Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 6/2020

08.05.2020

Adaptive privacy-preserving federated learning

verfasst von: Xiaoyuan Liu, Hongwei Li, Guowen Xu, Rongxing Lu, Miao He

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As an emerging training model, federated deep learning has been widely applied in many fields such as speech recognition, image classification and classification of peer-to-peer (P2P) Internet traffics. However, it also entails various security and privacy concerns. In the past years, many researchers have been carried out toward elaborating solutions to alleviate the above challenges via three underlying technologies, i.e., Secure Multi-Party Computation (SMC), Homomorphic Encryption (HE) and Differential Privacy (DP). Compared with SMC and HE, differential privacy is outstanding in terms of efficiency. However, due to the involvement of noise, DP always needs to make a trade-off between security and accuracy. i.e., achieving a strong security requirement has to sacrifice certain accuracy. To seek the optimal balance, we propose APFL, an Adaptive Privacy-preserving Federated Learning framework in this paper. Specifically, in the APFL, we calculate the contribution of each attribute class to the outputs with a layer-wise relevance propagation algorithm. By injecting adaptive noise to data attributes, our APFL significantly reduces the impact of noise on the final results. Moreover, we introduce the Randomized Privacy-preserving Adjustment Technology to further improve the prediction accuracy of the model. We present a formal security analysis to demonstrate the high privacy level of APFL. Besides, extensive experiments show the superior performance of APFL in terms of accuracy, computation and communication overhead.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L (2016) Deep learning with differential privacy. In: Proceedings of ACM CCS, pp 308–318 Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L (2016) Deep learning with differential privacy. In: Proceedings of ACM CCS, pp 308–318
2.
Zurück zum Zitat Aono Y, Hayashi T, Wang L, Moriai S, et al. (2018) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inform Forensics Secur 13(5):1333–1345CrossRef Aono Y, Hayashi T, Wang L, Moriai S, et al. (2018) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inform Forensics Secur 13(5):1333–1345CrossRef
4.
Zurück zum Zitat Erlingsson Ú, Pihur V, Korolova A (2014) Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of ACM CCS, pp 1054–1067 Erlingsson Ú, Pihur V, Korolova A (2014) Rappor: randomized aggregatable privacy-preserving ordinal response. In: Proceedings of ACM CCS, pp 1054–1067
5.
Zurück zum Zitat Hao M, Li H, Luo X, Xu G, Yang H, Liu S (2019) Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Trans Indust Inform Hao M, Li H, Luo X, Xu G, Yang H, Liu S (2019) Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Trans Indust Inform
6.
Zurück zum Zitat Hard A, Rao K, Mathews R, Beaufays F, Augenstein S, Eichner H, Kiddon C, Ramage D (2018) Federated learning for mobile keyboard prediction. arXiv:1811.03604 Hard A, Rao K, Mathews R, Beaufays F, Augenstein S, Eichner H, Kiddon C, Ramage D (2018) Federated learning for mobile keyboard prediction. arXiv:1811.​03604
7.
Zurück zum Zitat Jiang Q, Ma J, Yang C, Ma X, Shen J, Chaudhry SA (2017) Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput Electric Eng 63:182–195CrossRef Jiang Q, Ma J, Yang C, Ma X, Shen J, Chaudhry SA (2017) Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput Electric Eng 63:182–195CrossRef
8.
Zurück zum Zitat Jiang W, Li H, Xu G, Wen M, Dong G, Lin X (2019) Ptas: privacy-preserving thin-client authentication scheme in blockchain-based pki. Future Gen Comput Sys 96:185–195CrossRef Jiang W, Li H, Xu G, Wen M, Dong G, Lin X (2019) Ptas: privacy-preserving thin-client authentication scheme in blockchain-based pki. Future Gen Comput Sys 96:185–195CrossRef
9.
Zurück zum Zitat Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans Emerg Topics Comput 6(1):97–109CrossRef Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in mobile clouds. IEEE Trans Emerg Topics Comput 6(1):97–109CrossRef
11.
Zurück zum Zitat Liu X, Zhu H, Lu R, Li H (2018) Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification. Peer-to-Peer Netw Appl 11(2):334–347CrossRef Liu X, Zhu H, Lu R, Li H (2018) Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification. Peer-to-Peer Netw Appl 11(2):334–347CrossRef
12.
Zurück zum Zitat Maqueda AI, Loquercio A, Gallego G, García N, Scaramuzza D (2018) Event-based vision meets deep learning on steering prediction for self-driving cars. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 5419–5427 Maqueda AI, Loquercio A, Gallego G, García N, Scaramuzza D (2018) Event-based vision meets deep learning on steering prediction for self-driving cars. In: Proceedings of the IEEE conference on computer vision and pattern recognition, pp 5419–5427
13.
Zurück zum Zitat Nasr M, Shokri R, Houmansadr A (2018) Comprehensive privacy analysis of deep learning: stand-alone and federated learning under passive and active white-box inference attacks. arXiv:1812.00910 Nasr M, Shokri R, Houmansadr A (2018) Comprehensive privacy analysis of deep learning: stand-alone and federated learning under passive and active white-box inference attacks. arXiv:1812.​00910
14.
Zurück zum Zitat Papernot N, Song S, Mironov I, Raghunathan A, Talwar K, Erlingsson Ú (2018) Scalable private learning with pate. arXiv:1802.08908 Papernot N, Song S, Mironov I, Raghunathan A, Talwar K, Erlingsson Ú (2018) Scalable private learning with pate. arXiv:1802.​08908
15.
Zurück zum Zitat Phan N, Wu X, Hu H, Dou D (2017) Adaptive laplace mechanism: differential privacy preservation in deep learning. In: Proceedings of IEEE ICDM, pp 385–394 Phan N, Wu X, Hu H, Dou D (2017) Adaptive laplace mechanism: differential privacy preservation in deep learning. In: Proceedings of IEEE ICDM, pp 385–394
16.
Zurück zum Zitat Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: challenges, solutions and opportunities. IEEE Netw 32(6):144–151CrossRef Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: challenges, solutions and opportunities. IEEE Netw 32(6):144–151CrossRef
17.
Zurück zum Zitat Ren H, Li H, Liang X, He S, Dai Y, Zhao L (2016) Privacy-enhanced and multifunctional health data aggregation under differential privacy guarantees. Sensors 16(9):1463CrossRef Ren H, Li H, Liang X, He S, Dai Y, Zhao L (2016) Privacy-enhanced and multifunctional health data aggregation under differential privacy guarantees. Sensors 16(9):1463CrossRef
18.
Zurück zum Zitat Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceedings of ACM CCS, pp 1310–1321 Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proceedings of ACM CCS, pp 1310–1321
19.
Zurück zum Zitat Sivaprasad A, Ghawalkar N, Hodge S, Sanghavi M, Shinde V (2018) Machine learning based traffic classification using statistical analysis. Int J Recent Innov Trends Comput Commun 6(3):187–191 Sivaprasad A, Ghawalkar N, Hodge S, Sanghavi M, Shinde V (2018) Machine learning based traffic classification using statistical analysis. Int J Recent Innov Trends Comput Commun 6(3):187–191
20.
Zurück zum Zitat Song C, Ristenpart T, Shmatikov V (2017) Machine learning models that remember too much. In: Proceedings of ACM CCS, pp 587–601 Song C, Ristenpart T, Shmatikov V (2017) Machine learning models that remember too much. In: Proceedings of ACM CCS, pp 587–601
21.
Zurück zum Zitat de Vos BD, Berendsen FF, Viergever MA, Sokooti H, Staring M, Išgum I (2019) A deep learning framework for unsupervised affine and deformable image registration. Medical Image Anal 52:128–143CrossRef de Vos BD, Berendsen FF, Viergever MA, Sokooti H, Staring M, Išgum I (2019) A deep learning framework for unsupervised affine and deformable image registration. Medical Image Anal 52:128–143CrossRef
