Towards Efficient and Privacy-preserving Federated Deep Learning

被引:0
作者
Hao, Meng [1 ,2 ]
Li, Hongwei [1 ,3 ]
Xu, Guowen [1 ,2 ]
Liu, Sen [1 ]
Yang, Haomiao [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Hefei, Anhui, Peoples R China
[2] CETC Big Data Res Inst Co Ltd, Guiyang 550022, Guizhou, Peoples R China
[3] Sci & Technol Commun Secur Lab, Chengdu 610041, Sichuan, Peoples R China
来源
ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2019年
基金
国家重点研发计划;
关键词
Federated Deep Learning; Stochastic Gradient Descent; Privacy-preserving; Differential Privacy; Additively Homomorphic Encryption; CLOUD; AUTHENTICATION; CHALLENGES; NETWORKS; SCHEME;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Deep learning has been applied in many areas, such as computer vision, natural language processing and emotion analysis. Differing from the traditional deep learning that collects users' data centrally, federated deep learning requires participants to train the networks on private datasets and share the training results, and hence has more gratifying efficiency and stronger security. However, it still presents some privacy issues since adversaries can deduce users' privacy from local outputs, such as gradients. While the problem of private federated deep learning has been an active research issue, the latest research findings are still inadequate in terms of security, accuracy and efficiency. In this paper, we propose an efficient and privacy-preserving federated deep learning protocol based on stochastic gradient descent method by integrating the additively homomorphic encryption with differential privacy. Specifically, users add noises to each local gradients before encrypting them to obtain the optical performance and security. Moreover, our scheme is secure to honest-but-curious server setting even if the cloud server colludes with multiple users. Besides, our scheme supports federated learning for large-scale users scenarios and extensive experiments demonstrate our scheme has high efficiency and high accuracy compared with non-private model.
引用
收藏
页数:6
相关论文
共 24 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[3]  
Collobert R, 2011, J MACH LEARN RES, V12, P2493
[4]  
Dean J., 2012, P ADV NEUR INF PROC, V25, P1223
[5]   Differential privacy: A survey of results [J].
Dwork, Cynthia .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, PROCEEDINGS, 2008, 4978 :1-19
[6]   Calibrating noise to sensitivity in private data analysis [J].
Dwork, Cynthia ;
McSherry, Frank ;
Nissim, Kobbi ;
Smith, Adam .
THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 :265-284
[7]   Software Defined Wireline-Wireless Cross-Networks: Framework, Challenges, and Prospects [J].
Fu, Shu ;
Wu, Jinsong ;
Wen, Hong ;
Cai, Yueping ;
Wu, Bin .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (08) :145-151
[8]   Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning [J].
Hitaj, Briland ;
Ateniese, Giuseppe ;
Perez-Cruz, Fernando .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :603-618
[9]   Deep Learning for Emotion Recognition on Small Datasets Using Transfer Learning [J].
Hong-Wei Ng ;
Viet Dung Nguyen ;
Vonikakis, Vassilios ;
Winkler, Stefan .
ICMI'15: PROCEEDINGS OF THE 2015 ACM INTERNATIONAL CONFERENCE ON MULTIMODAL INTERACTION, 2015, :443-449
[10]   Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data [J].
Li, Hongwei ;
Yang, Yi ;
Luan, Tom H. ;
Liang, Xiaohui ;
Zhou, Liang ;
Shen, Xuemin .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (03) :312-325