Loading [MathJax]/extensions/MathMenu.js
Privacy-Preserving Machine Learning Training in IoT Aggregation Scenarios | IEEE Journals & Magazine | IEEE Xplore

Privacy-Preserving Machine Learning Training in IoT Aggregation Scenarios


Abstract:

In developing smart city, the growing popularity of machine learning (ML) that appreciates high-quality training data sets generated from diverse Internet-of-Things (IoT)...Show More

Abstract:

In developing smart city, the growing popularity of machine learning (ML) that appreciates high-quality training data sets generated from diverse Internet-of-Things (IoT) devices raises natural questions about the privacy guarantees that can be provided in such settings. Privacy-preserving ML training in an aggregation scenario enables a model demander to securely train ML models with the sensitive IoT data gathered from IoT devices. The existing solutions are generally server aided, cannot deal with the collusion threat between the servers or between the servers and data owners, and do not match the delicate environments of IoT. We propose a privacy-preserving ML training framework named Heda that consists of a library of building blocks based on partial homomorphic encryption, which enables constructing multiple privacy-preserving ML training protocols for the aggregation scenario without the assistance of untrusted servers, and defending the security under collusion situations. Rigorous security analysis demonstrates the proposed protocols can protect the privacy of each participant in the honest-but-curious model and guarantee the security under most collusion situations. Extensive experiments validate the efficiency of Heda, which achieves privacy-preserving ML training without losing the model accuracy.
Published in: IEEE Internet of Things Journal ( Volume: 8, Issue: 15, 01 August 2021)
Page(s): 12106 - 12118
Date of Publication: 19 February 2021

ISSN Information:

Funding Agency:

Citations are not available for this document.

I. Introduction

Internet of Things (IoT) plays a remarkable role in all aspects of our daily lives, covering various fields, including healthcare, industrial appliances, sports, homes, etc. [1], [2]. The large data collected from IoT devices with machine learning (ML) technologies have been accelerating smart city steps and improving our daily lives [3]–[5]. For a personal healthcare example, fitness records monitored by wearable IoT sensors can be used to train an ML model of medical research institutions, for self-rated health measurement.

Cites in Papers - |

Cites in Papers - IEEE (12)

Select All
1.
Jina Park, Kyuseung Han, Eunjin Choi, Jae-Jin Lee, Kyeongwon Lee, Woojoo Lee, Massoud Pedram, "Designing Low-Power RISC-V Multicore Processors With a Shared Lightweight Floating Point Unit for IoT Endnodes", IEEE Transactions on Circuits and Systems I: Regular Papers, vol.71, no.9, pp.4106-4119, 2024.
2.
Vaibhav Kant Singh, Aditya Singh Chauhan, Ayush Singh, Raja Thakur, "Homomorphic Encryption: Hands Inside the Gloves", 2023 3rd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), pp.248-253, 2023.
3.
Pinkal Jain, Vikas Thada, Ajay Lala, "Design of Advanced Privacy Preserving Model for Protecting Privacy within a Fog Computing Scenario", 2023 10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), vol.10, pp.1357-1361, 2023.
4.
Ruoli Zhao, Yong Xie, Lijun Zhang, Haiyan Cao, Ping Liu, "An Efficient and Privacy preserving Computation Framework for Tibetan medicine", 2023 IEEE 10th International Conference on Cyber Security and Cloud Computing (CSCloud)/2023 IEEE 9th International Conference on Edge Computing and Scalable Cloud (EdgeCom), pp.53-58, 2023.
5.
Sk. Shamreen, M. Madhavi, L. Priyanka, B. Saravani, "Privacy Preservation of Business Forecasting Using Homomorphic Encryption", 2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF), pp.1-6, 2023.
6.
Mohammad Salimibeni, Zohreh Hajiakhondi-Meybodi, Arash Mohammadi, Yingxu Wang, "TB-ICT: A Trustworthy Blockchain-Enabled System for Indoor Contact Tracing in Epidemic Control", IEEE Internet of Things Journal, vol.10, no.7, pp.5992-6017, 2023.
7.
Pallavi Shetty, Kapil Joshi, Dr. Ramakrishnan Raman, K. Naga Venkateshwara Rao, Dr. A. Vijaya Kumar, Mohit Tiwari, "A Framework of Artificial Intelligence for the Manufacturing and Image Classification system", 2022 5th International Conference on Contemporary Computing and Informatics (IC3I), pp.1504-1508, 2022.
8.
Dehua Zhou, Yingwei Yu, Di Wu, Qingqing Gan, Zexiao Chen, Botong Xu, "SecureAstraea: A Self-balancing Privacy-preserving Federated Learning Framework", 2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), pp.1-8, 2022.
9.
Xiangyun Tang, Liehuang Zhu, Meng Shen, Jialiang Peng, Jiawen Kang, Dusit Niyato, Ahmed A. Abd El-Latif, "Secure and Trusted Collaborative Learning Based on Blockchain for Artificial Intelligence of Things", IEEE Wireless Communications, vol.29, no.3, pp.14-22, 2022.
10.
Rui Wang, Xiangyun Tang, Meng Shen, Liehuang Zhu, "Privacy-preserving Training Algorithm for Naive Bayes Classifiers", ICC 2022 - IEEE International Conference on Communications, pp.5639-5644, 2022.
11.
Haozhao Wang, Ruixuan Li, Chengjie Li, Pan Zhou, Yuhua Li, Wenchao Xu, Song Guo, "Gradient Scheduling With Global Momentum for Asynchronous Federated Learning in Edge Environment", IEEE Internet of Things Journal, vol.9, no.19, pp.18817-18828, 2022.
12.
Danyang Xiao, Chengang Yang, Weigang Wu, "Mixing Activations and Labels in Distributed Training for Split Learning", IEEE Transactions on Parallel and Distributed Systems, vol.33, no.11, pp.3165-3177, 2022.

Cites in Papers - Other Publishers (11)

1.
Vagner E. Quincozes, Silvio E. Quincozes, Juliano F. Kazienko, Simone Gama, Omar Cheikhrouhou, Anis Koubaa, "A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)", International Journal of Information Security, 2024.
2.
Rahim Taheri, Mohammad Shojafar, Farzad Arabikhan, Alexander Gegov, "Unveiling vulnerabilities in deep learning-based malware detection: Differential privacy driven adversarial attacks", Computers & Security, pp.104035, 2024.
3.
Subashini V., Janaki R., "Applications of Machine Learning Algorithms in Data Encryption Standards", Machine Learning and Cryptographic Solutions for Data Protection and Network Security, pp.111, 2024.
4.
Tarun Kumar Vashishth, Vikas Sharma, Kewal Krishan Sharma, Bhupendra Kumar, Sachin Chaudhary, Manoj Gupta, "Privacy-Preserving Machine Learning Techniques for IoT Data in Cloud Environments", Emerging Technologies for Securing the Cloud and IoT, pp.144, 2024.
5.
Wendan Zhang, Yuhong Sun, Sucheng Yan, Hua Wang, Yining Liu, Chen Zhang, "EPoLORE: Efficient and\\xa0Privacy Preserved Logistic Regression Scheme", Artificial Intelligence Security and Privacy, vol.14510, pp.63, 2024.
6.
Rakib Ul Haque, A.S.M. Touhidul Hasan, Apubra Daria, Abdur Rasool, Hui Chen, Qingshan Jiang, Yuqing Zhang, "A novel secure and distributed architecture for privacy-preserving healthcare system", Journal of Network and Computer Applications, pp.103696, 2023.
7.
Jaydip Sen, Subhasis Dasgupta, "Introductory Chapter: Data Privacy Preservation on the Internet of Things", Information Security and Privacy in the Digital World - Some Selected Topics, 2023.
8.
Eva Rodriguez, Beatriz Otero, Ramon Canal, "A Survey of Machine and Deep Learning Methods for Privacy Protection in the Internet of Things", Sensors, vol.23, no.3, pp.1252, 2023.
9.
Jiawen Xu, Matthias Kovatsch, Denny Mattern, Filippo Mazza, Marko Harasic, Adrian Paschke, Sergio Lucia, "A Review on AI for Smart Manufacturing: Deep Learning Challenges and Solutions", Applied Sciences, vol.12, no.16, pp.8239, 2022.
10.
Zakia Zaman, Wanli Xue, Praveen Gauravaram, Wen Hu, Sanjay Jha, "BloomXNOR-Net", Proceedings of the 13th ACM Wireless of the Students, by the Students, and for the Students Workshop, pp.1, 2022.
11.
Shamima Akter, Farhana Reza, Manik Ahmed, "Convergence of Blockchain, k-medoids and homomorphic encryption for privacy preserving biomedical data classification", Internet of Things and Cyber-Physical Systems, vol.2, pp.99, 2022.
Contact IEEE to Subscribe

References

References is not available for this document.