Journal
IEEE NETWORK
Volume 35, Issue 4, Pages 295-301Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MNET.011.2000604
Keywords
Training; Servers; Data models; Image edge detection; Blockchain; Biological system modeling; Security
Categories
Funding
- National Key Research and Development Program of China [2019YFB1802800, LZC0019]
- Sichuan Science and Technology Program [2021YFG0165, 2021YFG0037]
Ask authors/readers for more resources
Blockchained federated learning, with its security properties such as decentralization, immutability, and traceability, is evolving into a key direction for next-generation AI. BytoChain, a byzantine resistant secure blockchained federated learning framework, improves model verification efficiency and detects byzantine attacks through a PoA consensus. By mitigating various types of attacks, BytoChain demonstrates effectiveness and addresses open issues in security.
The emerging blockchained federated learning, known for its security properties such as decentralization, immutability and traceability, is evolving into an important direction of next-generation AI. With the booming edge computing technologies, blockchained federated learning can take advantage of computing, communication and storage resources geo-distributed at the edge, so that blockchained federated learning can gather edge intelligence from more widely distributed devices more efficiently. However, untrustworthy devices at the edge also bring serious security threats, namely byzantine attacks. Existing solutions focus on selecting local models that are most likely to be honest, rather than detecting byzantine models and identifying attackers, because verifying each local model separately brings intolerable verification delay. In this paper, we propose a byzantine resistant secure blockchained federated learning framework named BytoChain. BytoChain improves the efficiency of model verification by introducing verifiers to execute heavy verification workflows in parallel, and detects byzantine attacks through a byzantine resistant consensus Proof-of-Accuracy (PoA). We analyze how BytoChain can mitigate five types of attacks, and demonstrate its effectiveness by simulations. Finally, we envision some open issues about security, including attacks on privacy, confidentiality, and backdoors.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available