Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Hybrid Privacy Preserving Federated Learning Against Irregular Users in Next-Generation Internet of Things

Published: 02 July 2024 Publication History

Abstract

While federated learning (FL) is a well-known privacy-preserving (PP) solution, recent studies demonstrate that it still has privacy problems and vulnerabilities, particularly in the context of the Next Generation Internet-of-Things (NG-IoT). Attackers on the server can potentially retrieve sensitive information such as data tabs and memberships. Additionally, current FL studies often overlook critical FL issues such as user dropout and low-quality data, which are prevalent in NG-IoT environments. In this article, we propose a privacy-preserving federated model in hybrid terms based on synchronous + asynchronous manner. This federated model removes the fundamental issues of FL-enabled NG-IoT environments while applying Two-Trapdoor Homomorphic Encryption (TTHE) to ensure the privacy and confidentiality of all components in the proposed model. Furthermore, our server protocol removes the effect of irregular users. In this regard, to control the impact of user dropout, we developed the hybrid LEGATO algorithm, which is asynchronous. To tackle users with low-quality data, we utilize the data-sharing method. Security analysis of the proposed model guarantees correctness, auditing, and PP in a federated setup. Also, in the performance evaluation, we achieved a high level of functionality and accuracy compared to peer works, while system overheads are shown to be lower.

