Skip to main content

Verifiable Secure Aggregation Protocol Under Federated Learning

  • Conference paper
  • First Online:
Artificial Intelligence Security and Privacy (AIS&P 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14509))

  • 754 Accesses

Abstract

Federated learning is a new machine learning paradigm used for collaborative training models among multiple devices. In federated learning, multiple clients participate in model training locally and use decentralized learning methods to ensure the privacy of client data. However, although federated learning protects the privacy of client data, the update gradients uploaded by clients may still contain sensitive information. To solve this problem, this paper proposes a secure aggregation protocol which can verify the aggregation results under federated learning and protect gradient privacy. The core idea of this aggregation protocol is to use encryption technology to achieve secure computation between clients, ensuring the privacy of gradients during the aggregation process. At the same time, bilinear pairing technology is used to achieve the verifiability of aggregation results, ensuring the correctness and usability of the model after aggregation. In order to evaluate the security of the protocol, this paper conducts a detailed security analysis. The results show that this protocol has higher security properties compared to the existing related protocols. In addition, the computation and communication costs of the protocol are analyzed, which show that the protocol has good credibility and applicability in practical federated learning scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) 10(2), 1–19 (2019)

    Article  Google Scholar 

  2. Papadimitriou, P., Garcia-Molina, H.: Data leakage detection. IEEE Trans. Knowl. Data Eng. 23(1), 51–63 (2010)

    Article  Google Scholar 

  3. Kulkarni, V., Kulkarni, M., Pant, A.: Survey of personalization techniques for federated learning. In: 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), pp. 794–797. IEEE (2020)

    Google Scholar 

  4. Chen, Y., Su, X., Jin, Y.: Communication-efficient federated deep learning with layerwise asynchronous model update and temporally weighted aggregation. IEEE Trans. Neural Netw. Learn. Syst. 31(10), 4229–4238 (2019)

    Google Scholar 

  5. McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, PMLR, pp. 1273–1282 (2017)

    Google Scholar 

  6. Li, T., Sahu, A., Talwalkar, A., Smith, V.: Federated learning: challenges, methods, and future directions. IEEE Signal Process. Mag. 3, 50–60 (2020)

    Google Scholar 

  7. Mothukuri, V., Parizi, R.M., Pouriyeh, S., Huang, Y., Dehghantanha, A., Srivastava, G.: A survey on security and privacy of federated learning. Future Gener. Comput. Syst. 115, 619–640 (2021)

    Google Scholar 

  8. Kairouz, P., et al.: Advances and open problems in federated learning. Found. Trends® Mach. Learn. 14(1–2), 1–210 (2021)

    Google Scholar 

  9. Bonawitz, K., et al.: Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1175–1191 (2017)

    Google Scholar 

  10. Mandal, K., Gong, G.: PrivFL: practical privacy-preserving federated regressions on high-dimensional data over mobile networks. In: Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, pp. 57–68 (2019)

    Google Scholar 

  11. Mandal, K., Gong, G., Liu, C.: Nike-based fast privacy-preserving high dimensional data aggregation for mobile devices. IEEE Trans. Dependable Secure, 142–149 (2018)

    Google Scholar 

  12. Xu, G., Li, H., Liu, S., Yang, K., Lin, X.: VerifyNet: secure and verifiable federated learning. IEEE Trans. Inf. Forensics Secur. 15, 911–926 (2019)

    Article  Google Scholar 

  13. Guo, X., et al.: VeriFL: communication-efficient and fast verifiable aggregation for federated learning. IEEE Trans. Inf. Forensics Secur. 16, 1736–1751 (2020)

    Article  Google Scholar 

  14. Hahn, C., Kim, H., Kim, M., Hur, J.: Versa: verifiable secure aggregation for cross-device federated learning. IEEE Trans. Dependable Secure Comput. (2021)

    Google Scholar 

  15. Wang, Y., Zhang, A., Shu, W., Shui, Y.: Vosa: verifiable and oblivious secure aggregation for privacy-preserving federated learning. IEEE Trans. Dependable Secure Comput. 20(5), 3601–3616 (2023). https://doi.org/10.1109/TDSC.2022.3226508

    Article  Google Scholar 

  16. Shi, E., Chan, H.T.H., Rieffel, E., Cho, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Annual Network & Distributed System Security Symposium (NDSS). Internet Society (2011)

    Google Scholar 

  17. Joye, M., Libert, B.: A scalable scheme for privacy-preserving aggregation of time-series data. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 111–125. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_10

    Chapter  Google Scholar 

  18. He, D., Chen, C., Chan, S., Bu, J.: Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans. Wireless Commun. 11(1), 48–53 (2011)

    Article  Google Scholar 

  19. Tsobdjou, L.D., Pierre, S., Quintero, A.: A new mutual authentication and key agreement protocol for mobile client—server environment. IEEE Trans. Netw. Serv. Manage. 18(2), 1275–1286 (2021)

    Article  Google Scholar 

  20. Xin, L., Yunyi, L., Miao, W.: A lightweight authentication protocol based on confidential computing for federated learning nodes. Netinfo Secur. 22(7), 37–45 (2022)

    Google Scholar 

  21. Emura, K.: Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017, Part II. LNCS, vol. 10343, pp. 193–213. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59870-3_11

    Chapter  Google Scholar 

Download references

Acknowledgment

This paper is supported by Guangdong Provincial Key Laboratory of Power System Network Security.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lingling Xu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xu, P., Zheng, M., Xu, L. (2024). Verifiable Secure Aggregation Protocol Under Federated Learning. In: Vaidya, J., Gabbouj, M., Li, J. (eds) Artificial Intelligence Security and Privacy. AIS&P 2023. Lecture Notes in Computer Science, vol 14509. Springer, Singapore. https://doi.org/10.1007/978-981-99-9785-5_37

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-9785-5_37

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-9784-8

  • Online ISBN: 978-981-99-9785-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics