Decentralized federated machine learning method under privacy protection

A decentralized and privacy-protecting technology, applied in the intersecting field of machine learning and information security, can solve problems such as user attack behavior, attacks, and participant data leakage that are not actually taken into account

Active Publication Date: 2020-08-28
SOUTH CHINA NORMAL UNIVERSITY
View PDF1 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But if there is a backdoor program, then the differential privacy technology will lose its protective effect
In addition, when some auxiliary information is obtained by the attacker, it will also lead to data leakage
More importantly, there is a close relationship between data in real life. In this case, just setting the granularity of differential privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decentralized federated machine learning method under privacy protection
  • Decentralized federated machine learning method under privacy protection
  • Decentralized federated machine learning method under privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0082] The present invention takes image recognition in the field of machine learning as an example, and deploys image recognition tasks in the decentralized federated learning under privacy protection of the present invention. In order to compare the difference between the present invention and the general machine learning implementation, the present invention will use centralized machine learn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a decentralized federated learning method under privacy protection. The decentralized federated learning method comprises a system initialization step, a request model and local parallel training step, a model parameter encryption and model sending step, a model receiving and recovering step and a system updating step. Decentralization is achieved by using a strategy of randomly selecting participants as parameter aggregators, and the defects that existing federated learning is easily attacked by DoS, a parameter server has a single point of failure and the like are overcome; a PVSS verifiable secret distribution protocol is combined to protect participant model parameters from model inversion attacks and data member reasoning attacks. Meanwhile, it is guaranteed that parameter aggregation is carried out by different participants in each training task, when an untrusted aggregator occurs or the aggregator is attacked, the aggregator can recover to be normal by itself, and the robustness of federated learning is improved; while the functions are achieved, the federated learning performance is guaranteed, the safety training environment of federated learning is effectively improved, and wide application prospects are achieved.

Description

technical field [0001] The invention belongs to the intersection field of machine learning and information security, and in particular relates to a centralized federated learning method under privacy protection. Background technique [0002] Machine learning technology has made extraordinary achievements in artificial intelligence application scenarios such as face recognition, speech recognition, and natural language processing. However, how to ensure that machine learning operates in a safe environment is still an unresolved problem. The essence of machine learning is to use a large amount of data to train the algorithm model, and obtain an algorithm model (hereinafter referred to as the model) that can accurately predict new input data. The data sets used for machine learning contain a large amount of private data of users, such as personal pictures, medical insurance records, input method records, and so on. However, machine learning requires powerful computing support....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L9/00H04L29/06G06F21/57G06F21/62G06N20/00
CPCH04L9/085H04L9/0825H04L9/3218H04L9/008H04L63/1458H04L63/1441G06F21/57G06F21/6245G06N20/00
Inventor 陈泯融陈锦华曾国强翁健翁嘉思初萍
Owner SOUTH CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products