Loading [MathJax]/extensions/MathMenu.js
Edge-based Protection Against Malicious Poisoning for Distributed Federated Learning | IEEE Conference Publication | IEEE Xplore

Edge-based Protection Against Malicious Poisoning for Distributed Federated Learning


Abstract:

Federated learning is proposed to solve data islands and protect privacy. Especially in the big data environment, participating users can build a model together without s...Show More

Abstract:

Federated learning is proposed to solve data islands and protect privacy. Especially in the big data environment, participating users can build a model together without sharing private sensitive data. However, as the number of end devices becomes larger, and the model becomes more complex, high concurrent access to the cloud server often brings communication delay, and it is also a great challenge to the computing power of end devices. To address this problem, we introduce Unmanned Aerial Vehicle (UAV) swarms as mobile edge nodes for end devices. UAV swarms can provide caching and computing resources for end devices. Therefore, we can implement edge aggregation of parameters on UAV swarms to reduce direct access to the cloud server. Meanwhile, the distributed end-edge-cloud federated learning architecture based on UAV swarms is an open environment, which may have potential malicious end devices or external channel eavesdropping. Malicious end devices or external eavesdroppers may maliciously poison training data sets or model parameters to reduce the classification accuracy of the model. In order to resist malicious poisoning, on UAV swarms we can calculate the cosine similarities between local parameters and their edge aggregation parameters to exclude malicious parameters, which do not conform to the trend of collaborative convergence. Then, the reliable parameters can be aggregated again, and uploaded to the cloud server with Schnorr signature to ensure the authenticity of the data. We analyze the security of the proposed scheme, and verify through experiments that it can resist malicious poisoning effectively and improve the accuracy of the model.
Date of Conference: 04-06 May 2022
Date Added to IEEE Xplore: 20 May 2022
ISBN Information:
Conference Location: Hangzhou, China

Funding Agency:

References is not available for this document.

I. Introduction

The surge of smart phones, Internet of Things (IoT) and other devices has led to the arrival of the big data era [1]. Deep learning provides an effective means for processing massive data [2], such as managing a large number of patient data for disease prediction, performing independent safety audit from system logs, etc. However, centralized deep learning often leads to the disclosure of user’s data and a series of privacy problems. Federated learning (FL) [3] has been proposed to solve the dilemma of centralized deep learning. FL allows users to participate in global training without sharing private sample data, so as to protect the privacy of user’s data. Specifically, each user trains the global model with private datasets and only upload the updated parameters (i.e., weights and offsets) to the central cloud server for aggregation and repeat the above process until the model converges. However, with the increasing number of users participating in training and more complex deep learning models are used, parameters uploaded by users are becoming larger and larger, which inevitably will cause bandwidth contention and communication delay [4]. Some communication compression methods such as Sketched updates [5] alleviate the communication pressure by compressing the upload gradient, but it will bring the loss of gradient information and reduce the accuracy of the model. In order to alleviate the pressure of communication and computing, FL has gradually evolved from end-cloud to end-edge-cloud architecture.

Select All
1.
Y. Shui, L. Meng, W. Dou, X. Liu and S. Zhou, "Networking for big data: A survey", IEEE Communications Surveys Tutorials, vol. PP, no. 1, pp. 1-1, 2017.
2.
M. A. Alsheikh, D. Niyato, S. Lin, H.-P. Tan and Z. Han, "Mobile big data analytics using deep learning and apache spark", IEEE network, vol. 30, no. 3, pp. 22-29, 2016.
3.
B. McMahan, E. Moore, D. Ramage, S. Hampson and B. A. y Arcas, "Communication-efficient learning of deep networks from decentralized data", Artificial intelligence and statistics., pp. 1273-1282, 2017.
4.
T. Li, A. K. Sahu, A. Talwalkar and V. Smith, "Federated learning: Challenges methods and future directions", IEEE Signal Processing Magazine, vol. 37, no. 3, pp. 50-60, 2020.
5.
J. Konečnỳ, H. B. McMahan, F. X. Yu, P. Richtárik, A. T. Suresh and D. Bacon, "Federated learning: Strategies for improving communication efficiency", 2016.
6.
N. H. Motlagh et al., "Uav-based iot platform: A crowd surveillance use case", IEEE Communications Magazine, vol. 55, no. 2, pp. 128-134, 2017.
7.
X. Wang, Y. Han, C. Wang, Q. Zhao, X. Chen and M. Chen, "In-edge ai: Intelligentizing mobile edge computing caching and communication by federated learning", IEEE Network, vol. 33, no. 5, pp. 156-165, 2019.
8.
Z. Tan, H. Qu, J. Zhao, S. Zhou and W. Wang, "Uav-aided edge/fog computing in smart iot community for social augmented reality", IEEE Internet of Things Journal, vol. 7, no. 6, pp. 4872-4884, 2020.
9.
S. Shen et al., "Auror: Defending against poisoning attacks in collaborative deep learning systems", Proceedings of the 32nd Annual Conference on Computer Security Applications, pp. 508-519, 2016.
10.
F. Tramer, A. Kurakin, N. Papernot, I. Goodfellow, D. Boneh and P. McDaniel, "Ensemble adversarial training: Attacks and defenses", 2017.
11.
G. F. Cretu, A. Stavrou, M. E. Locasto, S. J. Stolfo and A. D. Keromytis, "Casting out demons: Sanitizing training data for anomaly sensors", 2008 IEEE Symposium on Security and Privacy (sp 2008)., pp. 81-95, 2008.
12.
K. M. Alonso et al., "Zero to monero", 2020.
13.
W. Luping et al., "Cmfl: Mitigating communication overhead for federated learning", 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS)., pp. 954-964, 2019.
14.
T. Wang, Y. Liu, X. Zheng, H. N. Dai and M. Xie, "Edge-based communication optimization for distributed federated learning", IEEE Transactions on Network Science and Engineering, vol. PP, no. 99, pp. 1-1, 2021.
15.
S. Al-Kuwari et al., "Cryptographic hash functions: Recent design trends and security notions", IACR Cryptol. ePrint Arch., vol. 2011, pp. 565, 2011.
16.
Y. Seurin, "On the exact security of schnorr-type signatures in the random oracle model", Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 554-571, 2012.

Contact IEEE to Subscribe

References

References is not available for this document.