FLChain: A Blockchain for Auditable Federated Learning with Trust and Incentive

被引:142
作者
Bao, Xianglin [1 ]
Su, Cheng [1 ]
Xiong, Yan [1 ]
Huang, Wenchao [1 ]
Hu, Yifei [1 ]
机构
[1] USTC, Sch Comp Sci, Hefei, Peoples R China
来源
5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2019) | 2019年
基金
中国国家自然科学基金;
关键词
blockchain; federated learning; incentive; decentralize; trust;
D O I
10.1109/BIGCOM.2019.00030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Federated learning (shorted as FL) recently proposed by Google is a privacy-preserving method to integrate distributed data trainers. FL is extremely useful due to its ensuring privacy, lower latency, less power consumption and smarter models, but it could fail if multiple trainers abort training or send malformed messages to its partners. Such mis-behavior are not auditable and parameter server may compute incorrectly due to single point failure. Furthermore, FL has no incentive to attract sufficient distributed training data and computation power. In this paper, we propose FLChain to build a decentralized, public auditable and healthy FL ecosystem with trust and incentive. FLChain replace traditional FL parameter server whose computation result must be consensual on-chain. Our work is not trivial when it is vital and hard to provide enough incentive and deterrence to distributed trainers. We achieve model commercialization by providing a healthy marketplace for collaborative-training models. Honest trainer can gain fairly partitioned profit from well-trained model according to its contribution and the malicious can be timely detected and heavily punished. To reduce the time cost of misbehavior detecting and model query, we design DDCBF for accelerating the query of blockchain-documented information. Finally, we implement a prototype of our work and measure the cost of various operations.
引用
收藏
页码:151 / 159
页数:9
相关论文
共 20 条
  • [1] [Anonymous], 2012, POISONING ATTACKS SU
  • [2] [Anonymous], 2015, Bitcoin-ng: A scalable blockchain protocol
  • [3] [Anonymous], 2015, ACM C COMP COMM SEC
  • [4] Practical Secure Aggregation for Privacy-Preserving Machine Learning
    Bonawitz, Keith
    Ivanov, Vladimir
    Kreuter, Ben
    Marcedone, Antonio
    McMahan, H. Brendan
    Patel, Sarvar
    Ramage, Daniel
    Segal, Aaron
    Seth, Karn
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1175 - 1191
  • [5] Chen L., 2018, MODEL BASED PRICING
  • [6] Delmolino K., 2016, Step by step towards creating a safe smart contract: lessons and insights from a cryptocurrency lab
  • [7] 6 Deep Learning in Drug Discovery
    Gawehn, Erik
    Hiss, Jan A.
    Schneider, Gisbert
    [J]. MOLECULAR INFORMATICS, 2016, 35 (01) : 3 - 14
  • [8] Gu Tianyu, 2017, Badnets: Identifying
  • [9] Heigold G, 2013, AC SPEECH SIGN PROC
  • [10] Deep Neural Networks for Acoustic Modeling in Speech Recognition
    Hinton, Geoffrey
    Deng, Li
    Yu, Dong
    Dahl, George E.
    Mohamed, Abdel-rahman
    Jaitly, Navdeep
    Senior, Andrew
    Vanhoucke, Vincent
    Patrick Nguyen
    Sainath, Tara N.
    Kingsbury, Brian
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2012, 29 (06) : 82 - 97