Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

An Efficient Federated Learning Scheme with Differential Privacy in Mobile Edge Computing

  • Conference paper
  • First Online:
Machine Learning and Intelligent Communications (MLICOM 2019)

Abstract

In this paper, we consider a mobile edge computing (MEC) system that multiple users participate in the federated learning protocol by jointly training a deep neural network (DNN) with their private training datasets. The main challenges of applying federated learning to MEC are: (1) it incurs tremendous computational cost by carrying out the deep neural network training phase on the resource-constraint mobile edge devices; (2) existing literature demonstrates that the parameters of a DNN trained on a dataset can be exploited to partially reconstruct the training samples in original dataset. To address the aforementioned issues, we introduce an efficiently private federated learning scheme in mobile edge computing, named FedMEC, with model partition technique and differential privacy method in this work. The experimental results demonstrate that our proposed FedMEC scheme can achieve high model accuracy under different perturbation strengths.

Supported in part by the National Key Research and Development Program of China, under Grant 2017YFB0802303, in part by the National Natural Science Foundation of China, under Grant 61672283, and in part by the Postgraduate Research & Practice Innovation Program of Jiangsu Province under Grant KYCX18_0308.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mach, P., Becvar, Z.: Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun. Surv. Tutor. 19(3), 1628–1656 (2017)

    Article  Google Scholar 

  2. Hesamifard, E., Takabi, H., Ghasemi, M., Wright, R.N.: Privacy-preserving machine learning as a service. In: Proceedings of 19th Privacy Enhancing Technologies Symposium, PETS, Barcelona, Spain, July 2018, pp. 123–142 (2018)

    Google Scholar 

  3. Zhang, Q., Yang, L.T., Chen, Z.: Privacy preserving deep computation model on cloud for big data feature learning. IEEE Trans. Comput. 65(5), 1351–1362 (2016)

    Article  MathSciNet  Google Scholar 

  4. Zhang, J., Chen, B., Zhao, Y., Cheng, X., Hu, F.: Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6, 18209–18237 (2018)

    Article  Google Scholar 

  5. Smith, V., Chiang, C.-K., Sanjabi, M., Talwalkar, A.S.: Federated multi-task learning. In: Proceedings of the 32nd Annual Conference on Neural Information Processing Systems, NIPS, Long Beach, CA, USA, December 2017, pp. 4427–4437 (2017)

    Google Scholar 

  6. Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. 10(2), 1–19 (2019)

    Article  Google Scholar 

  7. Shokri, R., Shmatikov, V.: Privacy-preserving deep learning. In: Proceedings of the 22nd ACM Conference on Computer and Communications Security, CCS, Denver, Colorado, USA, October 2008, pp. 1310–1321 (2015)

    Google Scholar 

  8. McMahan, H.B., Moore, E., Ramage, D., Hampson, S., Agüera y Arcas, B.: Communication-efficient learning of deep networks from decentralized data. In: Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, AISTATS, Fort Lauderadale, Florida, USA, April 2017, pp. 1–10 (2017)

    Google Scholar 

  9. Wang, J., Zhang, J., Bao, W., Zhu, X., Cao, B., Yu, P.S.: Not just privacy: improving performance of private deep learning in mobile cloud. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD, London, United Kingdom, August 2018, pp. 2407–2416 (2018)

    Google Scholar 

  10. Mao, Y., Yi, S., Li, Q., Feng, J., Xu, F., Zhong, S.: Learning from differentially private neural activations with edge computing. In: Proceedings of the 3rd IEEE/ACM Symposium on Edge Computing, SEC, Seattle, WA, USA, October 2018, pp. 90–102 (2018)

    Google Scholar 

  11. Osia, S.A., et al.: A hybrid deep learning architecture for privacy-preserving mobile analytics. ACM Trans. Knowl. Discov. Data 1(1), 1–21 (2018)

    Google Scholar 

  12. Fredrikson, F., Jha, S., Ristenpart, T.: Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22th ACM Conference on Computer and Communications Security, CCS, Denver, Colorado, USA, October 2015, pp. 1322–1333 (2015)

    Google Scholar 

  13. Phong, L.T., Aono, Y., Hayashi, T., Wang, L., Moriai, S.: Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 13(5), 1333–1345 (2018)

    Article  Google Scholar 

  14. Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3), 211–407 (2014)

    MathSciNet  MATH  Google Scholar 

  15. Lane, N.D., Georgiev, P.: Can deep learning revolutionize mobile sensing? In: Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications, HotMobile, Santa Fe, New Mexico, USA, February 2015, pp. 117–122 (2015)

    Google Scholar 

  16. Abadi, M., et al.: Deep learning with differential privacy. In: Proceedings of the 23th ACM Conference on Computer and Communications Security, CCS, Vienna, Austria, October 2016, pp. 308–318 (2016)

    Google Scholar 

  17. Dong, C., Loy, C.C., He, K., Tang, X.: Image super-resolution using deep convolutional networks. IEEE Trans. Pattern Anal. Mach. Intell. 38(2), 295–307 (2016)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported in part by the National Key Research and Development Program of China under Grant 2017YFB0802303, in part by the National Natural Science Foundation of China under Grant 61672283 and Grant 61602238, in part by the Natural Science Foundation of Jiangsu Province under Grant BK20160805, and in part by the Postgraduate Research & Practice Innovation Program of Jiangsu Province under Grant KYCX18_0308.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiale Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, J., Wang, J., Zhao, Y., Chen, B. (2019). An Efficient Federated Learning Scheme with Differential Privacy in Mobile Edge Computing. In: Zhai, X., Chen, B., Zhu, K. (eds) Machine Learning and Intelligent Communications. MLICOM 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 294. Springer, Cham. https://doi.org/10.1007/978-3-030-32388-2_46

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-32388-2_46

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-32387-5

  • Online ISBN: 978-3-030-32388-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics