Two-Phase Multi-Party Computation Enabled Privacy-Preserving Federated Learning

被引:75
作者
Kanagavelu, Renuga [1 ]
Li, Zengxiang [1 ]
Samsudin, Juniarto [1 ]
Yang, Yechao [1 ]
Yang, Feng [1 ]
Goh, Rick Siow Mong [1 ]
Cheah, Mervyn [1 ]
Wiwatphonthana, Praewpiraya [1 ,2 ]
Akkarajitsakul, Khajonpong [2 ]
Wang, Shangguang [3 ]
机构
[1] ASTAR, Inst High Performance Comp, Singapore, Singapore
[2] King Mongkuts Univ Technol Thonburi, Bangkok, Thailand
[3] Beijing Univ Posts & Telecommun, Beijing, Peoples R China
来源
2020 20TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2020) | 2020年
关键词
Federated Learning; Multi-Party Computation; Secret Sharing; Privacy-Preserving; Smart Manufacturing;
D O I
10.1109/CCGrid49817.2020.00-52
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Countries across the globe have been pushing strict regulations on the protection of personal or private data collected. The traditional centralized machine learning method, where data is collected from end-users or IoT devices, so that it can discover insights behind real-world data, may not be feasible for many data-driven industry applications in light of such regulations. A new machine learning method, coined by Google as Federated Learning (FL) enables multiple participants to train a machine learning model collectively without directly exchanging data. However, recent studies have shown that there is still a possibility to exploit the shared models to extract personal or confidential data. In this paper, we propose to adopt Multi-Party Computation (MPC) to achieve privacy-preserving model aggregation for FL. The MPC-enabled model aggregation in a peer-to-peer manner incurs high communication overhead with low scalability. To address this problem, the authors proposed to develop a two-phase mechanism by 1) electing a small committee and 2) providing MPC-enabled model aggregation service to a larger number of participants through the committee. The MPC-enabled FL framework has been integrated in an IoT platform for smart manufacturing. It enables a set of companies to train high quality models collectively by leveraging their complementary data-sets on their own premises, without compromising privacy, model accuracy vis-a'-vis traditional machine learning methods and execution efficiency in terms of communication cost and execution time.
引用
收藏
页码:410 / 419
页数:10
相关论文
共 27 条
[1]  
[Anonymous], 2017, Collaborative machine learning without centralized training data
[2]   From Keys to Databases-Real-World Applications of Secure Multi-Party Computation [J].
Archer, David W. ;
Bogdanov, Dan ;
Lindell, Yehuda ;
Kamm, Liina ;
Nielsen, Kurt ;
Pagter, Jakob Illeborg ;
Smart, Nigel P. ;
Wright, Rebecca N. .
COMPUTER JOURNAL, 2018, 61 (12) :1749-1771
[3]  
Bogetoft P, 2009, LECT NOTES COMPUT SC, V5628, P325, DOI 10.1007/978-3-642-03549-4_20
[4]   Practical Secure Aggregation for Privacy-Preserving Machine Learning [J].
Bonawitz, Keith ;
Ivanov, Vladimir ;
Kreuter, Ben ;
Marcedone, Antonio ;
McMahan, H. Brendan ;
Patel, Sarvar ;
Ramage, Daniel ;
Segal, Aaron ;
Seth, Karn .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1175-1191
[5]  
Chai Z, 2019, PROCEEDINGS OF THE 2019 USENIX CONFERENCE ON OPERATIONAL MACHINE LEARNING, P19
[6]  
Chang S.F., 2018, ARXIV PREPRINT ARXIV
[7]  
Chase M., 2017, CRYPTOLOGY EPRINT AR
[8]   Faster Packed Homomorphic Operations and Efficient Circuit Bootstrapping for TFHE [J].
Chillotti, Ilaria ;
Gama, Nicolas ;
Georgieva, Mariya ;
Izabachene, Malika .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT I, 2017, 10624 :377-408
[9]   Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities [J].
Choi, Joseph I. ;
Butler, Kevin R. B. .
SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
[10]  
Dahl Morten., SECRET SHARING 1