Skip to main content
Log in

Research Progress on Security and Privacy of Federated Learning: A Survey

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Federated Learning (FL) is an emerging distributed machine learning paradigm designed to resolve the conflict between data sharing and privacy. It allows each client device to train shared models locally and perform global model aggregation on cloud servers without users having to share their data. However, there are still many security risks and malicious attacks that could breach the data privacy and confidentiality in the process of local training and information interaction. This paper investigates the security and the privacy challenges faced by FL and the corresponding defense methods. First, existing works about the FL-related surveys are studied; second, the basic concepts, the algorithm principle and the scenario classification of FL are introduced; next, examples are provided to illustrate the relevant attacks and defense knowledge of FL; then, the aggressive behaviors in FL are classified from four perspectives: the poisoning attack, the inference attack, the model attack and the adversarial attack, and the sub-aggressive behaviors are also com bed out; subsequently, the defense methods are divided according to the two directions of attack behaviors and privacy-protection technologies, and the application of different defense methods is investigated. Eventually, the future research directions on both attack problems and defense strategies in FL systems are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Availability of Data and Material

Data sharing not applicable to this article as no data sets were generated or analyzed during the current study.

References

  1. Wahab, O. A., Mourad, A., Otrok, H., & Taleb, T. (2021). Federated machine learning: Survey, multi-level classification, desirable criteria and future directions in communication and networking systems. IEEE Communications Surveys & Tutorials, 23(2), 1342–1397.

    Article  Google Scholar 

  2. Yin, B., Yin, H., Wu, Y., & Jiang, Z. (2020). FDC: A secure federated deep learning mechanism for data collaborations in the Internet of Things. IEEE Internet of Things Journal, 7(7), 6348–6359.

    Article  Google Scholar 

  3. Bo, H. (2016). “Network security Law’’ provides legal protection for our data management. China Telecommunications Trade, 12, 17–19.

    Google Scholar 

  4. de Souza, L. A. C., Rebello, G. A. F., Camilo, G. F., Guimarães, L. C., & Duarte, O. C. M. (2020). DFedForest: Decentralized federated forest. In 2020 IEEE international conference on blockchain (blockchain) (pp. 90–97). IEEE.

  5. Shokri, R., & Shmatikov, V. (2015). Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security (pp. 1310–1321).

  6. Song, M., Wang, Z., Zhang, Z., Song, Y., Wang, Q., Ren, J., & Qi, H. (2020). Analyzing user-level privacy attack against federated learning. IEEE Journal on Selected Areas in Communications, 38(10), 2430–2444.

    Article  Google Scholar 

  7. Zhang, J., Chen, B., Yu, S., & Deng, H. (2019). PEFL: A privacy-enhanced federated learning scheme for big data analytics. In 2019 IEEE global communications conference (GLOBECOM) (pp. 1–6). IEEE.

  8. Shayan, M., Fung, C., Yoon, C. J., & Beschastnikh, I. (2020). Biscotti: A blockchain system for private and secure federated learning. IEEE Transactions on Parallel and Distributed Systems, 32(7), 1513–1525.

    Article  Google Scholar 

  9. Janhan, W., Shijing, S., Janzong, W., & Jing, X. (2022). Federated learning attack and defense survey. Big Data Research, 8(5), 12–32.

    Google Scholar 

  10. Tiankai, L., Bi, Z., & Guang, C. (2021). Federated learning surveyconcept, technology, application and challenge. Journal of Computer Applications.

  11. Shuang, S., Xiaohui, L., Yan, L., & Xing, Z. (2021). Survey on security and privacy protection in different scenarios of federated learning. Application Research of Computers, 3527–3534.

  12. Chuanxin, Z., Yi, S., Degang, W., & Huawei, G. (2021). Survey of federated learning research. Chinese Journal of Network and Information Security, 7(5), 77–92.

    Google Scholar 

  13. Zhuangzhuang, W., Hongsong, C., Limin, Y., & Lifang, C. (2021). Review of federal learning and data security. Intelligent Computer and Applications, (01), 126–129+133.

  14. Bing, C., Xiang, C., Jiale, Z., & Yuanyuan, X. (2020). Survey of security and privacy in federated learning. Journal of Nanjing University of Aeronautics & Astronautics, 52(5), 10.

    Google Scholar 

  15. Jun, Z., Guoying, F., & Nan, W. (2020). Survey on security and privacy preserving in federated learning. Journal of Xihua University (Natural Science Edition), 39(4), 9.

    Google Scholar 

  16. Jia, W., & Lu, M. (2020). Analysis of federated learning. Modern Computer, 25, 6.

    Google Scholar 

  17. Zhu, H., Zhang, H., & Jin, Y. (2021). From federated learning to federated neural architecture search: A survey. Complex & Intelligent Systems, 7(2), 639–657.

    Article  Google Scholar 

  18. Konečnỳ, J., McMahan, H. B., Yu, F. X., Richtárik, P., Suresh, A. T., & Bacon, D. (2016). Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492.

  19. Konečnỳ, J., McMahan, H. B., Ramage, D., & Richtárikk, P. (2016). Federated optimization: Distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527.

  20. McMahan, B., Moore, E., Ramage, D., Hampson, S., & y Arcas, B. A. (2017). Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics (pp. 1273–1282).

  21. Changyin, L., Xuebin, C., Chundi, M., & Shufen. (2021). Improved federated average algorithm based on tomographic analysis. Computer Science, 48(8), 32–40.

  22. Biying, P., Haihua, Q., & Jialun, Z. (2019). Research on federated machine learning techniques with different data distributions. Proceedings of 5G network innovation symposium.

  23. Li, Q., Wen, Z., Wu, Z., Hu, S., Wang, N., Li,Y., Liu, X., Li, Y., & He, B. (2021). A survey on federated learning systems: vision, hype and reality for data privacy and protection. IEEE Transactions on Knowledge and Data Engineering.

  24. Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A. N., & Zhao, S. (2021). Advances and open problems in federated learning. Foundations and Trends® in Machine Learning, 14(1–2), 1–210.

  25. Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2019). Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST), 10(2), 1–19.

    Article  Google Scholar 

  26. Leroy, D., Coucke, A., Lavril, T., Gisselbrecht, T., & Dureau, J. (2019). Federated learning for keyword spotting. In Icassp 2019-2019 IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 6341–6345).

  27. McMahan, H. B., Moore, E., Ramage, D., & Arcas, B. A. (2016). Federated learning of deep networks using model averaging. arXiv preprint arXiv:1602.05629.

  28. Yang, Q., Liu, Y., Cheng, Y., Kang, Y., Chen, T., & Yu, H. (2019). Federated learning. Synthesis Lectures on Artificial Intelligence and Machine Learning, 13(3), 1–207.

    Article  Google Scholar 

  29. Christen, P. (2012). Data matching: concepts and techniques for record linkage, entity resolution, and duplicate detection.

  30. Yan, Z., Guoliang, L., & Jianhua, F. (2016). A survey on entity alignment of knowledge base. Journal of Computer Research and Development, 53(1), 165.

    Google Scholar 

  31. Lipeng, G., & Hui, Z. (2018). Convolutional neural network based on pelus softplus nonlinear excitation function. Journal of Shenyang University of Technology, 40(1), 54–59.

    Google Scholar 

  32. Saha, S., & Ahmad, T. (2021). Federated transfer learning: Concept and applications. Intelligenza Artificiale, 15(1), 35–44.

    Article  Google Scholar 

  33. Pan, S. J., & Yang, Q. (2009). A survey on transfer learning. IEEE Transactions on Knowledge and Data Engineering, 22(10), 1345–1359.

    Article  Google Scholar 

  34. Chen, Y., Qin, X., Wang, J., Yu, C., & Gao, W. (2020). Fedhealth: A federated transfer learning framework for wearable healthcare. IEEE Intelligent Systems, 35(4), 83–93.

    Article  Google Scholar 

  35. Lu, C., Fan, Y., Wu, X., & Zhang, J. (2021). Fmfparking: Federated matrix factorization for parking lot recommendation. In 2021 IEEE seventh international conference on big data computing service and applications (bigdataservice) (pp. 131–136).

  36. Hao, M., Li, H., Xu, G., Liu, S., & Yang, H. (2019). Towards efficient and privacy-preserving federated deep learning. In ICC 2019-2019 IEEE international conference on communications (ICC) (pp. 1–6).

  37. Li, Y., Chen, C., Liu, N., Huang, H., Zheng, Z., & Yan, Q. (2020). A blockchain-based decentralized federated learning framework with committee consensus. IEEE Network, 35(1), 234–241.

    Article  Google Scholar 

  38. Liu, Y., Ma, Z., Liu, X., Ma, S., Nepal, S., Deng, R. H., & Ren, K. (2020). Boosting privately: Federated extreme gradient boosting for mobile crowd-sensing. In 2020 IEEE 40th international conference on distributed computing systems (ICDCS) (pp. 1–11).

  39. Hao, M., Li, H., Luo, X., Xu, G., Yang, H., & Liu, S. (2019). Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Transactions on Industrial Informatics, 16(10), 6532–6542.

    Article  Google Scholar 

  40. Lu, Y., Huang, X., Dai, Y., Maharjan, S., & Zhang, Y. (2019). Blockchain and federated learning for privacy-preserved data sharing in industrial iot. IEEE Transactions on Industrial Informatics, 16(6), 4177–4186.

    Article  Google Scholar 

  41. Wan, W., Lu, J., Hu, S., Zhang, L. Y., & Pei, X. (2021). Shielding federated learning: A new attack approach and its defense. In 2021 IEEE wireless communications and networking conference (wcnc) (pp. 1–7).

  42. Jia, B., Zhang, X., Liu, J., Zhang, Y., Huang, K., & Liang, Y. (2021). Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in iiot. IEEE Transactions on Industrial Informatics, 18(6), 4049–4058.

    Article  Google Scholar 

  43. Cui, L., Qu, Y., Xie, G., Zeng, D., Li, R., Shen, S., & Yu, S. (2021). Security and privacy-enhanced federated learning for anomaly detection in IoT infrastructures. IEEE Transactions on Industrial Informatics, 18(5), 3492–3500.

    Article  Google Scholar 

  44. Su, Z., Wang, Y., Luan, T. H., Zhang, N., Li, F., Chen, T., & Cao, H. (2021). Secure and efficient federated learning for smart grid with edge-cloud collaboration. IEEE Transactions on Industrial Informatics, 18(2), 1333–1344.

    Article  Google Scholar 

  45. Mugunthan, V., Rahman, R., & Kagal, L. (2020). Blockflow: An accountable and privacy-preserving solution for federated learning. arXiv preprint arXiv:2007.03856.

  46. Hu, R., Guo, Y., & Gong, Y. (2021). Concentrated differentially private federated learning with performance analysis. IEEE Open Journal of the Computer Society, 2, 276–289.

    Article  Google Scholar 

  47. Triastcyn, A., & Faltings, B. (2020). Federated generative privacy. IEEE Intelligent Systems, 35(4), 50–57.

    Article  Google Scholar 

  48. Paul, S., Sengupta, P., & Mishra, S. (2020). Flaps: Federated learning and privately scaling. In 2020 IEEE 17th international conference on mobile ad hoc and sensor systems (MASS) (pp. 13–19).

  49. Sun, L., Ren, P., Du, Q., Wang, Y., & Gao, Z. (2014). Security-aware relaying scheme for cooperative networks with untrusted relay nodes. IEEE Communications Letters, 19(3), 463–466.

    Article  Google Scholar 

  50. Lee, H., Kim, J., Hussain, R., Cho, S., & Son, J. (2021). On defensive neural networks against inference attack in federated learning. In Icc 2021-IEEE international conference on communications(pp. 1–6).

  51. Kerkouche, R., Ács, G., Castelluccia, C., & Genevès, P. (2021). Compression boosts differentially private federated learning. In 2021 IEEE European symposium on security and privacy (euros & p) (pp. 304–318).

  52. Yang, H., He, H., Zhang, W., & Cao, X. (2020). Fedsteg: A federated transfer learning framework for secure image steganalysis. IEEE Transactions on Network Science and Engineering, 8(2), 1084–1094.

    Article  Google Scholar 

  53. Liu, C., Guo, S., Guo, S., Yan, Y., Qiu, X., & Zhang, S. (2021). Ltsm: Lightweight and trusted sharing mechanism of IoT data in smart city. IEEE Internet of Things Journal, 9(7), 5080–5093.

    Article  Google Scholar 

  54. Zhou, P. (2020). Federated deep payload classification for industrial internet with cloud-edge architecture. In 2020 16th international conference on mobility, sensing and networking (MSN) (pp. 228–235).

  55. Xin, B., Yang, W., Geng, Y., Chen, S., Wang, S., & Huang, L. (2020). Private fl-gan: Differential privacy synthetic data generation based on federated learning. In Icassp 2020-2020 IEEE international conference on acoustics, speech and signal processing (ICASSP) (pp. 2927–2931).

  56. Rahman, M. A., Hossain, M. S., Islam, M. S., Alrajeh, N. A., & Muhammad, G. (2020). Secure and provenance enhanced internet of health things framework: A blockchain managed federated learning approach. IEEE Access, 8, 205071–205087.

    Article  Google Scholar 

  57. Yang, J., Fu, C., Liu, X. Y., & Walid, A. (2021). Recommendations in smart devices using federated tensor learning. IEEE Internet of Things Journal.

  58. Suomalainen, J., & Julku, J. (2016). Enhancing privacy of information brokering in smart districts by adaptive pseudonymization. IEEE Access, 4, 914–927.

    Article  Google Scholar 

  59. Wei, K., Li, J., Ding, M., Ma, C., Yang, H. H., Farokhi, F., Jin, S., Quek, T. Q. S., & Poor, H. V. (2020). Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Information Forensics and Security, 15, 3454–3469.

    Article  Google Scholar 

  60. Chai, D., Wang, L., Chen, K., & Yang, Q. (2020). Secure federated matrix factorization. IEEE Intelligent Systems, 36(5), 11–20.

    Article  Google Scholar 

  61. Cheng, K., Fan, T., Jin, Y., Liu, Y., Chen, T., Papadopoulos, D., & Yang, Q. (2021). Secureboost: A lossless federated learning framework. IEEE Intelligent Systems, 36(6), 87–98.

    Article  Google Scholar 

  62. Zhou, X., Xu, M., Wu, Y., & Zheng, N. (2021). Deep model poisoning attack on federated learning. Future Internet, 13(3), 73.

    Article  Google Scholar 

  63. Yingzhe, H., Xingbo, H., Jinwen, H., Guozhu, M., & Kai, C. (2019). Privacy and security issues in machine learning systems: A survey. Journal of Computer Research and Development, 56(10), 2049–2070.

    Google Scholar 

  64. Biggio, B., Nelson, B., & Laskov, P. (2012). Poisoning attacks against support vector machines. arXiv preprint arXiv:1206.6389.

  65. Shafahi, A., Huang, W. R., Najibi, M., Suciu, O., Studer, C., Dumitras, T., & Goldstein, T. (2018). Poison frogs! targeted clean-label poisoning attacks on neural networks. Advances in neural information processing systems, 31.

  66. Muñoz-González, L., Biggio, B., Demontis, A., Paudice, A., Wongrassamee, V., Lupu, E. C., & Roli, F. (2017). Towards poisoning of deep learning algorithms with back-gradient optimization. In Proceedings of the 10th ACM workshop on artificial intelligence and security (pp. 27–38).

  67. Jagielski, M., Oprea, A., Biggio, B., Liu, C., Nita-Rotaru, C., & Li, B. (2018). Manipulating machine learning: Poisoning attacks and countermeasures for regression learning. In 2018 IEEE symposium on security and privacy (SP) (pp. 19–35).

  68. Fang, M., Gong, N. Z., & Liu, J. (2020). Influence function based data poisoning attacks to top-n recommender systems. In Proceedings of the web conference 2020 (pp. 3019–3025).

  69. Xiao, H., Biggio, B., Brown, G., Fumera, G., Eckert, C., & Roli, F. (2015). Is feature selection secure against training data poisoning? In International conference on machine learning (pp. 1689–1698).

  70. Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., & Shmatikov, V. (2020). How to backdoor federated learning. In International conference on artificial intelligence and statistics (pp. 2938–2948).

  71. Liu, Y., Ma, S., Aafer, Y., Lee, W. C., Zhai, J., Wang, W., & Zhang, X. (2017). Trojaning attack on neural networks.

  72. Yin, D., Chen, Y., Kannan, R., & Bartlett, P. (2018). Byzantine-robust distributed learning: Towards optimal statistical rates. In International conference on machine learning (pp. 5650–5659).

  73. Lyu, L., Yu, H., & Yang, Q. (2020). Threats to federated learning: A survey. arXiv preprint arXiv:2003.02133.

  74. Nasr, M., Shokri, R., & Houmansadr, A. (2019). Comprehensive privacy analysis of deep learning: Passive and active white-box inference attacks against centralized and federated learning. In 2019 IEEE symposium on security and privacy (sp) (pp. 739–753).

  75. Dong, Y., Su, H., Wu, B., Li, Z., Liu, W., Zhang, T., & Zhu, J. (2019). Efficient decision-based black-box adversarial attacks on face recognition. In Proceedings of the IEEE/CVF conference on computer vision and pattern recognition (pp. 7714–7722).

  76. Yin, Z., Yuan, Y., Guo, P., & Zhou, P. (2021). Backdoor attacks on federated learning with lottery ticket hypothesis. arXiv preprint arXiv:2109.10512.

  77. Ren, H., Deng, J., & Xie, X. (2022). Grnn: Generative regression neural network-a data leakage attack for federated learning. ACM Transactions on Intelligent Systems and Technology (TIST), 13(4), 1–24.

    Google Scholar 

  78. Hitaj, B., Ateniese, G., & Perez-Cruz, F. (2017). Deep models under the gan: Information leakage from collaborative deep learning. In Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 603–618).

  79. Phong, L. T., Aono, Y., Hayashi, T., Wang, L., & Moriai, S. (2017). Privacy-preserving deep learning: Revisited and enhanced. In International conference on applications and techniques in information security (pp. 100–110).

  80. Tramèr, F., Zhang, F., Juels, A., Reiter, M. K., & Ristenpart, T. (2016). Stealing machine learning models via prediction \(\{\)APIs\(\}\). In 25th usenix security symposium (usenix security 16) (pp. 601–618).

  81. Veale, M., Binns, R., & Edwards, L. (2018). Algorithms that remember: Model inversion attacks and data protection law. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 376(2133), 20180083.

    Article  Google Scholar 

  82. Fredrikson, M., Jha, S., & Ristenpart, T. (2015). Model inversion attacks that exploit confidence information and basic countermeasures. In Proceedings of the 22nd ACM SIGSAC conference on computer and communications security (pp. 1322–1333).

  83. Wang, Y., Su, Z., Zhang, N., & Benslimane, A. (2020). Learning in the air: Secure federated learning for UAV-assisted crowdsensing. IEEE Transactions on Network Science and Engineering, 8(2), 1055–1069.

    Article  Google Scholar 

  84. Fereidooni, H., Marchal, S., Miettinen, M., Mirhoseini, A., Möllering, H., Nguyen, T. D., Rieger, P., Sadeghi, A., Schneider, T., & Yalame, H. (2021). Safelearn: Secure aggregation for private federated learning. In 2021 IEEE security and privacy workshops (SPW) (pp. 56–62).

  85. Ching, C. W., Lin, T. C., Chang, K. H., Yao, C. C., & Kuo, J. J. (2020). Model partition defense against GAN attacks on collaborative learning via mobile edge computing. In Globecom 2020-2020 IEEE global communications conference (pp. 1–6).

  86. Lu, L., & Ding, N. (2020). Multi-party private set intersection in vertical federated learning. In 2020 IEEE 19th international conference on trust, security and privacy in computing and communications (trustcom) (pp. 707–714).

  87. Bhagoji, A. N., Chakraborty, S., Mittal, P., & Calo, S. (2019). Analyzing federated learning through an adversarial lens. In International conference on machine learning (pp. 634–643).

  88. Ma, X., Li, B., Wang, Y., Erfani, S. M., Wijewickrema, S., Schoenebeck, G., Schoenebeck, G., Song, D., Houle, M. E., & Bailey, J. (2018). Characterizing adversarial subspaces using local intrinsic dimensionality. arXiv preprint arXiv:1801.02613.

  89. Ross, A., & Doshi-Velez, F. (2018). Improving the adversarial robustness and interpretability of deep neural networks by regularizing their input gradients. In Proceedings of the AAAI conference on artificial intelligence (Vol. 32).

  90. Zantedeschi, V., Nicolae, M. I., & Rawat, A. (2017). Efficient defenses against adversarial attacks. In Proceedings of the 10th ACM workshop on artificial intelligence and security (pp. 39-49).

  91. Papernot, N., McDaniel, P., Wu, X., Jha, S., & Swami, A. (2016). Distillation as a defense to adversarial perturbations against deep neural networks. In 2016 IEEE symposium on security and privacy (SP) (pp. 582–597).

  92. Dwork, C., & Roth, A. (2014). The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science, 9(3–4), 211–407.

  93. Lu, Y., Huang, X., Dai, Y., Maharjan, S., & Zhang, Y. (2019). Differentially private asynchronous federated learning for mobile edge computing in urban informatics. IEEE Transactions on Industrial Informatics, 16(3), 2134–2143.

    Article  Google Scholar 

  94. Fang, H., & Qian, Q. (2021). Privacy preserving machine learning with homomorphic encryption and federated learning. Future Internet, 13(4), 94.

    Article  Google Scholar 

  95. Zhang, C., Li, S., Xia, J., Wang, W., Yan, F., & Liu, Y. (2020). \(\{\)BatchCrypt\(\}\): Efficient homomorphic encryption for \(\{\)Cross-Silo\(\}\) federated learning. In 2020 usenix annual technical conference (usenix atc 20) (pp. 493–506).

  96. Li, Z., Gui, X., Gu, Y., Li, X. S., Dai, H. J., & Zhang, X. J. (2018). Survey on homomorphic encryption algorithm and its application in the privacy-preserving for cloud computing. Journal of Software, 29(7), 1830–1851.

    Google Scholar 

  97. Jayaraman, B., Wang, L., Evans, D., & Gu, Q. (2018). Distributed learning without distress: Privacy-preserving empirical risk minimization. Advances in Neural Information Processing Systems, 31.

  98. Zuowen, T., & Lianfu, Z. (2020). Survey on privacy preserving techniques for machine learning. Journal of Software, 31(7), 2127–21.

    Google Scholar 

  99. Truex, S., Baracaldo, N., Anwar, A., Steinke, T., Ludwig, H., Zhang, R., & Zhou, Y. (2019). A hybrid approach to privacy-preserving federated learning. In Proceedings of the 12th ACM workshop on artificial intelligence and security (pp. 1–11).

  100. Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., Ramage, D., Segal, A., & Seth, K. (2017). Practical secure aggregation for privacy-preserving machine learning. In proceedings of the 2017 ACM SIGSAC conference on computer and communications security (pp. 1175–1191).

  101. Zhu, H., Goh, R. S. M., & Ng, W. K. (2020). Privacy-preserving weighted federated learning within the secret sharing framework. IEEE Access, 8, 198275–198284.

    Article  Google Scholar 

  102. Hardy, S., Henecka, W., Ivey-Law, H., Nock, R., Patrini, G., Smith, G., & Thorne, B. (2017). Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv preprint arXiv:1711.10677.

  103. Kim, H., Park, J., Bennis, M., & Kim, S. L. (2019). Blockchained on-device federated learning. IEEE Communications Letters, 24(6), 1279–1283.

    Article  Google Scholar 

  104. Lu, Y., Huang, X., Zhang, K., Maharjan, S., & Zhang, Y. (2020). Low-latency federated learning and blockchain for edge association in digital twin empowered 6g networks. IEEE Transactions on Industrial Informatics, 17(7),

  105. Qu, Y., Gao, L., Luan, T. H., Xiang, Y., Yu, S., Li, B., & Zheng, G. (2020). Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Internet of Things Journal, 7(6), 5171–5183.

    Article  Google Scholar 

  106. Arachchige, P. C. M., Bertok, P., Khalil, I., Liu, D., Camtepe, S., & Atiquzzaman, M. (2020). A trustworthy privacy preserving framework for machine learning in industrial iot systems. IEEE Transactions on Industrial Informatics, 16(9), 6092–6102.

    Article  Google Scholar 

  107. Nguyen, D. C., Ding, M., Pham, Q. V., Pathirana, P. N., Le, L. B., Seneviratne, A., Li, J., Niyato, D., & Poor, H. V. (2021). Federated learning meets blockchain in edge computing: Opportunities and challenges. IEEE Internet of Things Journal, 8(16), 12806–12825.

    Article  Google Scholar 

Download references

Funding

This work was supported by the Key Research Program for Colleges and Universities in Henan Province in China (23A520021).

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. The chapter design and the first draft of the manuscript were written by Xingpo Ma and Mengfan Yan, all authors commented on previous versions of the manuscript, and all authors read and approved the final manuscript.

Corresponding author

Correspondence to Xingpo Ma.

Ethics declarations

Conficts of interest

The authors have no Conflict of interest to declare that are relevant to the content of this article.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ma, X., Yan, M. Research Progress on Security and Privacy of Federated Learning: A Survey. Wireless Pers Commun 136, 2201–2242 (2024). https://doi.org/10.1007/s11277-024-11372-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-024-11372-0

Keywords