4.7 Article

Byzantine Resistant Secure Blockchained Federated Learning at the Edge

Journal

IEEE NETWORK
Volume 35, Issue 4, Pages 295-301

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MNET.011.2000604

Keywords

Training; Servers; Data models; Image edge detection; Blockchain; Biological system modeling; Security

Funding

  1. National Key Research and Development Program of China [2019YFB1802800, LZC0019]
  2. Sichuan Science and Technology Program [2021YFG0165, 2021YFG0037]

Ask authors/readers for more resources

Blockchained federated learning, with its security properties such as decentralization, immutability, and traceability, is evolving into a key direction for next-generation AI. BytoChain, a byzantine resistant secure blockchained federated learning framework, improves model verification efficiency and detects byzantine attacks through a PoA consensus. By mitigating various types of attacks, BytoChain demonstrates effectiveness and addresses open issues in security.
The emerging blockchained federated learning, known for its security properties such as decentralization, immutability and traceability, is evolving into an important direction of next-generation AI. With the booming edge computing technologies, blockchained federated learning can take advantage of computing, communication and storage resources geo-distributed at the edge, so that blockchained federated learning can gather edge intelligence from more widely distributed devices more efficiently. However, untrustworthy devices at the edge also bring serious security threats, namely byzantine attacks. Existing solutions focus on selecting local models that are most likely to be honest, rather than detecting byzantine models and identifying attackers, because verifying each local model separately brings intolerable verification delay. In this paper, we propose a byzantine resistant secure blockchained federated learning framework named BytoChain. BytoChain improves the efficiency of model verification by introducing verifiers to execute heavy verification workflows in parallel, and detects byzantine attacks through a byzantine resistant consensus Proof-of-Accuracy (PoA). We analyze how BytoChain can mitigate five types of attacks, and demonstrate its effectiveness by simulations. Finally, we envision some open issues about security, including attacks on privacy, confidentiality, and backdoors.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available