A Federated Learning Method Based on Differential Privacy and Chaos Encryption
A differential privacy and chaotic encryption technology, which is applied in the intersection of information security and artificial intelligence, can solve the problems of high computing cost for privacy protection, data privacy leakage of computing nodes, etc., and achieve the effect of improving the level of privacy protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] In a federated learning system, an initialized deep learning model is usually sent to multiple computing nodes by a parameter server. Then, each computing node uses the sample data in the local database to train the local model. After the computing node is trained once, it sends the calculated model parameter gradients to the parameter server. After the parameter server receives the gradient parameters sent by each computing node, it uses the stochastic gradient descent method to update the weight parameters of the global model, and sends the updated weight parameters to all computing nodes. The above training process is repeated many times until the training set conditions are reached. In this way, the local data of the computing nodes can not be uploaded and shared, and multiple computing nodes can jointly train the model.
[0047] However, in some scenarios, the gradient parameters uploaded by computing nodes may reveal local data privacy information.
[0048] The...
specific Embodiment approach
[0085] 1. The kth target type node uses the chaotic system to generate pseudo-random numbers according to the chaotic encryption key, and then scrambles and encrypts the updated model parameters according to the pseudo-random numbers to obtain the gradient Enc (w node,k ).
[0086] 2. The kth target type node uses the chaotic system to generate pseudo-random numbers according to the chaotic encryption key, and then performs addition / subtraction encryption on the updated model parameters according to the pseudo-random numbers to obtain the gradient Enc (w node,k ).
[0087] 3. The k-th target type node uses the chaotic system to generate pseudo-random numbers according to the chaotic encryption key, and then performs scramble, addition, and subtraction hybrid encryption on the updated model parameters according to the pseudo-random numbers to obtain the gradient Enc (w node,k ).
[0088] In the embodiment of the present invention, the computing node may adopt a chaotic system...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


