A federated deep learning framework for privacy preservation and communication efficiency

被引:24
作者
Cao, Tien-Dung [1 ]
Tram, Truong-Huu [2 ]
Tran, Hien [1 ]
Tran, Khanh [3 ,4 ]
机构
[1] Tan Tao Univ, Sch Engn, Tan Duc E City, Long An Provinc, Vietnam
[2] Singapore Inst Technol, Singapore, Singapore
[3] Vietnam Natl Univ Ho Chi Minh City, Int Univ, Dept Math, Ho Chi Minh City, Vietnam
[4] Tan Tao Univ, Tan Duc E City, Long An, Vietnam
关键词
Federated learning; Deep learning; Parallel training; Communication efficiency; Privacy preserving;
D O I
10.1016/j.sysarc.2022.102413
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Deep learning has achieved great success in many applications. However, its deployment in practice has been hurdled by two issues: the privacy of data that has to be aggregated centrally for model training and high communication overhead due to transmission of large amount of data usually geographically distributed. Addressing both issues is challenging and most existing works could not provide an efficient solution. In this paper, we develop FedPC, a Federated Deep Learning Framework for Privacy Preservation and Communication Efficiency. The framework allows a model to be learned on multiple private datasets while not revealing any information of training data, even with intermediate data. The framework also minimizes the amount of data exchanged to update the model. We formally prove the convergence of the learning model when training with FedPC and its privacy-preserving property. We perform extensive experiments to evaluate the performance of FedPC in terms of the approximation to the upper-bound performance (when training centrally) and communication overhead. The results show that FedPC maintains the performance approximation of the models within 8.5% of the centrally-trained models when data is distributed to 10 computing nodes. FedPC also reduces the communication overhead by up to 42.20% compared to existing works.
引用
收藏
页数:13
相关论文
共 43 条
  • [1] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [2] Alistarh D, 2017, ADV NEUR IN, V30
  • [3] [Anonymous], 2009, THE CIFAR 10 DATASET
  • [4] Beaulieu-Jones B.K., 2018, MACH LEARN HLTH WORK, P1
  • [5] Association of genomic subtypes of lower-grade gliomas with shape features automatically extracted by a deep learning algorithm
    Buda, Mateusz
    Saha, Ashirbani
    Mazurowski, Maciej A.
    [J]. COMPUTERS IN BIOLOGY AND MEDICINE, 2019, 109 : 218 - 225
  • [6] Byrd D., 2020, P 1 ACM INT C AI FIN, P1, DOI DOI 10.1145/3383455.3422562
  • [7] Dean J., 2012, P 25 INT C NEUR INF, P1223
  • [8] Donahue J, 2014, PR MACH LEARN RES, V32
  • [9] Fan D, 2018, ARXIV180707948
  • [10] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
    Fredrikson, Matt
    Jha, Somesh
    Ristenpart, Thomas
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1322 - 1333