References

[1]
Yazdinejad A., Dehghantanha A., Srivastava G., Ap2fl: Auditable privacy-preserving federated learning framework for electronics in healthcare, IEEE Trans. Consum. Electron. (2023).
[2]
Cao T.-D., Truong-Huu T., Tran H., Tran K., A federated deep learning framework for privacy preservation and communication efficiency, J. Syst. Archit. 124 (2022).
[3]
Kumar Y., Singla R., Federated learning systems for healthcare: Perspective and recent progress, Federated Learn. Syst. (2021) 141–156.
[4]
Zhang T., Gao L., He C., Zhang M., Krishnamachari B., Avestimehr A.S., Federated learning for the Internet of Things: Applications, challenges, and opportunities, IEEE Internet Things Mag. 5 (1) (2022) 24–29.
[5]
B. Hitaj, G. Ateniese, F. Perez-Cruz, Deep models under the GAN: Information leakage from collaborative deep learning, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 603–618.
[6]
Lan J., Zhang R., Yan Z., Wang J., Chen Y., Hou R., Adversarial attacks and defenses in speaker recognition systems: A survey, J. Syst. Archit. 127 (2022).
[7]
Yazdinejad A., Zolfaghari B., Dehghantanha A., Karimipour H., Srivastava G., Parizi R.M., Accurate threat hunting in industrial Internet of Things edge devices, Digit. Commun. Netw. 9 (5) (2023) 1123–1130.
[8]
Jagarlamudi G.K., Yazdinejad A., Parizi R.M., Pouriyeh S., Exploring privacy measurement in federated learning, J. Supercomput. (2023) 1–41.
[9]
Weng J., Weng J., Zhang J., Li M., Zhang Y., Luo W., Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive, IEEE Trans. Dependable Secure Comput. 18 (5) (2019) 2438–2455.
[10]
Yazdinejad A., Dehghantanha A., Parizi R.M., Hammoudeh M., Karimipour H., Srivastava G., Block hunter: Federated learning for cyber threat hunting in blockchain-based IIoT networks, IEEE Trans. Ind. Inform. 18 (11) (2022) 8356–8366,.
[11]
Zhang X., Wang Y., Chen S., Wang C., Yu D., Cheng X., Robust communication-efficient decentralized learning with heterogeneity, J. Syst. Archit. (2023).
[12]
Yazdinejad A., Parizi R.M., Dehghantanha A., Karimipour H., Federated learning for drone authentication, Ad Hoc Netw. 120 (2021).
[13]
Qian D., Cui Y., Fu Y., Liu F., Wei T., FedEntropy: Information-entropy-aided training optimization of semi-supervised federated learning, J. Syst. Archit. 137 (2023).
[14]
N. Phan, Y. Wang, X. Wu, D. Dou, Differential privacy preservation for deep auto-encoders: An application of human behavior prediction, in: Thirtieth AAAI Conference on Artificial Intelligence, 2016.
[15]
Sakhnini J., Karimipour H., Dehghantanha A., Yazdinejad A., Gadekallu T.R., Victor N., Islam A., A generalizable deep neural network method for detecting attacks in industrial cyber-physical systems, IEEE Syst. J. (2023).
[16]
K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H.B. McMahan, S. Patel, D. Ramage, A. Segal, K. Seth, Practical secure aggregation for privacy-preserving machine learning, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 1175–1191.
[17]
Chen P., Du X., Lu Z., Wu J., Hung P.C., Evfl: An explainable vertical federated learning for data-oriented artificial intelligence systems, J. Syst. Archit. 126 (2022).
[18]
Aono Y., Hayashi T., Wang L., Moriai S., et al., Privacy-preserving deep learning via additively homomorphic encryption, IEEE Trans. Inf. Forensics Secur. 13 (5) (2017) 1333–1345.
[19]
Phong L.T., Aono Y., Hayashi T., Wang L., Moriai S., Privacy-preserving deep learning: Revisited and enhanced, in: International Conference on Applications and Techniques in Information Security, Springer, 2017, pp. 100–110.
[20]
Yazdinejad A., Dehghantanha A., Parizi R.M., Srivastava G., Karimipour H., Secure intelligent fuzzy blockchain framework: Effective threat detection in iot networks, Comput. Ind. 144 (2023).
[21]
Zhao L., Wang Q., Zou Q., Zhang Y., Chen Y., Privacy-preserving collaborative deep learning with unreliable participants, IEEE Trans. Inf. Forensics Secur. 15 (2019) 1486–1500.
[22]
B. Jayaraman, D. Evans, Evaluating differentially private machine learning in practice, in: 28th USENIX Security Symposium, USENIX Security 19, 2019, pp. 1895–1912.
[23]
Park J., Lim H., Privacy-preserving federated learning using homomorphic encryption, Appl. Sci. 12 (2) (2022) 734.
[24]
Xu G., Li H., Zhang Y., Xu S., Ning J., Deng R., Privacy-preserving federated deep learning with irregular users, IEEE Trans. Dependable Secure Comput. (2020).
[25]
K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H.B. McMahan, S. Patel, D. Ramage, A. Segal, K. Seth, Practical secure aggregation for privacy-preserving machine learning, in: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 1175–1191.
[26]
Pyrgelis A., Troncoso C., De Cristofaro E., On location, time, and membership: Studying how aggregate location data can harm users’ privacy, 2018.
[27]
Z. Li, J. Zhang, L. Liu, J. Liu, Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage, in: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022, pp. 10132–10142.
[28]
Edemekong P.F., Annamaraju P., Haydel M.J., Health insurance portability and accountability act, 2018.
[29]
Mao C., Zhao Y., Sun M., Luo Y., Are my EHRs private enough? Event-level privacy protection, IEEE/ACM Trans. Comput. Biol. Bioinform. 16 (1) (2018) 103–112.
[30]
Shi G., Li L., Wang J., Chen W., Ye K., Xu C., HySync: Hybrid federated learning with effective synchronization, in: 2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems, HPCC/SmartCity/DSS, IEEE, 2020, pp. 628–633.
[31]
Xie C., Koyejo S., Gupta I., Asynchronous federated optimization, 2019, arXiv preprint arXiv:1903.03934.
[32]
Yazdinejad A., Dehghantanha A., Parizi R.M., Epiphaniou G., An optimized fuzzy deep learning model for data classification based on nsga-ii, Neurocomputing 522 (2023) 116–128.
[33]
Varma K., Zhou Y., Baracaldo N., Anwar A., LEGATO: A layerwise gradient AggregaTiOn algorithm for mitigating Byzantine attacks in federated learning, in: 2021 IEEE 14th International Conference on Cloud Computing, CLOUD, IEEE, 2021, pp. 272–277.
[34]
Rabieinejad E., Yazdinejad A., Parizi R.M., Dehghantanha A., Generative adversarial networks for cyber threat hunting in ethereum blockchain, Distrib. Ledger Technol. 2 (2) (2023),.
[35]
Li H., Liu D., Dai Y., Luan T.H., Yu S., Personalized search over encrypted data with efficient and secure updates in mobile clouds, IEEE Trans. Emerg. Top. Comput. 6 (1) (2015) 97–109.
[36]
Liu X., Choo K.-K.R., Deng R.H., Lu R., Weng J., Efficient and privacy-preserving outsourced calculation of rational numbers, IEEE Trans. Dependable Secure Comput. 15 (1) (2016) 27–39.
[39]
Phuong T.T., et al., Privacy-preserving deep learning via weight transmission, IEEE Trans. Inf. Forensics Secur. 14 (11) (2019) 3003–3015.
[40]
Smith V., Chiang C.-K., Sanjabi M., Talwalkar A.S., Federated multi-task learning, Advances in Neural Information Processing Systems, vol. 30, 2017.
[41]
Miao C., Jiang W., Su L., Li Y., Guo S., Qin Z., Xiao H., Gao J., Ren K., Privacy-preserving truth discovery in crowd sensing systems, ACM Trans. Sensor Netw. 15 (1) (2019) 1–32.
[42]
X. Yin, W. Tan, Semi-supervised truth discovery, in: Proceedings of the 20th International Conference on World Wide Web, 2011, pp. 217–226.
[43]
Zhao Y., Li M., Lai L., Suda N., Civin D., Chandra V., Federated learning with non-iid data, 2018, arXiv preprint arXiv:1806.00582.
[44]
Guerraoui R., Rouault S., et al., The hidden vulnerability of distributed learning in byzantium, in: International Conference on Machine Learning, PMLR, 2018, pp. 3521–3530.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Systems Architecture: the EUROMICRO Journal
Journal of Systems Architecture: the EUROMICRO Journal  Volume 148, Issue C
Mar 2024
242 pages

Publisher

Elsevier North-Holland, Inc.

United States

Publication History

Published: 02 July 2024

Author Tags

  1. Federated learning
  2. NG-IoT
  3. Privacy-preserving
  4. User dropout
  5. TTHE

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Sep 2024

Other Metrics

Citations

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media