4.7 Article

Byzantine Resistant Secure Blockchained Federated Learning at the Edge

期刊

IEEE NETWORK
卷 35, 期 4, 页码 295-301

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/MNET.011.2000604

关键词

Training; Servers; Data models; Image edge detection; Blockchain; Biological system modeling; Security

资金

  1. National Key Research and Development Program of China [2019YFB1802800, LZC0019]
  2. Sichuan Science and Technology Program [2021YFG0165, 2021YFG0037]

向作者/读者索取更多资源

Blockchained federated learning, with its security properties such as decentralization, immutability, and traceability, is evolving into a key direction for next-generation AI. BytoChain, a byzantine resistant secure blockchained federated learning framework, improves model verification efficiency and detects byzantine attacks through a PoA consensus. By mitigating various types of attacks, BytoChain demonstrates effectiveness and addresses open issues in security.
The emerging blockchained federated learning, known for its security properties such as decentralization, immutability and traceability, is evolving into an important direction of next-generation AI. With the booming edge computing technologies, blockchained federated learning can take advantage of computing, communication and storage resources geo-distributed at the edge, so that blockchained federated learning can gather edge intelligence from more widely distributed devices more efficiently. However, untrustworthy devices at the edge also bring serious security threats, namely byzantine attacks. Existing solutions focus on selecting local models that are most likely to be honest, rather than detecting byzantine models and identifying attackers, because verifying each local model separately brings intolerable verification delay. In this paper, we propose a byzantine resistant secure blockchained federated learning framework named BytoChain. BytoChain improves the efficiency of model verification by introducing verifiers to execute heavy verification workflows in parallel, and detects byzantine attacks through a byzantine resistant consensus Proof-of-Accuracy (PoA). We analyze how BytoChain can mitigate five types of attacks, and demonstrate its effectiveness by simulations. Finally, we envision some open issues about security, including attacks on privacy, confidentiality, and backdoors.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据