Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 2/2023

23.03.2023

ESA-FedGNN: Efficient secure aggregation for federated graph neural networks

verfasst von: Yanjun Liu, Hongwei Li, Xinyuan Qian, Meng Hao

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 2/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Graph Neural Network (GNN) architecture is a state-of-the-art model, which can obtain complete node embedding features and rich data information by aggregating the information of nodes and neighbors. Therefore, GNNs are widely used in electronic shopping, drug discovery (especially for the treatment of COVID-19) and other fields, promoting the explosive development of machine learning. However, user interaction, data sharing and circulation are highly sensitive to privacy, and centralized storage can lead to data isolation. Therefore, Federated Learning with high efficiency and strong security and privacy enhancement technology based on secure aggregation can improve the security dilemma faced by GNN. In this paper, we propose an Efficient Secure Aggregation for Federated Graph Neural Network(ESA-FedGNN), which can efficiently reduce the cost of communication and avoid computational redundancy while ensuring data privacy. Firstly, a novel secret sharing scheme based on numerical analysis is proposed, which employs Fast Fourier Transform to improve the computational power of the neural network in sharing phase, and leverages Newton Interpolation method to deal with the disconnection and loss of the client in reconstruction phase. Secondly, a regular graph embedding based on geometric distribution is proposed, which optimizes the aggregation speed by using data parallelism. Finally, a double mask is adopted to ensure privacy and prevent malicious adversaries from stealing model parameters. We achieve \(O(\log N \log (\log N))\) improvements compared to \(O\left( N^2\right)\) in state-of-the-art works. This research helps to provide security solutions related to the practical development and application of privacy-preserving graph neural network technology.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhang H, Wu B, Yuan X, Pan S, Tong H, Pei J (2022) Trustworthy graph neural networks: Aspects, methods and trends Zhang H, Wu B, Yuan X, Pan S, Tong H, Pei J (2022) Trustworthy graph neural networks: Aspects, methods and trends
2.
Zurück zum Zitat Dai E, Zhao T, Zhu H, Xu J, Guo Z, Liu H, Tang J, Wang S (2022) A comprehensive survey on trustworthy graph neural networks: Privacy, robustness, fairness, and explainability. arXiv e-prints Dai E, Zhao T, Zhu H, Xu J, Guo Z, Liu H, Tang J, Wang S (2022) A comprehensive survey on trustworthy graph neural networks: Privacy, robustness, fairness, and explainability. arXiv e-prints
3.
Zurück zum Zitat Wu C, Wu F, Cao Y, Huang Y, Xie X (2021) Fedgnn: Federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:2102.04925 Wu C, Wu F, Cao Y, Huang Y, Xie X (2021) Fedgnn: Federated graph neural network for privacy-preserving recommendation. arXiv preprint arXiv:​2102.​04925
4.
Zurück zum Zitat Sun M, Zhao S, Gilvary C, Elemento O, Zhou J, Wang F (2020) Graph convolutional networks for computational drug development and discovery. Brief Bioinform 21(3):919–935CrossRef Sun M, Zhao S, Gilvary C, Elemento O, Zhou J, Wang F (2020) Graph convolutional networks for computational drug development and discovery. Brief Bioinform 21(3):919–935CrossRef
5.
Zurück zum Zitat Cui Z, Henrickson K, Ke R, Wang Y (2020) Traffic graph convolutional recurrent neural network: A deep learning framework for network-scale traffic learning and forecasting. IEEE 11 Cui Z, Henrickson K, Ke R, Wang Y (2020) Traffic graph convolutional recurrent neural network: A deep learning framework for network-scale traffic learning and forecasting. IEEE 11
6.
Zurück zum Zitat Yuan H, Zheng J, Ye Q, Qian Y, Zhang Y (2021) Improving fake news detection with domain-adversarial and graph-attention neural network. Decis Support Syst 151 Yuan H, Zheng J, Ye Q, Qian Y, Zhang Y (2021) Improving fake news detection with domain-adversarial and graph-attention neural network. Decis Support Syst 151
7.
