4.8 Article

Privacy Preservation for Federated Learning With Robust Aggregation in Edge Computing

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 10, 期 8, 页码 7343-7355

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2022.3229122

关键词

Data models; Computational modeling; Data privacy; Training; Edge computing; Security; Privacy; federated learning (FL); privacy preservation; security

向作者/读者索取更多资源

This article proposes a privacy-preserving federated learning scheme with robust aggregation in edge computing, called FL-RAEC. The scheme constructs a hybrid privacy-preserving mechanism to protect the integrity and privacy of data uploaded by edge servers (ESs). It also introduces a phased aggregation strategy to achieve robust model aggregation. Anomaly detection based on autoencoder and multiple rounds of random verification are used to assess the trust score of each ES and identify malicious participants.
Benefiting from the powerful data analysis and prediction capabilities of artificial intelligence (AI), the data on the edge is often transferred to the cloud center for centralized training to obtain an accurate model. To resist the risk of privacy leakage due to frequent data transmission between the edge and the cloud, federated learning (FL) is engaged in the edge paradigm, uploading the model updated on the edge server (ES) to the central server for aggregation, instead of transferring data directly. However, the adversarial ES can infer the update of other ESs from the aggregated model and the update may still expose some characteristics of data of other ESs. Besides, there is a certain probability that the entire aggregation is disrupted by the adversarial ESs through uploading a malicious update. In this article, a privacy-preserving FL scheme with robust aggregation in edge computing is proposed, named FL-RAEC. First, the hybrid privacy-preserving mechanism is constructed to preserve the integrity and privacy of the data uploaded by the ESs. For the robust model aggregation, a phased aggregation strategy is proposed. Specifically, anomaly detection based on autoencoder is performed while some ESs are selected for anonymous trust verification at the beginning. In the next stage, via multiple rounds of random verification, the trust score of each ES is assessed to identify the malicious participants. Eventually, FL-RAEC is evaluated in detail, depicting that FL-RAEC has strong robustness and high accuracy under different attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据