Skip to main content

A Novel Privacy-Preserving Federated Learning Model Based on Secure Multi-party Computation

  • Conference paper
  • First Online:
Integrated Uncertainty in Knowledge Modelling and Decision Making (IUKM 2023)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 14376))

  • 314 Accesses

Abstract

Although supporting training deep learning models distributed without disclosing the raw privacy data, federated learning (FL) is still vulnerable to inference attacks. This paper proposes ComEnc-FL, a privacy-enhancing federated learning system that combats these vulnerabilities. ComEnc-FL uses secure multi-party computation and parameter encoding to reduce communication and computational expenses. ComEnc-FL surpasses typical secure multi-party computation systems in training time and data transfer bandwidth. ComEnc-FL matches the base FL framework and outperforms differential privacy-safe frameworks. We also show that parameter compression reduces encryption time, improving model performance over the FL.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bonawitz, K., et al.: Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1175–1191 (2017)

    Google Scholar 

  2. El Ouadrhiri, A., Abdelhadi, A.: Differential privacy for deep and federated learning: a survey. IEEE Access 10, 22359–22380 (2022)

    Article  Google Scholar 

  3. European Commission: Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation) (Text with EEA relevance) (2016). https://eur-lex.europa.eu/eli/reg/2016/679/oj

  4. Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press (2016). https://www.deeplearningbook.org

  5. Google: Gboard: a google keyboard (2020). Accessed 17 Apr 2023

    Google Scholar 

  6. Gupta, S., Agrawal, A., Gopalakrishnan, K., Narayanan, P.: Deep learning with limited numerical precision. In: International Conference on Machine Learning (2015)

    Google Scholar 

  7. Konečný, J., McMahan, H.B., Yu, F.X., Richtarik, P., Suresh, A.T., Bacon, D.: Federated learning: Strategies for improving communication efficiency. In: NIPS Workshop on Private Multi-Party Machine Learning (2016). https://arxiv.org/abs/1610.05492

  8. Liu, C., Chakraborty, S., Verma, D.: Secure model fusion for distributed learning using partial homomorphic encryption. Policy-Based Autonomic Data Governance, pp. 154–179 (2019)

    Google Scholar 

  9. Moshayedi, A.J., Roy, A.S., Kolahdooz, A., Shuxin, Y.: Deep learning application pros and cons over algorithm deep learning application pros and cons over algorithm. EAI Endorsed Trans. AI Robot. 1(1) (2022)

    Google Scholar 

  10. Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning: Stand-alone and federated learning under passive and active white-box inference attacks. arXiv:abs/1812.00910 (2018)

  11. Shokri, R., Stronati, M., Song, C., Shmatikov, V.: Membership inference attacks against machine learning models. In: 2017 IEEE symposium on security and privacy (SP), pp. 3–18. IEEE (2017)

    Google Scholar 

  12. Tran, A.T., Luong, T.D., Karnjana, J., Huynh, V.N.: An efficient approach for privacy preserving decentralized deep learning models based on secure multi-party computation. Neurocomputing 422, 245–262 (2021)

    Article  Google Scholar 

  13. Truex, S., et al.: A hybrid approach to privacy-preserving federated learning. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, pp. 1–11 (2019)

    Google Scholar 

  14. Wei, K., et al.: Federated learning with differential privacy: algorithms and performance analysis. IEEE Trans. Inf. Forensics Secur. 15, 3454–3469 (2020)

    Article  Google Scholar 

  15. Xu, R., Baracaldo, N., Zhou, Y., Anwar, A., Ludwig, H.: Hybridalpha: an efficient approach for privacy-preserving federated learning. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, pp. 13–23 (2019)

    Google Scholar 

  16. Zhang, C., Li, S., Xia, J., Wang, W., Yan, F., Liu, Y.: Batchcrypt: efficient homomorphic encryption for cross-silo federated learning. In: Proceedings of the 2020 USENIX Annual Technical Conference (USENIX ATC 2020) (2020)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anh Tu Tran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Tran, A.T., Luong, T.D., Pham, X.S. (2023). A Novel Privacy-Preserving Federated Learning Model Based on Secure Multi-party Computation. In: Honda, K., Le, B., Huynh, VN., Inuiguchi, M., Kohda, Y. (eds) Integrated Uncertainty in Knowledge Modelling and Decision Making. IUKM 2023. Lecture Notes in Computer Science(), vol 14376. Springer, Cham. https://doi.org/10.1007/978-3-031-46781-3_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-46781-3_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-46780-6

  • Online ISBN: 978-3-031-46781-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics