Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A privacy protection method and system based on cloud-edge-end edge computing system

An edge computing and privacy protection technology, which is applied in computing, digital data protection, computer security devices, etc., can solve the problems of not considering the privacy leakage, the inability to obtain high-precision models, and the complexity of the design of the three-tier incentive mechanism. Accelerate the task process, improve efficiency, and achieve low network latency

Active Publication Date: 2022-02-15
PEKING UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the design problem of the three-tier incentive mechanism based on edge computing is more complicated and needs to be solved.
The main goal of existing scheme design incentive mechanism is to encourage user equipment to provide more data volume and computing resources, but it does not consider the issue of privacy leakage, and cannot guarantee that users who are more sensitive to privacy can actively participate in federated learning tasks, and cannot obtain high-precision Model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy protection method and system based on cloud-edge-end edge computing system
  • A privacy protection method and system based on cloud-edge-end edge computing system
  • A privacy protection method and system based on cloud-edge-end edge computing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] See figure 1 This embodiment provides a privacy protection method based on federal learning cloud-edge-ended edge computing system, including:

[0032] Step S1: Establish convergence model and privacy leakage model based on the privacy budget of user equipment;

[0033] The convergence model is:

[0034] Among them, λ 1 Λ 2 Λ 3 All are constants; ε i ( i.j ) Represents the privacy budget of JU JU Equipment under the i-th edge server; n represents the number of user equipment;

[0035] The privacy leakage model is:

[0036] Among them, B 1 , B 2 , C is constant; L represents the maximum value of the image classification model parameters on the user equipment; T represents the number of integrations of the image classification model on the user equipment; D represents the local image classification data set size.

[0037] Step S2: Based on the convergence model and the privacy leakage model, establish a function of cloud server utility, edge server utility functions, and us...

Embodiment 2

[0081] See Figure 5 This embodiment provides a privacy protection system based on federal learning cloud-edge-end calculation system, including:

[0082] Model establishment module M1, used to establish convergence models and privacy leakage models based on user equipment;

[0083] Utility function establishment module M2 for establishing a cloud server utility function, edge server utility function, and user equipment effect function based on the convergence model and the privacy leakage model;

[0084] Policy Design Module M3, an algorithm based on optimal control theory, optimizing the edge server utility function and the utility function of the user equipment, resulting in edge server excitation policies and user equipment privacy policies; based on gradient rising algorithm optimization said cloud Server utility function, get cloud server incentive strategy;

[0085] Federal learning module M4, is used to implement image classification models based on the user equipment priva...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a privacy protection method and system of a cloud-edge-end edge computing system based on federated learning, including: establishing a convergence model and a privacy leakage model based on the privacy budget of user equipment; based on the convergence model and the privacy leakage model, Establish the cloud server utility function, edge server utility function and user equipment utility function; optimize the edge server utility function and user equipment utility function based on the algorithm of optimal control theory, and obtain the edge server incentive strategy and user equipment privacy policy; based on gradient ascent The algorithm optimizes the utility function of the cloud server to obtain the incentive strategy of the cloud server; the federated learning of the image classification model is carried out based on the privacy policy of the user equipment, the incentive strategy of the edge server and the incentive strategy of the cloud server, so as to realize the protection of the private data of the user equipment during the federated learning process, and at the same time It can improve the classification accuracy of the image classification model.

Description

Technical field [0001] The present invention relates to the technical field of protecting user privacy data, in particular to a privacy protection method and system of a federal learning-based cloud-edge-ended edge computing system. Background technique [0002] Federal learning based on edge computing and differential privacy, by training models on user equipment (not need to upload raw data to server), and to maximize user data privacy leakage to maximize user data privacy. Among them, the applied noise will affect the accuracy of the image classification model. As the noise scale increases, the accuracy of the image classification model will decrease. Therefore, we need to weigh privacy and image classification model, which can be implemented by incentive mechanism. Through the quantified privacy leak model, there is a small number of users who have a privacy, and the noise scale is small, and the revenue has higher revenue, we can give high return incentives. The design probl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F30/27G06F9/50G06N20/20G06F21/62G06F111/06
CPCG06F30/27G06F9/5072G06N20/20G06F21/6245G06F2111/06
Inventor 宋令阳刘天宇安鹏边凯归程翔孙绍辉庹虎
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products