Federated machine learning method and device based on security computing, device and medium

A machine learning and federation technology, applied in the field of machine learning, can solve the problems of model exposure, security machine learning data privacy leakage, etc., to achieve the effect of reducing nodes, preventing model parameter leakage, and reducing the risk of data loss

Pending Publication Date: 2022-02-01
南京三眼精灵信息技术有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] On the one hand, this application provides a federated machine learning method based on secure computing to solve the technical problems of data privacy leakage and model exposure risks in existing secure machine learning due to the introduction of third-party organizations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Federated machine learning method and device based on security computing, device and medium
  • Federated machine learning method and device based on security computing, device and medium
  • Federated machine learning method and device based on security computing, device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0053] In the era of big data, the use of data is ubiquitous, and the risk of data leakage in the process of data circulation has become a problem that cannot be ignored. Privacy Computing (Privacy Computing) allows users to implement data analysis and calculation on the premise that the data itself is not leaked to the outside world. Typical privacy-secure computing technologies include blockchain, multi-party secure computing, and federated learning frameworks.

[0054] Multi-party secure computing refers to the safe completion of certain collaborative computing through the joint participation of multiple parties without a trusted third party. That is, in a distributed network, each part...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a federated machine learning method and device based on security computing, a device and a medium. The method comprises the steps that S1, a participant A initiates a joint modeling task to a participant B; S2, the participants A and B start the local sample data training according to task parameters and calculate local gradient values; S3, the participant A and the participant B calculate a synthesized gradient value by using a multi-party security protocol gradient synthesis function according to the local gradient value; S4, the participants A and B update the local model parameters respectively according to the synthesized gradient value; S5, the steps S2 to S4 are circularly executed according to the number of iterations of the task parameters, and a final model is obtained when a set condition is met; S6, the participant A sends a task ending instruction to the participant B; and S7, the participant B receives the information, finishes the task and destroys the local model information. According to the method, a network channel is constructed based on a point-to-point mode, the summary gradient is realized by adopting spdz for calculation, and data leakage is prevented.

Description

technical field [0001] The present application relates to the technical field of machine learning, in particular, to a secure computing-based federated machine learning method, device, device and medium. Background technique [0002] At present, the realization of secure machine learning is mainly based on the machine learning of trusted third parties, such as figure 1 As shown, the third-party organization is responsible for generating the public-private key pair, distributing the public key, encrypting, decrypting, and calculating. A and B; 2. Participants A and B calculate the gradient and loss respectively, and use the public key PK to encrypt the result and send it to the nemesis third party Z; 3. The trusted third party Z uses the private key SK to decrypt and summarize the calculated gradient, and send it to Participants A and B, update the local model. Due to the introduction of a third-party organization, the third-party organization can obtain additional calculat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/60G06N20/00
CPCG06F21/6245G06F21/602G06N20/00
Inventor 汪利鹏陈卓张涛吕鹏飞胡鹏孙启明李侃李延明郭显宽范小松梁立涛郝柏瑞
Owner 南京三眼精灵信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products