Abstract
In this paper, we consider a mobile edge computing (MEC) system that multiple users participate in the federated learning protocol by jointly training a deep neural network (DNN) with their private training datasets. The main challenges of applying federated learning to MEC are: (1) it incurs tremendous computational cost by carrying out the deep neural network training phase on the resource-constraint mobile edge devices; (2) existing literature demonstrates that the parameters of a DNN trained on a dataset can be exploited to partially reconstruct the training samples in original dataset. To address the aforementioned issues, we introduce an efficiently private federated learning scheme in mobile edge computing, named FedMEC, with model partition technique and differential privacy method in this work. The experimental results demonstrate that our proposed FedMEC scheme can achieve high model accuracy under different perturbation strengths.
Supported in part by the National Key Research and Development Program of China, under Grant 2017YFB0802303, in part by the National Natural Science Foundation of China, under Grant 61672283, and in part by the Postgraduate Research & Practice Innovation Program of Jiangsu Province under Grant KYCX18_0308.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mach, P., Becvar, Z.: Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 19(3), 1628–1656 (2017)
Hesamifard, E., Takabi, H., Ghasemi, M., Wright, R.N.: Privacy-preserving machine learning as a service. In: Proceedings of 19th Privacy Enhancing Technologies Symposium, PETS, Barcelona, Spain, July 2018, pp. 123–142 (2018)
Zhang, Q., Yang, L.T., Chen, Z.: Privacy preserving deep computation model on cloud for big data feature learning. IEEE Trans. Comput. 65(5), 1351–1362 (2016)
Zhang, J., Chen, B., Zhao, Y., Cheng, X., Hu, F.: Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6, 18209–18237 (2018)
Smith, V., Chiang, C.-K., Sanjabi, M., Talwalkar, A.S.: Federated multi-task learning. In: Proceedings of the 32nd Annual Conference on Neural Information Processing Systems, NIPS, Long Beach, CA, USA, December 2017, pp. 4427–4437 (2017)
Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. 10(2), 1–19 (2019)
Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM Conference on Computer and Communications Security, CCS, Denver, Colorado, USA, October 2008, pp. 1310–1321 (2015)
McMahan, H.B., Moore, E., Ramage, D., Hampson, S., Agüera y Arcas, B.: Communication-efficient learning of deep networks from decentralized data. In: Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS, Fort Lauderadale, Florida, USA, April 2017, pp. 1–10 (2017)
Wang, J., Zhang, J., Bao, W., Zhu, X., Cao, B., Yu, P.S.: Not just privacy: improving performance of private deep learning in mobile cloud. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD, London, United Kingdom, August 2018, pp. 2407–2416 (2018)
Mao, Y., Yi, S., Li, Q., Feng, J., Xu, F., Zhong, S.: Learning from differentially private neural activations with edge computing. In: Proceedings of the 3rd IEEE/ACM Symposium on Edge Computing, SEC, Seattle, WA, USA, October 2018, pp. 90–102 (2018)
Osia, S.A., et al.: A hybrid deep learning architecture for privacy-preserving mobile analytics. ACM Trans. Knowl. Discov. Data 1(1), 1–21 (2018)
Fredrikson, F., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22th ACM Conference on Computer and Communications Security, CCS, Denver, Colorado, USA, October 2015, pp. 1322–1333 (2015)
Phong, L.T., Aono, Y., Hayashi, T., Wang, L., Moriai, S.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13(5), 1333–1345 (2018)
Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3), 211–407 (2014)
Lane, N.D., Georgiev, P.: Can deep learning revolutionize mobile sensing? In: Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, HotMobile, Santa Fe, New Mexico, USA, February 2015, pp. 117–122 (2015)
Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 23th ACM Conference on Computer and Communications Security, CCS, Vienna, Austria, October 2016, pp. 308–318 (2016)
Dong, C., Loy, C.C., He, K., Tang, X.: Image super-resolution using deep convolutional networks. IEEE Trans. Pattern Anal. Mach. Intell. 38(2), 295–307 (2016)
Acknowledgment
This work was supported in part by the National Key Research and Development Program of China under Grant 2017YFB0802303, in part by the National Natural Science Foundation of China under Grant 61672283 and Grant 61602238, in part by the Natural Science Foundation of Jiangsu Province under Grant BK20160805, and in part by the Postgraduate Research & Practice Innovation Program of Jiangsu Province under Grant KYCX18_0308.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Zhang, J., Wang, J., Zhao, Y., Chen, B. (2019). An Efficient Federated Learning Scheme with Differential Privacy in Mobile Edge Computing. In: Zhai, X., Chen, B., Zhu, K. (eds) Machine Learning and Intelligent Communications. MLICOM 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 294. Springer, Cham. https://doi.org/10.1007/978-3-030-32388-2_46
Download citation
DOI: https://doi.org/10.1007/978-3-030-32388-2_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-32387-5
Online ISBN: 978-3-030-32388-2
eBook Packages: Computer ScienceComputer Science (R0)