22.
Zurück zum Zitat Wang H, Dong X, Cao Z (2019) Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Netw Appl 12(1):32–42CrossRef Wang H, Dong X, Cao Z (2019) Secure and efficient encrypted keyword search for multi-user setting in cloud computing. Peer-to-Peer Netw Appl 12(1):32–42CrossRef
23.
Zurück zum Zitat Xu G, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inform Forensics Secur 14(4):870–885CrossRef Xu G, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inform Forensics Secur 14(4):870–885CrossRef
24.
Zurück zum Zitat Xu G, Li H, Liu S, Wen M, Lu R (2019) Efficient and privacy-preserving truth discovery in mobile crowd sensing systems. IEEE Trans Vehicular Technol 68(4):3854–3865CrossRef Xu G, Li H, Liu S, Wen M, Lu R (2019) Efficient and privacy-preserving truth discovery in mobile crowd sensing systems. IEEE Trans Vehicular Technol 68(4):3854–3865CrossRef
25.
Zurück zum Zitat Xu G, Li H, Liu S, Yang K, Lin X (2020) Verifynet: secure and verifiable federated learning. IEEE Trans Inform Forensics Secur 15(1):911–926CrossRef Xu G, Li H, Liu S, Yang K, Lin X (2020) Verifynet: secure and verifiable federated learning. IEEE Trans Inform Forensics Secur 15(1):911–926CrossRef
27.
Zurück zum Zitat Yang Y, Niu X, Li L, Peng H, Ren J, Qi H (2018) General theory of security and a study of hacker!-s behavior in big data era. Peer-to-Peer Netw Appl 11(2):210–219CrossRef Yang Y, Niu X, Li L, Peng H, Ren J, Qi H (2018) General theory of security and a study of hacker!-s behavior in big data era. Peer-to-Peer Netw Appl 11(2):210–219CrossRef
28.
Zurück zum Zitat Young T, Hazarika D, Poria S, Cambria E (2018) Recent trends in deep learning based natural language processing. IEEE Comput Intell Magazine 13(3):55–75CrossRef Young T, Hazarika D, Poria S, Cambria E (2018) Recent trends in deep learning based natural language processing. IEEE Comput Intell Magazine 13(3):55–75CrossRef
29.
Zurück zum Zitat Zhang H, Xiao X, Mercaldo F, Ni S, Martinelli F, Sangaiah AK (2019) Classification of ransomware families with machine learning based on n-gram of opcodes. Future Gen Comput Sys 90:211–221CrossRef Zhang H, Xiao X, Mercaldo F, Ni S, Martinelli F, Sangaiah AK (2019) Classification of ransomware families with machine learning based on n-gram of opcodes. Future Gen Comput Sys 90:211–221CrossRef
30.
Zurück zum Zitat Zhang J, Zhang Z, Xiao X, Yang Y, Winslett M (2012) Functional mechanism: regression analysis under differential privacy. Proceedings of the VLDB Endowment 5(11):1364–1375CrossRef Zhang J, Zhang Z, Xiao X, Yang Y, Winslett M (2012) Functional mechanism: regression analysis under differential privacy. Proceedings of the VLDB Endowment 5(11):1364–1375CrossRef
31.
Zurück zum Zitat Zhang S, Li H, Dai Y, Li J, He M, Lu R (2018) Verifiable outsourcing computation for matrix multiplication with improved efficiency and applicability. IEEE Internet of Things Journal 5(6):5076–5088CrossRef Zhang S, Li H, Dai Y, Li J, He M, Lu R (2018) Verifiable outsourcing computation for matrix multiplication with improved efficiency and applicability. IEEE Internet of Things Journal 5(6):5076–5088CrossRef
34.
Zurück zum Zitat Zhao C, Zhao S, Zhao M, Chen Z, Gao CZ, Li H, Tan YA (2019) Secure multi-party computation: theory, practice and applications. Inform Sci 476:357–372CrossRef Zhao C, Zhao S, Zhao M, Chen Z, Gao CZ, Li H, Tan YA (2019) Secure multi-party computation: theory, practice and applications. Inform Sci 476:357–372CrossRef
Metadaten
Titel
Adaptive privacy-preserving federated learning
verfasst von
Xiaoyuan Liu
Hongwei Li
Guowen Xu
Rongxing Lu
Miao He
Publikationsdatum
08.05.2020
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00869-2

Weitere Artikel der Ausgabe 6/2020

Peer-to-Peer Networking and Applications 6/2020 Zur Ausgabe

Premium Partner