skip to main content
10.1145/3387168.3387211acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicvispConference Proceedingsconference-collections
research-article

Training Encrypted Models with Privacy-preserved Data on Blockchain

Published:25 May 2020Publication History

ABSTRACT

Currently, training neural networks often requires a large corpus of data from multiple parties. However, data owners are reluctant to share their sensitive data to third parties for modelling in many cases. Therefore, Federated Learning (FL) has arisen as an alternative to enable collaborative training of models without sharing raw data, by distributing modelling tasks to multiple data owners. Based on FL, we premodel sent a novel and decentralized approach to training encrypted models with privacy-preserved data on Blockchain. In our approach, Blockchain is adopted as the machine learning environment where different actors (i.e., the model provider, the data provider) collaborate on the training task. During the training process, an encryption algorithm is used to protect the privacy of data and the trained model. Our experiments demonstrate that our approach is practical in real-world applications.

References

  1. Bellare, M., Desai, A., Jokipii, E., & Rogaway, P. (1997, October). A concrete security treatment of symmetric encryption. In Proceedings 38th Annual Symposium on Foundations of Computer Science (pp. 394--403). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  2. Bellare, M., & Rogaway, P. (1994, May). Optimal asymmetric encryption. In Workshop on the Theory and Application of of Cryptographic Techniques (pp. 92--111). Springer, Berlin, Heidelberg.Google ScholarGoogle Scholar
  3. Benet, J. (2014). Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561.Google ScholarGoogle Scholar
  4. Bengio, Y. (2009). Learning deep architectures for AI. Foundations and trends® in Machine Learning, 2(1), 1--127.Google ScholarGoogle Scholar
  5. Caldas, S., Wu, P., Li, T, Konečný, J., McMahan, H. B, Smith, V., & Talwalkar, A. (2018). Leaf: A benchmark for federated settings. arXiv preprint arXiv:1812.01097.Google ScholarGoogle Scholar
  6. Croman, K., Decker, C., Eyal, I., Gencer, A. E., Juels, A., Kosba, A., & Song, D. (2016, February). On scaling decentralized blockchains. In International Conference on Financial Cryptography and Data Security (pp. 106--125). Springer, Berlin, Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  7. Du, W., & Atallah, M. J. (2001, September). Secure multiparty computation problems and their applications: a review and open problems. In Proceedings of the 2001 workshop on New security paradigms (pp. 13--22). ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dwork, C. (2011). Differential privacy. Encyclopedia of Cryptography and Security, 338--340.Google ScholarGoogle Scholar
  9. Gentry, C., & Boneh, D. (2009). A fully homomorphic encryption scheme (Vol. 20, No. 09). Stanford: Stanford University.Google ScholarGoogle Scholar
  10. Konečný, J., McMahan, H. B., Yu, F. X, Richtárik, P, Suresh, A. T, & Bacon, D. (2016). Federated learning: Strategies for improving communication efficiency. arXiv preprint arXiv:1610.05492.Google ScholarGoogle Scholar
  11. LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. nature, 521(7553), 436.Google ScholarGoogle Scholar
  12. Luu, L., Narayanan, V., Zheng, C., Baweja, K, Gilbert, S, & Saxena, P. (2016, October). A secure sharding protocol for open blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 17--30). ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. McMahan, Brendan, and Daniel Ramage. (2017). "Federated learning: Collaborative machine learning without centralized training data." Google Research Blog.Google ScholarGoogle Scholar
  14. Shen, Y., Guo, B., Shen, Y., Duan, X., Dong, X., & Zhang, H. (2016). A pricing model for big personal data. Tsinghua Science and Technology, 21(5), 482--490.Google ScholarGoogle ScholarCross RefCross Ref
  15. Swan, M. (2015). Blockchain: Blueprint for a new economy. "O'Reilly Media, Inc.".Google ScholarGoogle Scholar
  16. Wood, G. (2014). Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper, 151(2014), 1--32.Google ScholarGoogle Scholar
  17. Wu, C., Xiao, J., Huang, G., & Wu, F. (2019). Galaxy Learning-A Position Paper. arXiv preprint arXiv:1905.00753. Date:JuneGoogle ScholarGoogle Scholar
  18. Zheng, Z., Xie, S., Dai, H. N., Chen, X., & Wang, H. (2018). Blockchain challenges and opportunities: A survey. International Journal of Web and Grid Services, 14(4), 352--375.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Training Encrypted Models with Privacy-preserved Data on Blockchain

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICVISP 2019: Proceedings of the 3rd International Conference on Vision, Image and Signal Processing
          August 2019
          584 pages
          ISBN:9781450376259
          DOI:10.1145/3387168

          Copyright © 2019 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 25 May 2020

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          ICVISP 2019 Paper Acceptance Rate126of277submissions,45%Overall Acceptance Rate186of424submissions,44%
        • Article Metrics

          • Downloads (Last 12 months)8
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader