Achieving Consensus in Privacy-Preserving Decentralized Learning

被引:3
作者
Xiang, Liyao [1 ,3 ]
Wang, Lingdong [1 ,3 ]
Wang, Shufan [1 ,3 ]
Li, Baochun [2 ]
机构
[1] Shanghai Jiao Tong Univ, John Hoperoft Ctr Comp Sci, Shanghai, Peoples R China
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON, Canada
[3] Shanghai Jiao Tong Univ, John Hoperoft Ctr, Shanghai, Peoples R China
来源
2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS) | 2020年
基金
中国国家自然科学基金;
关键词
Differential privacy; decentralized machine learning; MULTIPARTY COMPUTATION; EQUALITY;
D O I
10.1109/ICDCS47774.2020.00086
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Machine learning algorithms have been widely deployed on decentralized systems so that users with private, local data can jointly contribute to a better generalized model. One promising approach is Aggregation of Teacher Ensembles, which transfers knowledge of locally trained models to a global one without releasing any private data. However, previous methods largely focus on privately aggregating the local results without concerning their validity, which easily leads to erroneous aggregation results especially when data is unbalanced across different users. Hence, we propose a private consensus protocol which reveals nothing else but the label with the highest votes, in the condition that the number of votes exceeds a given threshold. The purpose is to filter out undesired aggregation results that could hurt the aggregator model performance. Our protocol also guarantees differential privacy such that any adversary with auxiliary information cannot gain any additional knowledge from the results. We show that with our protocol, we achieve the same privacy level with an improved accuracy compared to previous works.
引用
收藏
页码:899 / 909
页数:11
相关论文
共 19 条
[1]  
[Anonymous], 2018, P 6 INT C LEARN REPR
[2]  
Damgard Ivan, 2009, International Journal of Applied Cryptography, V1, P323, DOI 10.1504/IJACT.2009.028031
[3]  
Damgård I, 2007, LECT NOTES COMPUT SC, V4586, P416
[4]  
Damgard I, 2006, LECT NOTES COMPUT SC, V3876, P285
[5]  
Dwork C, 2006, LECT NOTES COMPUT SC, V4004, P486
[6]   The Algorithmic Foundations of Differential Privacy [J].
Dwork, Cynthia ;
Roth, Aaron .
FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4) :211-406
[7]  
Fischlin M, 2001, LECT NOTES COMPUT SC, V2020, P457
[8]  
Heikkila M., 2017, P 31 INT C NEUR INF, V30, P3229
[9]  
Kairouz P., 2015, P ADV NEUR INF PROC, P2008
[10]  
Kiribuchi N., 2011, INT WORKSH INF SEC A, P187