Skip to main content

Towards Convergence of Blockchain and Self-sovereign Identity for Privacy-Preserving Secure Federated Learning

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2021)

Abstract

More and more researchers are eager to train their Machine Learning (ML) model by the distributed dataset in a federated manner. However, there are numerous privacy and security concerns in federated learning, i.e., adversarial attacks, authentication, and model inversion attacks. In this paper, we integrate self-sovereign identity for privacy-preserving secure federated learning. The proposed framework represents identity management and authentication scheme for edge devices, which are participated in FL. It guarantees participants’ privacy, where users’ private data are not shared with the centralized training module. The trust triangle and Blockchain ensure the authenticity of the distributed federated learning, where data privacy is handled with Differential Privacy. Result analysis is done based on measured score and time complexity. In terms of accuracy, BCWD, HDD, and DD achieve \(94.69\%\), \(81.05\%\) and \(78.00\%\), respectively on standard ML, whereas \(94.45\%\), \(80.59\%\) and \(76.43\%\) on \(\epsilon \) DP-based FL with privacy budget, \(\epsilon \) = 3. For the time complexity measurement, the total number of transactions employed in the system is 1000. Transactions time and their verification took 3323.15 s. Moreover, the proposed system shows robust performance in both cases.

This research work is supported by the Key-Area Research and Development Program of Guangdong Province under Grant No. 2019B010137002, and National Key Research and Development Program under Grant NO. 2020YFA0909100.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://archive.ics.uci.edu/ml/datasets/Breast+Cancer+Wisconsin+(Diagnostic).

  2. 2.

    https://archive.ics.uci.edu/ml/datasets/heart+disease.

  3. 3.

    https://archive.ics.uci.edu/ml/datasets/diabetes.

References

  1. Lee, I., Lee, K.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58(4), 431–440 (2015)

    Article  Google Scholar 

  2. Akter, S., Shamrat, F.M., Chakraborty, S., Karim, A., Azam, S.: COVID-19 detection using deep learning algorithm on chest X-ray images. Biology 10(11), 1174 (2021)

    Article  Google Scholar 

  3. Haque, R.U., Hasan, A.S.M.T.: Privacy-preserving multivariant regression analysis over blockchain-based encrypted IoMT data. In: Maleh, Y., Baddi, Y., Alazab, M., Tawalbeh, L., Romdhani, I. (eds.) Artificial Intelligence and Blockchain for Future Cybersecurity Applications. SBD, vol. 90, pp. 45–59. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-74575-2_3

    Chapter  Google Scholar 

  4. Haque, R.U., Hasan, A.S.M.: Overview of Blockchain-Based Privacy Preserving Machine Learning for IoMT, Big Data Intelligence for Smart Applications, Studies in Computational Intelligence, eBook ISBN 978-3-030-87954-9 (2022). https://doi.org/10.1007/978-3-030-87954-9

  5. Akter, S., et al.: Comprehensive performance assessment of deep learning models in early prediction and risk identification of chronic kidney disease. IEEE Access 9, 165184–165206 (2021)

    Article  Google Scholar 

  6. Bonawitz, K., et al.: Towards federated learning at scale: system design. arXiv preprint arXiv:1902.01046 (2019)

  7. Wang, H., et al.: Optimizing federated learning on non-IID data with reinforcement learning. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE (2020)

    Google Scholar 

  8. Bhagoji, A.N., et al. :Analyzing federated learning through an adversarial lens. In: International Conference on Machine Learning. PMLR (2019)

    Google Scholar 

  9. Tobin, A., Reed, D.: The inevitable rise of self-sovereign identity. In: The Sovrin Foundation, 29 September 2016

    Google Scholar 

  10. Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-79228-4_1

    Chapter  MATH  Google Scholar 

  11. Nofer, M., et al.: Blockchain. Bus. Inf. Syst. Eng. 59(3), 183–187 (2017)

    Article  Google Scholar 

  12. Coelho, P., Zúquete, A., Gomes, H.: Federation of attribute providers for user self-sovereign identity. J. Inf. Syst. Eng. Manage. 3(4), 32 (2018)

    Google Scholar 

  13. Liu, Y., et al.: Design pattern as a service for Blockchain-based self-sovereign identity. IEEE Softw. 37(5), 30–36 (2020)

    Article  Google Scholar 

  14. Li, T., et al.: Federated learning: challenges, methods, and future directions. IEEE Signal Process. Mag. 37(3), 50–60 (2020)

    Article  Google Scholar 

  15. Li, L., et al.: A review of applications in federated learning. Comput. Ind. Eng. 149, 106854 (2020)

    Article  Google Scholar 

  16. Xu, J., et al.: Federated learning for healthcare informatics. J. Healthcare Inform. Res. 5(1), 1–19 (2021)

    Article  Google Scholar 

  17. Preukschat, A., Reed, D.: Self-sovereign Identity: Decentralized Digital Identity and Verifiable Credential. Manning Publications, 8 June 2021. ISBN-10: 1617296597, ISBN-13: 978–1617296598

    Google Scholar 

  18. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1

    Chapter  Google Scholar 

  19. Rasool, A., Tao, R., Kamyab, M., Hayat, S.: GAWA-a feature selection method for hybrid sentiment classification. IEEE Access 8, 191850–191861 (2020). https://doi.org/10.1109/ACCESS.2020.3030642

    Article  Google Scholar 

  20. Rasool, A., Jiang, Q., Qu, Q., Ji, C.: WRS: a novel word-embedding method for real-time sentiment with integrated LSTM-CNN model. In: 2021 IEEE International Conference on Real-time Computing and Robotics (RCAR), pp. 590–595. IEEE, July 2021

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to A. S. M. Touhidul Hasan or Qingshan Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Haque, R.U., Hasan, A.S.M.T., Daria, A., Qu, Q., Jiang, Q. (2022). Towards Convergence of Blockchain and Self-sovereign Identity for Privacy-Preserving Secure Federated Learning. In: Tian, Y., Ma, T., Khan, M.K., Sheng, V.S., Pan, Z. (eds) Big Data and Security. ICBDS 2021. Communications in Computer and Information Science, vol 1563. Springer, Singapore. https://doi.org/10.1007/978-981-19-0852-1_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-0852-1_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-0851-4

  • Online ISBN: 978-981-19-0852-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics