4.6 Article

Fedlabx: a practical and privacy-preserving framework for federated learning

期刊

COMPLEX & INTELLIGENT SYSTEMS
卷 -, 期 -, 页码 -

出版社

SPRINGER HEIDELBERG
DOI: 10.1007/s40747-023-01184-3

关键词

Federated learning; Kafka; Secure aggregation; Differential privacy

向作者/读者索取更多资源

This paper presents a practical privacy-preserving scheme combining cryptographic techniques and communication networking solutions to address the security vulnerabilities and communication inefficiencies in federated learning. The proposed approach utilizes Kafka for message distribution, the Diffie-Hellman scheme for secure server aggregation, and gradient differential privacy for interference attack prevention.
Federated learning (FL) draws attention in academia and industry due to its privacy-preserving capability in training machine learning models. However, there are still some critical security attacks and vulnerabilities, including gradients leakage and interference attacks. Meanwhile, communication is another bottleneck in basic FL schemes since large-scale FL parameter transmission leads to inefficient communication, latency, and slower learning processes. To overcome these shortcomings, different communication efficiency strategies and privacy-preserving cryptographic techniques have been proposed. However, a single method can only partially resist privacy attacks. This paper presents a practical, privacy-preserving scheme combining cryptographic techniques and communication networking solutions. We implement Kafka for message distribution, the Diffie-Hellman scheme for secure server aggregation, and gradient differential privacy for interference attack prevention. The proposed approach maintains training efficiency while being able to addressing gradients leakage problems and interference attacks. Meanwhile, the implementation of Kafka and Zookeeper provides asynchronous communication and anonymous authenticated computation with role-based access controls. Finally, we prove the privacy-preserving properties of the proposed solution via security analysis and empirically demonstrate its efficiency and practicality.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据