Abstract
With the rise of neural network, deep learning technology is more and more widely used in various fields. Federated learning is one of the training types in deep learning. In federated learning, each user and cloud server (CS) cooperatively train a unified neural network model. However, in this process, the neural network system may face some more challenging problems exemplified by the threat of user privacy disclosure, the error of server’s returned results, and the difficulty of implementing the trusted center in practice. In order to solve the above problems simultaneously, we propose a verifiable federated training scheme that supports privacy protection over deep neural networks. In our scheme, the key exchange technology is used to remove the trusted center, the double masking protocol is used to ensure that the privacy of users is not disclosed, and the tag aggregation method is used to ensure the correctness of the results returned by the server. Formal security analysis and comprehensive performance evaluation indicate that the proposed scheme is secure and efficient.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS’17, pp 1175–1191, New York, NY, USA. Association for Computing Machinery
Chen Y, Luo F, Li T, Xiang T, Liu Z, Li J (2020) A training-integrity privacy-preserving federated learning scheme with trusted execution environment. Inf Sci 522:69–79
Cong W, Chow Sherman SM, Qian W, Kui R, Wenjing L (2011) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375
Diffie W, Hellman Martin E (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Dong Z (2019) Federal learning: the second goal of ai security after deep learning.https://www.leiphone.com/news/201911/ziMkFyZXf1ERiniG.html
Fan Y, Lin X, Tan G, Zhang Y, Dong W, Lei J (2019) One secure data integrity verification scheme for cloud storage. Future Gener Comput Syst 96:376–385
GarcÃa-Gil D, Luque-Sánchez F, Luengo J, GarcÃa S, Herrera F (2019) From big to smart data: iterative ensemble filter for noise filtering in big data classification. Int J Intell Syst 34(12):3260–3274
Gu X, Angelov PP, Soares EA (2020) A self-adaptive synthetic over-sampling technique for imbalanced classification. Int J Intell Syst 35(6):923–943
Guowen X, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inf Forensics Secur 14(4):870–885
Guowen X, Li H, Liu S, Yang K, Lin X (2020) Verifynet: Secure and verifiable federated learning. IEEE Trans Inf Forensics Secur 15:911–926
Hitaj B, Ateniese G, Perez-Cruz F (2017) Deep models under the gan: Information leakage from collaborative deep learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS’17, pp 603–618, New York, NY, USA, Association for Computing Machinery
Jiang T, Chen X, Ma Jianfeng (2015) Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans Comput 65(8):2363–2373
Le Trieu P, Yoshinori A, Takuya H, Lihua W, Shiho M (2018) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inf Forensics Secur 13(5):1333–1345
Li P, Li T, Ye H, Li J, Chen X, Xiang Y (2018) Privacy-preserving machine learning with multiple data providers. Future Gener Comput Syst 87:341–350
Li T, Li J, Chen X, Liu Z, Lou W, Hou T (2020) Npmml: a framework for non-interactive privacy-preserving multi-party machine learning. IEEE Trans Depend Secure Comput
Liu C, Cao Y, Luo Y, Chen G, Vokkarane V, Ma Y (2016) Deepfood: Deep learning-based food image recognition for computer-aided dietary assessment. In Proceedings of the 14th International Conference on Inclusive Smart Cities and Digital Health—Volume 9677, ICOST 2016, pp 37–48, Springer-Verlag, Berlin, Heidelberg
Li J, Yan H, Zhang Y (2018) Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans Serv Comput
Ma X, Yu H, Wang Y, Wang Y (2015) Large-scale transportation network congestion evolution prediction using deep learning theory. Plos One, p 10
Mohammadi M, Al-Fuqaha A, Sorour S, Guizani M (2018) Deep learning for iot big data and streaming analytics: a survey. IEEE Commun Surv Tutor 20(4):2923–2960
Moriai S (2019) Privacy-preserving deep learning via additively homomorphic encryption. In 2019 IEEE 26th Symposium on Computer Arithmetic (ARITH), pp 198–198,
Nan F, Tian H, Wang T, Cai Y, Chen Y et al (2019) A collusion-resistant public auditing scheme for shared cloud data. Int J Inf Technol Manag 18(2/3):195–212
Shamir A (1979) How to share a secret. IEEE Trans Inf Forensics Secur 22(11):612–613
Shao B, Bian G, Wang Y, Shenghao S, Guo C (2018) Dynamic data integrity auditing method supporting privacy protection in vehicular cloud environment. IEEE Access 6:43785–43797
Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415
Shen W, Qin J, Jia Y, Hao R, Jiankun H (2018) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Forensics Secur 14(2):331–346
Shen W, Qin J, Yu J, Hao R, Hu J, Ma J (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Trans Cloud Comput
Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS’15, pp 1310–1321, New York, NY, USA, Association for Computing Machinery
Sze V, Chen YH, Yang TJ, Emer JS (2017) Efficient processing of deep neural networks: a tutorial and survey. Proc IEEE 105(12):2295–2329
Tian H, Nan F, Jiang H, Chang C-C, Ning J, Huang Yongfeng (2019) Public auditing for shared cloud data with efficient and secure group management. Inf Sci 472:107–125
Wang J, Chen X, Huang X, You I, Xiang Y (2015) Verifiable auditing for outsourced database in cloud computing. IEEE Trans Comput 64(11):3293–3303
Yan H, Li J, Han J, Zhang Yichen (2016) A novel efficient remote data possession checking protocol in cloud storage. IEEE Trans Inf Forensics Secur 12(1):78–88
Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. Acm Trans Intell Syst 10(2):121–1219
Yan H, Li J, Zhang Y (2019) Remote data checking with a designated verifier in cloud storage. IEEE Syst J
Yinghui Z, Deng Robert H, Jiangang S, Kan Y, Dong Z (2018) Tkse: trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access 6:31077–31087
Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2016) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767–778
Zhang Y, Chunxiang X, Liang X, Li H, Yi M, Zhang X (2017) Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans Inf Forensics Secur 12(3):676–688
Zhang Y, Deng Robert H, Ximeng L, Dong Z (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277
Zhang Y, Deng R, Zheng D, Li J, Pengfei W, Cao J (2019) Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial iot. IEEE Trans Ind Inform 15(9):5099–5108
Zhang Y, Deng R, Liu X, Zheng D (2018) Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Trans Ser Comput
Zhao M, Ding Y, Wang Y, Wang H, Wang B, Liu L (2019) A privacy-preserving tpa-aided remote data integrity auditing scheme in clouds. In International Conference of Pioneering Computer Scientists, Engineers and Educators, pp 334–345. Springer, Berlin
Zhao Q, Zhao C, Cui S, Jing S, Chen Z (2020) Privatedl: Privacy-preserving collaborative deep learning against leakage from gradient sharing. Int J Intell Syst
Acknowledgements
This research is supported by the Innovation Capability Support Program of Shaanxi (Grant No. 2020KJXX-052), the Shaanxi Special Support Program Youth Top-notch Talent Program, the Key Research and Development Program of Shaanxi (Grant No. 2019KW-053, 2020ZDLGY08-04), and the Natural Science Basic Research Plan in Shaanxi Province of China (Grant No. 2019JQ-866).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Han, G., Zhang, T., Zhang, Y. et al. Verifiable and privacy preserving federated learning without fully trusted centers. J Ambient Intell Human Comput 13, 1431–1441 (2022). https://doi.org/10.1007/s12652-020-02664-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02664-x