Skip to main content
Log in

Verifiable and privacy preserving federated learning without fully trusted centers

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

With the rise of neural network, deep learning technology is more and more widely used in various fields. Federated learning is one of the training types in deep learning. In federated learning, each user and cloud server (CS) cooperatively train a unified neural network model. However, in this process, the neural network system may face some more challenging problems exemplified by the threat of user privacy disclosure, the error of server’s returned results, and the difficulty of implementing the trusted center in practice. In order to solve the above problems simultaneously, we propose a verifiable federated training scheme that supports privacy protection over deep neural networks. In our scheme, the key exchange technology is used to remove the trusted center, the double masking protocol is used to ensure that the privacy of users is not disclosed, and the tag aggregation method is used to ensure the correctness of the results returned by the server. Formal security analysis and comprehensive performance evaluation indicate that the proposed scheme is secure and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS’17, pp 1175–1191, New York, NY, USA. Association for Computing Machinery

  • Chen Y, Luo F, Li T, Xiang T, Liu Z, Li J (2020) A training-integrity privacy-preserving federated learning scheme with trusted execution environment. Inf Sci 522:69–79

    Article  Google Scholar 

  • Cong W, Chow Sherman SM, Qian W, Kui R, Wenjing L (2011) Privacy-preserving public auditing for secure cloud storage. IEEE Trans Comput 62(2):362–375

    MathSciNet  MATH  Google Scholar 

  • Diffie W, Hellman Martin E (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  Google Scholar 

  • Dong Z (2019) Federal learning: the second goal of ai security after deep learning.https://www.leiphone.com/news/201911/ziMkFyZXf1ERiniG.html

  • Fan Y, Lin X, Tan G, Zhang Y, Dong W, Lei J (2019) One secure data integrity verification scheme for cloud storage. Future Gener Comput Syst 96:376–385

    Article  Google Scholar 

  • García-Gil D, Luque-Sánchez F, Luengo J, García S, Herrera F (2019) From big to smart data: iterative ensemble filter for noise filtering in big data classification. Int J Intell Syst 34(12):3260–3274

    Article  Google Scholar 

  • Gu X, Angelov PP, Soares EA (2020) A self-adaptive synthetic over-sampling technique for imbalanced classification. Int J Intell Syst 35(6):923–943

    Article  Google Scholar 

  • Guowen X, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans Inf Forensics Secur 14(4):870–885

    Article  Google Scholar 

  • Guowen X, Li H, Liu S, Yang K, Lin X (2020) Verifynet: Secure and verifiable federated learning. IEEE Trans Inf Forensics Secur 15:911–926

    Article  Google Scholar 

  • Hitaj B, Ateniese G, Perez-Cruz F (2017) Deep models under the gan: Information leakage from collaborative deep learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS’17, pp 603–618, New York, NY, USA, Association for Computing Machinery

  • Jiang T, Chen X, Ma Jianfeng (2015) Public integrity auditing for shared dynamic cloud data with group user revocation. IEEE Trans Comput 65(8):2363–2373

    Article  MathSciNet  Google Scholar 

  • Le Trieu P, Yoshinori A, Takuya H, Lihua W, Shiho M (2018) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inf Forensics Secur 13(5):1333–1345

    Article  Google Scholar 

  • Li P, Li T, Ye H, Li J, Chen X, Xiang Y (2018) Privacy-preserving machine learning with multiple data providers. Future Gener Comput Syst 87:341–350

    Article  Google Scholar 

  • Li T, Li J, Chen X, Liu Z, Lou W, Hou T (2020) Npmml: a framework for non-interactive privacy-preserving multi-party machine learning. IEEE Trans Depend Secure Comput

  • Liu C, Cao Y, Luo Y, Chen G, Vokkarane V, Ma Y (2016) Deepfood: Deep learning-based food image recognition for computer-aided dietary assessment. In Proceedings of the 14th International Conference on Inclusive Smart Cities and Digital Health—Volume 9677, ICOST 2016, pp 37–48, Springer-Verlag, Berlin, Heidelberg

  • Li J, Yan H, Zhang Y (2018) Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans Serv Comput

  • Ma X, Yu H, Wang Y, Wang Y (2015) Large-scale transportation network congestion evolution prediction using deep learning theory. Plos One, p 10

  • Mohammadi M, Al-Fuqaha A, Sorour S, Guizani M (2018) Deep learning for iot big data and streaming analytics: a survey. IEEE Commun Surv Tutor 20(4):2923–2960

    Article  Google Scholar 

  • Moriai S (2019) Privacy-preserving deep learning via additively homomorphic encryption. In 2019 IEEE 26th Symposium on Computer Arithmetic (ARITH), pp 198–198,

  • Nan F, Tian H, Wang T, Cai Y, Chen Y et al (2019) A collusion-resistant public auditing scheme for shared cloud data. Int J Inf Technol Manag 18(2/3):195–212

    Google Scholar 

  • Shamir A (1979) How to share a secret. IEEE Trans Inf Forensics Secur 22(11):612–613

    MathSciNet  MATH  Google Scholar 

  • Shao B, Bian G, Wang Y, Shenghao S, Guo C (2018) Dynamic data integrity auditing method supporting privacy protection in vehicular cloud environment. IEEE Access 6:43785–43797

    Article  Google Scholar 

  • Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415

    Article  Google Scholar 

  • Shen W, Qin J, Jia Y, Hao R, Jiankun H (2018) Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage. IEEE Trans Inf Forensics Secur 14(2):331–346

    Article  Google Scholar 

  • Shen W, Qin J, Yu J, Hao R, Hu J, Ma J (2019) Data integrity auditing without private key storage for secure cloud storage. IEEE Trans Cloud Comput

  • Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS’15, pp 1310–1321, New York, NY, USA, Association for Computing Machinery

  • Sze V, Chen YH, Yang TJ, Emer JS (2017) Efficient processing of deep neural networks: a tutorial and survey. Proc IEEE 105(12):2295–2329

    Article  Google Scholar 

  • Tian H, Nan F, Jiang H, Chang C-C, Ning J, Huang Yongfeng (2019) Public auditing for shared cloud data with efficient and secure group management. Inf Sci 472:107–125

    Article  Google Scholar 

  • Wang J, Chen X, Huang X, You I, Xiang Y (2015) Verifiable auditing for outsourced database in cloud computing. IEEE Trans Comput 64(11):3293–3303

    Article  MathSciNet  Google Scholar 

  • Yan H, Li J, Han J, Zhang Yichen (2016) A novel efficient remote data possession checking protocol in cloud storage. IEEE Trans Inf Forensics Secur 12(1):78–88

    Article  Google Scholar 

  • Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. Acm Trans Intell Syst 10(2):121–1219

    Google Scholar 

  • Yan H, Li J, Zhang Y (2019) Remote data checking with a designated verifier in cloud storage. IEEE Syst J

  • Yinghui Z, Deng Robert H, Jiangang S, Kan Y, Dong Z (2018) Tkse: trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access 6:31077–31087

    Article  Google Scholar 

  • Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2016) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forensics Secur 12(4):767–778

    Article  Google Scholar 

  • Zhang Y, Chunxiang X, Liang X, Li H, Yi M, Zhang X (2017) Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation. IEEE Trans Inf Forensics Secur 12(3):676–688

    Article  Google Scholar 

  • Zhang Y, Deng Robert H, Ximeng L, Dong Z (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277

    Article  MathSciNet  Google Scholar 

  • Zhang Y, Deng R, Zheng D, Li J, Pengfei W, Cao J (2019) Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial iot. IEEE Trans Ind Inform 15(9):5099–5108

    Article  Google Scholar 

  • Zhang Y, Deng R, Liu X, Zheng D (2018) Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Trans Ser Comput

  • Zhao M, Ding Y, Wang Y, Wang H, Wang B, Liu L (2019) A privacy-preserving tpa-aided remote data integrity auditing scheme in clouds. In International Conference of Pioneering Computer Scientists, Engineers and Educators, pp 334–345. Springer, Berlin

  • Zhao Q, Zhao C, Cui S, Jing S, Chen Z (2020) Privatedl: Privacy-preserving collaborative deep learning against leakage from gradient sharing. Int J Intell Syst

Download references

Acknowledgements

This research is supported by the Innovation Capability Support Program of Shaanxi (Grant No. 2020KJXX-052), the Shaanxi Special Support Program Youth Top-notch Talent Program, the Key Research and Development Program of Shaanxi (Grant No. 2019KW-053, 2020ZDLGY08-04), and the Natural Science Basic Research Plan in Shaanxi Province of China (Grant No. 2019JQ-866).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tiantian Zhang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, G., Zhang, T., Zhang, Y. et al. Verifiable and privacy preserving federated learning without fully trusted centers. J Ambient Intell Human Comput 13, 1431–1441 (2022). https://doi.org/10.1007/s12652-020-02664-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02664-x

Keywords

Navigation