End-side cloud architecture-based distributed federated learning security defense method and application

A technology of security defense and cloud architecture, which is applied in the field of information security and can solve problems such as low overhead

Pending Publication Date: 2022-05-06
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the above research results are not applicable to a distributed federated learning environment. How to de...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-side cloud architecture-based distributed federated learning security defense method and application
  • End-side cloud architecture-based distributed federated learning security defense method and application
  • End-side cloud architecture-based distributed federated learning security defense method and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Such as Figure 1 to Figure 3 As shown, the security defense method of distributed federated learning based on the device-edge-cloud architecture in an embodiment of the present invention is introduced, and the method includes the following steps.

[0042] In step S101, the edge server receives the updated local model uploaded by the end device.

[0043] Such as figure 2 As shown in the figure, determine the end devices (data centers) under the jurisdiction of each edge server (edge ​​cloud), partition the end devices with similar geographical distribution, and deploy edge servers for jurisdiction to provide computing and cache resources. The cloud server (central cloud) initializes the global model and sends it to each edge server, and then the edge server sends it to the corresponding bottom-end device. The end device uses private data to train the global model, calculates the updated local model through the stochastic gradient descent method, and uploads the updat...

Embodiment 2

[0055] Such as Figure 4 As shown, the security defense method of distributed federated learning based on the device-edge-cloud architecture in an embodiment of the present invention is introduced, and the method includes the following steps.

[0056] In step S201, the cloud server initializes the global model and sends the global model to the edge server.

[0057] In step S202, the cloud server verifies the digital signature of the edge aggregation model uploaded by the edge server, and performs global aggregation on the edge aggregation model to obtain an updated global model.

[0058] After the cloud server verifies the signature, the malicious model that fails the verification is excluded, and the edge aggregation model that is successfully verified and safe is aggregated globally to update the global model.

[0059] Through the signature verification algorithm, verify whether the signature corresponds to the message, because the hash encryption algorithm has two basic ch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security defense method and application for distributed federal learning based on an end-side cloud architecture, and the method comprises the following steps: an edge server receives an updated local model uploaded by a receiving end device, and the updated local model is obtained by training a global model issued by a cloud server by an end device based on private data; the edge server filters the updated local model to obtain a secure local model; and the edge server aggregates the filtered security local model, and uploads the generated edge aggregation model to the cloud server. According to the method, malicious models can be eliminated through a model filtering algorithm, the malicious models are aggregated into a security model, and indirect poisoning attacks (such as label flipping attacks aiming at a data set) aiming at a global model are continuously defended online.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a security defense method and application of distributed federated learning based on terminal-edge-cloud architecture. Background technique [0002] The proliferation of smartphones, the Internet of Things, and other devices has led to the era of big data. Deep learning provides an effective means for processing large amounts of data, such as managing large patient data for disease prediction, conducting independent security audits from system logs, etc. However, centralized deep learning often leads to leakage of user data and a series of privacy issues. Federated Learning (FL) has been proposed to address the dilemma of centralized deep learning. FL allows users to participate in global training without sharing private sample data to protect the privacy of user data. Specifically, each user uses a private dataset to train the global model, and only uploads the upd...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L9/32
CPCH04L9/006H04L9/3252
Inventor 陈兵陈琦胡峰
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products