4.8 Article

Lightweight Federated Learning for Large-Scale IoT Devices With Privacy Guarantee

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 10, Issue 4, Pages 3179-3191

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3127886

Keywords

Cryptography; Privacy; Computational modeling; Collaborative work; Servers; Training; Data privacy; Federated learning (FedL); Internet of Things (IoT) devices; lightweight; privacy preserving; secret sharing

Ask authors/readers for more resources

With the proliferation of IoT devices and the resulting accumulation of large amounts of data, there is a need for data analysis applications. This work proposes a lightweight privacy-preserving FedL scheme for IoT devices. It adds masks to parameters to protect the privacy of individual local data and incorporates a secure mask reusing mechanism for large-scale FedL tasks to reduce interactions among users. Extensive experiments on real IoT devices demonstrate the accuracy and efficiency of this scheme.
With the massive deployment of the Internet of Things (IoT) devices, many data analysis applications emerge for the large amount of data accumulated by IoT. Federated learning (FedL) on IoT devices is an appealing mode to train a precise data analysis model. However, existing FedL schemes either take expensive computation costs (e.g., public-key cryptographic operations) or a large number of interactions among participants. Obviously, these schemes are unsuitable for IoT devices due to the limited computational and communication resources. In this work, we propose a lightweight privacy-preserving FedL scheme for IoT devices. To protect the privacy of individual local data, we add masks to intervening parameters. An effective secret-sharing scheme is adopted to ensure that masks can be eliminated accurately. Considering that FedL involves multiple iterations and mask generation for each iteration costs a large number of interactions among users for privacy guarantee, we also design a secure mask reusing mechanism for large-scale FedL tasks. We prove that our scheme is secure against the honest-but-curious model. In addition, we also expand our scheme to deal with the collusion attack. Extensive experiments on real IoT devices demonstrate the accuracy and efficiency of our work.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available