Zurück zum Zitat Jin W, Stokes JM, Eastman RT, Itkin Z, Zakharov AV, Collins JJ, Jaakkola TS, Barzilay R (2021) Deep learning identifies synergistic drug combinations for treating covid-19. Proc Natl Acad Sci 118(39):2105070118CrossRef Jin W, Stokes JM, Eastman RT, Itkin Z, Zakharov AV, Collins JJ, Jaakkola TS, Barzilay R (2021) Deep learning identifies synergistic drug combinations for treating covid-19. Proc Natl Acad Sci 118(39):2105070118CrossRef
8.
Zurück zum Zitat Kairouz P, McMahan HB, Avent B, Bellet A, Bennis M, Bhagoji AN, Bonawitz K, Charles Z, Cormode G, Cummings R et al (2021) Advances and open problems in federated learning. Foundations and Trends® in Machine Learning 14(1–2):1–210 Kairouz P, McMahan HB, Avent B, Bellet A, Bennis M, Bhagoji AN, Bonawitz K, Charles Z, Cormode G, Cummings R et al (2021) Advances and open problems in federated learning. Foundations and Trends® in Machine Learning 14(1–2):1–210
9.
Zurück zum Zitat Xu J, Glicksberg BS, Su C, Walker P, Bian J, Wang F (2021) Federated learning for healthcare informatics. J Healthc Inform Res 5(1):1–19CrossRef Xu J, Glicksberg BS, Su C, Walker P, Bian J, Wang F (2021) Federated learning for healthcare informatics. J Healthc Inform Res 5(1):1–19CrossRef
10.
Zurück zum Zitat Li T, Sahu AK, Talwalkar A, Smith V (2020) Federated learning: Challenges, methods, and future directions. IEEE Signal Process Mag 37(3):50–60CrossRef Li T, Sahu AK, Talwalkar A, Smith V (2020) Federated learning: Challenges, methods, and future directions. IEEE Signal Process Mag 37(3):50–60CrossRef
11.
Zurück zum Zitat Lyu L, Yu H, Ma X, Chen C, Sun L, Zhao J, Yang Q, Philip SY (2022) Privacy and robustness in federated learning: Attacks and defenses. IEEE Trans Neural Netw Learn Syst Lyu L, Yu H, Ma X, Chen C, Sun L, Zhao J, Yang Q, Philip SY (2022) Privacy and robustness in federated learning: Attacks and defenses. IEEE Trans Neural Netw Learn Syst
12.
Zurück zum Zitat He X, Jia J, Backes M, Gong NZ, Zhang Y (2021) Stealing links from graph neural networks. In: 30th USENIX Security Symposium (USENIX Security 21), pp 2669–2686 He X, Jia J, Backes M, Gong NZ, Zhang Y (2021) Stealing links from graph neural networks. In: 30th USENIX Security Symposium (USENIX Security 21), pp 2669–2686
13.
Zurück zum Zitat Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp 1175–1191 Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp 1175–1191
14.
Zurück zum Zitat Zhao Y, Zhao J, Yang M, Wang T, Wang N, Lyu L, Niyato D, Lam K-Y (2020) Local differential privacy-based federated learning for internet of things. IEEE Internet Things J 8(11):8836–8853CrossRef Zhao Y, Zhao J, Yang M, Wang T, Wang N, Lyu L, Niyato D, Lam K-Y (2020) Local differential privacy-based federated learning for internet of things. IEEE Internet Things J 8(11):8836–8853CrossRef
15.
Zurück zum Zitat Fallah A, Mokhtari A, Ozdaglar A (2020) Personalized federated learning: A meta-learning approach. arXiv preprint arXiv:2002.07948 Fallah A, Mokhtari A, Ozdaglar A (2020) Personalized federated learning: A meta-learning approach. arXiv preprint arXiv:​2002.​07948
16.
Zurück zum Zitat Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: ACM, pp 169–178 Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: ACM, pp 169–178
17.
Zurück zum Zitat Liu C, Chakraborty S, Verma D (2019) Secure model fusion for distributed learning using partial homomorphic encryption. In: Policy-Based Autonomic Data Governance, pp 154–179. Springer Liu C, Chakraborty S, Verma D (2019) Secure model fusion for distributed learning using partial homomorphic encryption. In: Policy-Based Autonomic Data Governance, pp 154–179. Springer
18.
Zurück zum Zitat Yao AC (1982) Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp 160–164. IEEE Yao AC (1982) Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp 160–164. IEEE
19.
Zurück zum Zitat Mohassel P, Rindal P (2018) Aby3: A mixed protocol framework for machine learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp 35–52 Mohassel P, Rindal P (2018) Aby3: A mixed protocol framework for machine learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp 35–52
20.
Zurück zum Zitat So J, Güler B, Avestimehr AS (2021) Turbo-aggregate: Breaking the quadratic aggregation barrier in secure federated learning. IEEE J Sel Areas Inf Theory 2(1):479–489CrossRef So J, Güler B, Avestimehr AS (2021) Turbo-aggregate: Breaking the quadratic aggregation barrier in secure federated learning. IEEE J Sel Areas Inf Theory 2(1):479–489CrossRef
21.
Zurück zum Zitat He C, Balasubramanian K, Ceyani E, Yang C, Xie H, Sun L, He L, Yang L, Philip SY, Rong Y et al (2021) Fedgraphnn: A federated learning benchmark system for graph neural networks He C, Balasubramanian K, Ceyani E, Yang C, Xie H, Sun L, He L, Yang L, Philip SY, Rong Y et al (2021) Fedgraphnn: A federated learning benchmark system for graph neural networks
22.
Zurück zum Zitat Zhang K, Yang C, Li X, Sun L, Yiu SM (2021) Subgraph federated learning with missing neighbor generation. Adv Neural Inf Proces Syst 34:6671–6682 Zhang K, Yang C, Li X, Sun L, Yiu SM (2021) Subgraph federated learning with missing neighbor generation. Adv Neural Inf Proces Syst 34:6671–6682
23.
Zurück zum Zitat Chen C, Hu W, Xu Z, Zheng Z (2021) Fedgl: federated graph learning framework with global self-supervision. arXiv preprint arXiv:2105.03170 Chen C, Hu W, Xu Z, Zheng Z (2021) Fedgl: federated graph learning framework with global self-supervision. arXiv preprint arXiv:​2105.​03170
24.
Zurück zum Zitat Zheng L, Zhou J, Chen C, Wu B, Wang L, Zhang B (2021) Asfgnn: Automated separated-federated graph neural network. Peer Peer Netw Appl 14(3):1692–1704CrossRef Zheng L, Zhou J, Chen C, Wu B, Wang L, Zhang B (2021) Asfgnn: Automated separated-federated graph neural network. Peer Peer Netw Appl 14(3):1692–1704CrossRef
25.
Zurück zum Zitat Gilmer J, Schoenholz SS, Riley PF, Vinyals O, Dahl GE (2017) Neural message passing for quantum chemistry. In: International Conference on Machine Learning, pp 1263–1272 PMLR Gilmer J, Schoenholz SS, Riley PF, Vinyals O, Dahl GE (2017) Neural message passing for quantum chemistry. In: International Conference on Machine Learning, pp 1263–1272 PMLR
26.
Zurück zum Zitat Tompa M, Woll H (1989) How to share a secret with cheaters. J Cryptol 1(3):133–138 Tompa M, Woll H (1989) How to share a secret with cheaters. J Cryptol 1(3):133–138
27.
Zurück zum Zitat Diffie W, Hellman ME (2022) New directions in cryptography. In: Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, pp 365–390 Diffie W, Hellman ME (2022) New directions in cryptography. In: Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman, pp 365–390
28.
Zurück zum Zitat Blum M, Micali S (2019) How to generate cryptographically strong sequences of pseudo random bits. In: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp 227–240 Blum M, Micali S (2019) How to generate cryptographically strong sequences of pseudo random bits. In: Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, pp 227–240
29.
Zurück zum Zitat Bellare M, Namprempre C (2008) Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. J Cryptol 21(4):469–491MathSciNetCrossRefMATH Bellare M, Namprempre C (2008) Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. J Cryptol 21(4):469–491MathSciNetCrossRefMATH
30.
Zurück zum Zitat Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. Adv Neural Inf Proces Syst 30 Hamilton W, Ying Z, Leskovec J (2017) Inductive representation learning on large graphs. Adv Neural Inf Proces Syst 30
31.
Zurück zum Zitat Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) 10(2):1–19CrossRef Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST) 10(2):1–19CrossRef
32.
Zurück zum Zitat Cormen TH, Leiserson CE, Rivest RL, Stein C (2009) Introduction to Algorithms, 3rd. The MIT PressMATH Cormen TH, Leiserson CE, Rivest RL, Stein C (2009) Introduction to Algorithms, 3rd. The MIT PressMATH
33.
Zurück zum Zitat Berrut J-P, Trefethen LN (2004) Barycentric lagrange interpolation. SIAM review 46(3):501–517 Berrut J-P, Trefethen LN (2004) Barycentric lagrange interpolation. SIAM review 46(3):501–517
34.
Zurück zum Zitat Bell JH, Bonawitz KA, Gascón A, Lepoint T, Raykova M (2020) Secure single-server aggregation with (poly) logarithmic overhead. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp 1253–1269 Bell JH, Bonawitz KA, Gascón A, Lepoint T, Raykova M (2020) Secure single-server aggregation with (poly) logarithmic overhead. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp 1253–1269
Metadaten
Titel
ESA-FedGNN: Efficient secure aggregation for federated graph neural networks
verfasst von
Yanjun Liu
Hongwei Li
Xinyuan Qian
Meng Hao
Publikationsdatum
23.03.2023
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 2/2023
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-023-01472-2

Weitere Artikel der Ausgabe 2/2023

Peer-to-Peer Networking and Applications 2/2023 Zur Ausgabe

Premium Partner