Articles producció científica> Enginyeria Informàtica i Matemàtiques

Secure and Privacy-Preserving Federated Learning via Co-Utility

  • Datos identificativos

    Identificador: imarina:9226276
    Handle: http://hdl.handle.net/20.500.11797/imarina9226276
  • Autores:

    Domingo-Ferrer J
    Blanco-Justicia A
    Manjon J
    Sanchez D
  • Otros:

    Autor según el artículo: Domingo-Ferrer J; Blanco-Justicia A; Manjon J; Sanchez D
    Departamento: Enginyeria Informàtica i Matemàtiques
    Autor/es de la URV: Blanco Justicia, Alberto / Domingo Ferrer, Josep / Manjón Paniagua, Jesús Alberto / Sánchez Ruenes, David
    Palabras clave: Self-enforcing protocols Security Protocols Privacy Peer-to-peer. Model poisoning Internet of things Federated learning Data models Computational modeling Collaborative work Co-utility security privacy peer-to-peer model poisoning internet of things federated learning data models computational modeling collaborative work co-utility
    Resumen: The decentralized nature of federated learning, that often leverages the power of edge devices, makes it vulnerable to attacks against privacy and security. The privacy risk for a peer is that the model update she computes on her private data may, when sent to the model manager, leak information on those private data. Even more obvious are security attacks, whereby one or several malicious peers return wrong model updates in order to disrupt the learning process and lead to a wrong model being learned. In this paper we build a federated learning framework that offers privacy to the participating peers as well as security against Byzantine and poisoning attacks. Our framework consists of several protocols that provide strong privacy to the participating peers via unlinkable anonymity and that are rationally sustainable based on the co-utility property. In other words, no rational party is interested in deviating from the proposed protocols. We leverage the notion of co-utility to build a decentralized co-utile reputation management system that provides incentives for parties to adhere to the protocols. Unlike privacy protection via differential privacy, our approach preserves the values of model updates and hence the accuracy of plain federated learning; unlike privacy protection via update aggregation, our approach preserves the ability to detect bad model updates while substantially reducing the computational overhead compared to methods based on homomorphic encryption.
    Áreas temáticas: Telecommunications Signal processing Information systems and management Information systems Hardware and architecture Engineering, electrical & electronic Engenharias iv Computer science, information systems Computer science applications Computer networks and communications Ciência da computação
    Acceso a la licencia de uso: https://creativecommons.org/licenses/by/3.0/es/
    Direcció de correo del autor: alberto.blanco@urv.cat josep.domingo@urv.cat jesus.manjon@urv.cat jesus.manjon@urv.cat jesus.manjon@urv.cat david.sanchez@urv.cat
    Identificador del autor: 0000-0002-1108-8082 0000-0001-7213-4962 0000-0003-3513-8109 0000-0003-3513-8109 0000-0003-3513-8109 0000-0001-7275-7887
    Fecha de alta del registro: 2023-02-23
    Versión del articulo depositado: info:eu-repo/semantics/acceptedVersion
    Enlace a la fuente original: https://www.nature.com/articles/s42256-020-0186-1
    URL Documento de licencia: http://repositori.urv.cat/ca/proteccio-de-dades/
    Referencia al articulo segun fuente origial: Ieee Internet Of Things Journal. 9 (5): 3988-4000
    Referencia de l'ítem segons les normes APA: Domingo-Ferrer J; Blanco-Justicia A; Manjon J; Sanchez D (2022). Secure and Privacy-Preserving Federated Learning via Co-Utility. Ieee Internet Of Things Journal, 9(5), 3988-4000. DOI: 10.1109/JIOT.2021.3102155
    DOI del artículo: 10.1109/JIOT.2021.3102155
    Entidad: Universitat Rovira i Virgili
    Año de publicación de la revista: 2022
    Tipo de publicación: Journal Publications
  • Palabras clave:

    Computer Networks and Communications,Computer Science Applications,Computer Science, Information Systems,Engineering, Electrical & Electronic,Hardware and Architecture,Information Systems,Information Systems and Management,Signal Processing,Telecommunications
    Self-enforcing protocols
    Security
    Protocols
    Privacy
    Peer-to-peer.
    Model poisoning
    Internet of things
    Federated learning
    Data models
    Computational modeling
    Collaborative work
    Co-utility
    security
    privacy
    peer-to-peer
    model poisoning
    internet of things
    federated learning
    data models
    computational modeling
    collaborative work
    co-utility
    Telecommunications
    Signal processing
    Information systems and management
    Information systems
    Hardware and architecture
    Engineering, electrical & electronic
    Engenharias iv
    Computer science, information systems
    Computer science applications
    Computer networks and communications
    Ciência da computação
  • Documentos:

  • Cerca a google

    Search to google scholar