Anonymous and Privacy-Preserving Federated Learning With Industrial Big Data

被引:102
作者
Zhao, Bin [1 ]
Fan, Kai [1 ]
Yang, Kan [2 ]
Wang, Zilong [1 ]
Li, Hui [1 ]
Yang, Yintang [3 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
[3] Xidian Univ, Key Lab, Minist Educ Wide BandGap Semicond Mat & Devices, Xian 710071, Peoples R China
基金
中国国家自然科学基金;
关键词
Differential privacy; federated learning; industrial big data; privacy preservation; proxy server; shared parameters; ASSOCIATION;
D O I
10.1109/TII.2021.3052183
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many artificial intelligence technologies have been applied for extracting useful information from massive industrial big data. However, the privacy issues are usually overlooked in many existing methods. In this article, we propose an anonymous and privacy-preserving federated learning scheme for the mining of industrial big data. We explored the effect of the proportion of shared parameters on the accuracy through experiments, and found that sharing partial parameters can almost achieve the accuracy of sharing all the parameters. On this basis, our proposed federated learning scheme reduces the privacy leakage by sharing fewer parameters between the server and each participant. Specifically, we leverage differential privacy on shared parameters with Gaussian mechanism to provide strict privacy preservation; the effect of different epsilon and delta on accuracy is tested; and we keep track of delta-when it reaches a certain threshold, training shall be stopped. What's more, we employ a proxy server as the middle layer between the server and all the participants to achieve anonymity of participants; it is worth noting that this can also reduce the communication burden on the federated learning server. Finally, we provide the security analysis and performance evaluations by comparing with other schemes.
引用
收藏
页码:6314 / 6323
页数:10
相关论文
共 36 条
  • [1] Deep Learning with Differential Privacy
    Abadi, Martin
    Chu, Andy
    Goodfellow, Ian
    McMahan, H. Brendan
    Mironov, Ilya
    Talwar, Kunal
    Zhang, Li
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 308 - 318
  • [2] Deep learning
    LeCun, Yann
    Bengio, Yoshua
    Hinton, Geoffrey
    [J]. NATURE, 2015, 521 (7553) : 436 - 444
  • [3] Arcas B. A. Y., 2016, ARXIV
  • [4] Ateniese G., 2013, ARXIV PREPRINT ARXIV
  • [5] Bottou L., 2007, Advances in Neural Information Processing Systems (NeurIPS), V20
  • [6] AUTO-ASSOCIATION BY MULTILAYER PERCEPTRONS AND SINGULAR VALUE DECOMPOSITION
    BOURLARD, H
    KAMP, Y
    [J]. BIOLOGICAL CYBERNETICS, 1988, 59 (4-5) : 291 - 294
  • [7] The Algorithmic Foundations of Differential Privacy
    Dwork, Cynthia
    Roth, Aaron
    [J]. FOUNDATIONS AND TRENDS IN THEORETICAL COMPUTER SCIENCE, 2013, 9 (3-4): : 211 - 406
  • [8] Fan K., 2019, J FRANKLIN I, V358, P193
  • [9] Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures
    Fredrikson, Matt
    Jha, Somesh
    Ristenpart, Thomas
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1322 - 1333
  • [10] Geyer Robin C., 2017, ARXIV171207557, P1