Secure Federated Learning Model Verification: A Client-side Backdoor Triggered Watermarking Scheme

被引:23
作者
Liu, Xiyao [1 ]
Shao, Shuo [1 ]
Yang, Yue [1 ]
Wu, Kangming [1 ]
Yang, Wenyuan [2 ]
Fang, Hui [3 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[2] Peking Univ, Shenzhen Grad Sch, Shenzhen 518055, Peoples R China
[3] Loughborough Univ, Dept Comp Sci, Loughborough LE11 3TU, Leics, England
来源
2021 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC) | 2021年
关键词
D O I
10.1109/SMC52423.2021.9658998
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Federated learning (FL) has become an emerging distributed framework to build deep learning models with collaborative efforts from multiple participants. Consequently, copyright protection of FL deep model is urgently required because too many participants have access to the joint-trained model. Recently, Secure FL framework is developed to address data leakage issue when central node is not fully trustable. This encryption process has made existing DL model watermarking schemes impossible to embed watermark at the central node. In this paper, we propose a novel client-side Federated Learning watermarking method to tackle the model verification issue under the Secure FL framework. In specific, we design a backdoor-based watermarking scheme to allow model owners to embed their pre-designed noise patterns into the FL deep model. Thus, our method provides reliable copyright protection while ensuring the data privacy because the central node has no access to the encrypted gradient information. The experimental results have demonstrated the efficiency of our method in terms of both FL model performance and watermarking robustness.
引用
收藏
页码:2414 / 2419
页数:6
相关论文
共 30 条
[1]   A Survey on Homomorphic Encryption Schemes: Theory and Implementation [J].
Acar, Abbas ;
Aksu, Hidayet ;
Uluagac, A. Selcuk ;
Conti, Mauro .
ACM COMPUTING SURVEYS, 2018, 51 (04)
[2]  
Adi Y, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1615
[3]  
Ammad-ud-din M, 2019, ARXIV190109888 CORR
[4]  
Anderson M., 2015, Technology device ownership
[5]  
[Anonymous], 2010, MNIST handwritten digit database
[6]  
Atli B. G., 2020, ARXIV200807298
[7]  
Bagdasaryan E, 2020, PR MACH LEARN RES, V108, P2938
[8]  
Boenisch Franziska, 2020, ARXIV200912153
[9]  
Chen F., 2018, ARXIV180207876
[10]  
Fan L., 2019, ARXIV190907830