, we propose a privacy-preserving momentum federated learning considering unreliable industrial agents, named DetectPMFL. In DetectPMFL, we design a detection method to alleviate the adverse effect of the unreliable agents. In addition, the privacy issues are analyzed by the mathematical description, especially for the convolution neural network. Based on this, Cheon-Kim-Kim-Song (CKKS) homomorphic encryption is used to protect the private information of the agents. The proposed approach is evaluated by two common datasets for recognition tasks. The security analysis and experiment results indicate that DetectPMFL is robust against unreliable industrial agents, and achieves high accuracy while preserving privacy.
引用
收藏
页码:7696 / 7706
页数:11
相关论文
共 30 条
  • [1] Federated Threat-Hunting Approach for Microservice-Based Industrial Cyber-Physical System
    Abdel-Basset, Mohamed
    Hawash, Hossam
    Sallam, Karam
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (03) : 1905 - 1917
  • [2] Deep learning and big data technologies for IoT security
    Amanullah, Mohamed Ahzam
    Habeeb, Riyaz Ahamed Ariyaluran
    Nasaruddin, Fariza Hanum
    Gani, Abdullah
    Ahmed, Ejaz
    Nainar, Abdul Salam Mohamed
    Akim, Nazihah Md
    Imran, Muhammad
    [J]. COMPUTER COMMUNICATIONS, 2020, 151 : 495 - 517
  • [3] A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems
    Arachchige, Pathum Chamikara Mahawaga
    Bertok, Peter
    Khalil, Ibrahim
    Liu, Dongxi
    Camtepe, Seyit
    Atiquzzaman, Mohammed
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (09) : 6092 - 6102
  • [4] Chakraborty Supriyo, Interpretability of Deep Learning Models: A Survey of Results, 2017 IEEE SMARTWORLD
  • [5] Homomorphic Encryption for Arithmetic of Approximate Numbers
    Cheon, Jung Hee
    Kim, Andrey
    Kim, Miran
    Song, Yongsoo
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 : 409 - 437
  • [6] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
    Fredrikson, Matt
    Jha, Somesh
    Ristenpart, Thomas
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1322 - 1333
  • [7] VeriFL: Communication-Efficient and Fast Verifiable Aggregation for Federated Learning
    Guo, Xiaojie
    Liu, Zheli
    Li, Jin
    Gao, Jiqiang
    Hou, Boyu
    Dong, Changyu
    Baker, Thar
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 1736 - 1751
  • [8] Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm
    Kotsiopoulos, Thanasis
    Sarigiannidis, Panagiotis
    Ioannidis, Dimosthenis
    Tzovaras, Dimitrios
    [J]. COMPUTER SCIENCE REVIEW, 2021, 40
  • [9] Lee J., 2018, Manufact. Lett., V18, P20, DOI [10.1016/j.mfglet.2018.09.002, DOI 10.1016/J.MFGLET.2018.09.002]
  • [10] High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function
    Lee, Joon-Woo
    Lee, Eunsang
    Lee, Yongwoo
    Kim, Young-Sik
    No, Jong-Seon
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT I, 2021, 12696 : 618 - 647