The Blockchain-Based Edge Computing Framework for Privacy-Preserving Federated Learning

被引:0
作者
Hu, Shili [1 ]
Li, Jiangfeng [1 ]
Zhang, Chenxi [1 ]
Zhao, Qinpei [1 ]
Ye, Wei [2 ]
机构
[1] Tongji Univ, Sch Software Engn, Shanghai, Peoples R China
[2] Suzhou Tongji Blockchain Res Inst, Suzhou, Peoples R China
来源
2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2021) | 2021年
基金
上海市自然科学基金;
关键词
blockchain; federated learning; edge computing; privacy;
D O I
10.1109/BLOCKCHAIN53845.2021.00085
中图分类号
学科分类号
摘要
Nowadays, privacy-preserving artificial intelligence is gaining traction, with the goal of learning multiple models based on private data without leaking any personal information. Since the existing multi-party computation methods and other encryption-based methods have their flaws, we developed our own blockchain-based edge computing framework to achieve the decentralization and enhance the efficiency. Our framework enables a trustful, simplified and asynchronous federated learning in IoT and provides a convenient and secret classification service. Extensive evaluations on efficiency are provided, confirming the performance of our solutions.
引用
收藏
页码:566 / 571
页数:6
相关论文
共 30 条
[1]   Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs [J].
Al Badawi, Ahmad ;
Jin, Chao ;
Lin, Jie ;
Mun, Chan Fook ;
Jie, Sim Jun ;
Tan, Benjamin Hong Meng ;
Nan, Xiao ;
Aung, Khin Mi Mi ;
Chandrasekhar, Vijay Ramaseshan .
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (03) :1330-1343
[2]  
[Anonymous], 2012, IACR Cryptol. ePrint Arch.
[3]  
[Anonymous], 2018, Faster CryptoNets: Leveraging sparsity for real-world encrypted inference
[4]  
Bach LM, 2018, 2018 41ST INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1545, DOI 10.23919/MIPRO.2018.8400278
[5]  
Bajard Jean-Claude, 2017, Selected Areas in Cryptography - SAC 2016. 23rd International Conference. Revised Selected Papers: LNCS 10532, P423, DOI 10.1007/978-3-319-69453-5_23
[6]  
Bos Joppe W., 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P45, DOI 10.1007/978-3-642-45239-0_4
[7]  
Brakerski Z., 2014, ACM Trans. on Com. T, V6, P13, DOI [10.1145/2633600, DOI 10.1145/2633600]
[8]   Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP [J].
Brakerski, Zvika .
ADVANCES IN CRYPTOLOGY - CRYPTO 2012, 2012, 7417 :868-886
[9]  
Chabanne H., 2017, P IACR CRYPT EPRINT, P35
[10]   Numerical Method for Comparison on Homomorphically Encrypted Numbers [J].
Cheon, Jung Hee ;
Kim, Dongwoo ;
Kim, Duhyeong ;
Lee, Hun Hee ;
Lee, Keewoo .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT II, 2019, 11922 :415-445