skip to main content
10.1145/3460537.3460540acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbctConference Proceedingsconference-collections
research-article

Research on Block Chain Defense against Malicious Attack in Federated Learning

Published:20 July 2021Publication History

ABSTRACT

Federated learning enables participants to be capable of collaboratively building powerful machine learning models and exploiting privacy protection mechanisms to protect data privacy. However, the federal-learning security mechanism remains not perfect. Using malicious training samples is considered to be vulnerable to attacks against machine learning models. Lastly, the substitution technique of the model is adopted to eliminate the learning effect of the final model. Though numerous security protocols have been formulated to defend against and prevent malicious attacks, most are active defenses against malicious attacks, instead of passive ones (e.g., distillation-based defense and regularization-based adversarial training). In the present study, a block chain-based passive defense model is proposed to protect the model. To be specific, when a participant updates its local model, model participation, user fingerprints and other key information will be stored on the chain. Malicious attacks can be therefore traced and detected. To ensure data integrity and confidentiality, model data is encrypted and updated via the blockchain. Record rewards for active participation in federal learning and punish violators. Accordingly, the dynamic protection mechanism of federated learning is achieved.

References

  1. POUYANFAR S, SADIQ S, YAN Y, A surveys on deep learning: algorithms, techniques, and applications[J]. ACM Computing Surveys, 2019, 51(5): 1-36Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. The official GDPR website[A/OL]. EU Commission(2020-07-24).Google ScholarGoogle Scholar
  3. Data protection laws of the world: Full handbook[A/OL]. DLA Piper(2020-07-24)Google ScholarGoogle Scholar
  4. Sidra Malik;Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak. TrustChain: Trust Management in Blockchain and IoT Supported Supply Chains, 2019 IEEE International Conference on Blockchain.Google ScholarGoogle Scholar
  5. Huili Chen, Rosario Cammarota, Felipe Valencia, Francesco Regazzoni. PlaidML-HE: Acceleration of Deep Learning Kernels to Compute on Encrypted Data. 2019 IEEE 37th International Conference on Computer Design (ICCD).Google ScholarGoogle Scholar
  6. Matteo Sereno, Authors Info, Affiliations. Cooperative game theory framework for energy efficient policies in wireless networks[J]. e-Energy '12: Proceedings of the 3rd International Conference on Future Energy Systems: Where Energy, Computing and Communication Meet May 2012 Article No.: 17 Pages 1–9.Google ScholarGoogle Scholar
  7. L. S. Shapley. A Value for n-person Games. In H. W. Kuhn and A. W. Tucker, editors, Contributions to the Theory of Games, volume II, Annals of Mathematical Studies No. 28, pages 307–317. Princeton University Press, 1953.Google ScholarGoogle Scholar
  8. H. P. Young. Cost Allocation: Methods, Principles, Application. North-Holland, 1985..Google ScholarGoogle Scholar
  9. