Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Byzantine attack defending method in decentralized federated learning based on block chain

A decentralized, blockchain technology, applied in the field of information security, can solve problems such as increasing communication overhead, and achieve the effect of reducing computing overhead, improving efficiency, and reducing computing costs

Active Publication Date: 2022-07-29
XIDIAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the BytoChain framework proposed in this paper, the three-party cooperative training model of blockchain packaging nodes, data holders, and verifiers is used, and the anti-Byzantine consensus algorithm PoA is used to detect abnormal models, which enhances the ability of federated learning to resist Byzantine attacks. But its disadvantages are: in each round of training, the data holder needs to obtain the latest global model from the blockchain packaging node and send the local model to the verifier for inspection, thus generating a large amount of communication during the model transmission process, which increases the communication overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Byzantine attack defending method in decentralized federated learning based on block chain
  • Byzantine attack defending method in decentralized federated learning based on block chain
  • Byzantine attack defending method in decentralized federated learning based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Decentralized federated learning relies on direct interaction between adjacent users to distribute the training model tasks to other users in the system, thereby obtaining a model with good generalization ability. Specifically, users participating in decentralized federated learning hold their own private data and obtain a pre-trained global model as a local model, use the private data to train the local model to obtain a local update model, and send the local update model to neighboring user, and receive the locally updated model sent by neighboring users as a local model for retraining. This decentralized federated learning model update process is iterative until the user's local model converges.

[0056] The present invention will be further described in detail below with reference to the accompanying drawings and embodiments.

[0057] refer to figure 1 and figure 2 , to further describe the Byzantine attack defense method in the blockchain-based decentralized fe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Byzantine attack defending method in decentralized federated learning based on a block chain. The method mainly solves the problem that in the prior art, when a Byzantine attack occurs in decentralized federated learning, the calculation overhead and the communication overhead are too high. The method comprises the following implementation steps: 1) a local user obtains a pre-trained model and establishes a reputation contrast relationship; 2) a local user trains the model and then transmits the model, and then generates a signature message and broadcasts the signature message; (3) the local user verifies the signature message and then stores the signature message, and when a certain number of signature messages are stored, blocks are generated, consensus is conducted on the blocks through an improved PBFT consensus algorithm, and then uplink is conducted; and 4) updating the reputation contrast relationship of the transmission and broadcast behaviors of other local users by the local user, then adjusting the generation difficulty of the signature message, and repeating the execution process until the model converges. According to the method, the calculation overhead and the communication overhead in the prior art can be effectively reduced, and the Byzantine robustness of decentralized federated learning can be improved.

Description

technical field [0001] The invention belongs to the technical field of information security, and further relates to attack resistance, in particular to a method for defending a Byzantine attack in a decentralized federated learning based on a blockchain. It is used to resist Byzantine attacks in decentralized federated learning, reduce the amount of calculation and transmission scale of message data, and improve the security of decentralized federated learning. Background technique [0002] Decentralized federated learning does not require a central server, and adjacent users exchange and update models multiple times to ensure that the trained model has good generalization ability. Specifically, users participating in decentralized federated learning hold their own private data and obtain a pre-trained global model as a local model, use the private data to train the local model to obtain a local update model, and send the local update model to adjacent users , and receive t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32G06F21/60G06N3/04G06N3/08G06N20/20
CPCH04L63/1441H04L9/3236H04L9/3247G06F21/602G06N3/08G06N20/20H04L2209/72G06N3/045
Inventor 王子龙肖丹陈谦周伊琳陈嘉伟
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products