Abstract
Federated learning is a new machine learning paradigm used for collaborative training models among multiple devices. In federated learning, multiple clients participate in model training locally and use decentralized learning methods to ensure the privacy of client data. However, although federated learning protects the privacy of client data, the update gradients uploaded by clients may still contain sensitive information. To solve this problem, this paper proposes a secure aggregation protocol which can verify the aggregation results under federated learning and protect gradient privacy. The core idea of this aggregation protocol is to use encryption technology to achieve secure computation between clients, ensuring the privacy of gradients during the aggregation process. At the same time, bilinear pairing technology is used to achieve the verifiability of aggregation results, ensuring the correctness and usability of the model after aggregation. In order to evaluate the security of the protocol, this paper conducts a detailed security analysis. The results show that this protocol has higher security properties compared to the existing related protocols. In addition, the computation and communication costs of the protocol are analyzed, which show that the protocol has good credibility and applicability in practical federated learning scenarios.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Yang, Q., Liu, Y., Chen, T., Tong, Y.: Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. (TIST) 10(2), 1–19 (2019)
Papadimitriou, P., Garcia-Molina, H.: Data leakage detection. IEEE Trans. Knowl. Data Eng. 23(1), 51–63 (2010)
Kulkarni, V., Kulkarni, M., Pant, A.: Survey of personalization techniques for federated learning. In: 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), pp. 794–797. IEEE (2020)
Chen, Y., Su, X., Jin, Y.: Communication-efficient federated deep learning with layerwise asynchronous model update and temporally weighted aggregation. IEEE Trans. Neural Netw. Learn. Syst. 31(10), 4229–4238 (2019)
McMahan, B., Moore, E., Ramage, D., Hampson, S., Arcas, B.A.: Communication-efficient learning of deep networks from decentralized data. In: Artificial intelligence and statistics, PMLR, pp. 1273–1282 (2017)
Li, T., Sahu, A., Talwalkar, A., Smith, V.: Federated learning: challenges, methods, and future directions. IEEE Signal Process. Mag. 3, 50–60 (2020)
Mothukuri, V., Parizi, R.M., Pouriyeh, S., Huang, Y., Dehghantanha, A., Srivastava, G.: A survey on security and privacy of federated learning. Future Gener. Comput. Syst. 115, 619–640 (2021)
Kairouz, P., et al.: Advances and open problems in federated learning. Found. Trends® Mach. Learn. 14(1–2), 1–210 (2021)
Bonawitz, K., et al.: Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1175–1191 (2017)
Mandal, K., Gong, G.: PrivFL: practical privacy-preserving federated regressions on high-dimensional data over mobile networks. In: Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, pp. 57–68 (2019)
Mandal, K., Gong, G., Liu, C.: Nike-based fast privacy-preserving high dimensional data aggregation for mobile devices. IEEE Trans. Dependable Secure, 142–149 (2018)
Xu, G., Li, H., Liu, S., Yang, K., Lin, X.: VerifyNet: secure and verifiable federated learning. IEEE Trans. Inf. Forensics Secur. 15, 911–926 (2019)
Guo, X., et al.: VeriFL: communication-efficient and fast verifiable aggregation for federated learning. IEEE Trans. Inf. Forensics Secur. 16, 1736–1751 (2020)
Hahn, C., Kim, H., Kim, M., Hur, J.: Versa: verifiable secure aggregation for cross-device federated learning. IEEE Trans. Dependable Secure Comput. (2021)
Wang, Y., Zhang, A., Shu, W., Shui, Y.: Vosa: verifiable and oblivious secure aggregation for privacy-preserving federated learning. IEEE Trans. Dependable Secure Comput. 20(5), 3601–3616 (2023). https://doi.org/10.1109/TDSC.2022.3226508
Shi, E., Chan, H.T.H., Rieffel, E., Cho, R., Song, D.: Privacy-preserving aggregation of time-series data. In: Annual Network & Distributed System Security Symposium (NDSS). Internet Society (2011)
Joye, M., Libert, B.: A scalable scheme for privacy-preserving aggregation of time-series data. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 111–125. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39884-1_10
He, D., Chen, C., Chan, S., Bu, J.: Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans. Wireless Commun. 11(1), 48–53 (2011)
Tsobdjou, L.D., Pierre, S., Quintero, A.: A new mutual authentication and key agreement protocol for mobile client—server environment. IEEE Trans. Netw. Serv. Manage. 18(2), 1275–1286 (2021)
Xin, L., Yunyi, L., Miao, W.: A lightweight authentication protocol based on confidential computing for federated learning nodes. Netinfo Secur. 22(7), 37–45 (2022)
Emura, K.: Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions. In: Pieprzyk, J., Suriadi, S. (eds.) ACISP 2017, Part II. LNCS, vol. 10343, pp. 193–213. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-59870-3_11
Acknowledgment
This paper is supported by Guangdong Provincial Key Laboratory of Power System Network Security.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xu, P., Zheng, M., Xu, L. (2024). Verifiable Secure Aggregation Protocol Under Federated Learning. In: Vaidya, J., Gabbouj, M., Li, J. (eds) Artificial Intelligence Security and Privacy. AIS&P 2023. Lecture Notes in Computer Science, vol 14509. Springer, Singapore. https://doi.org/10.1007/978-981-99-9785-5_37
Download citation
DOI: https://doi.org/10.1007/978-981-99-9785-5_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-9784-8
Online ISBN: 978-981-99-9785-5
eBook Packages: Computer ScienceComputer Science (R0)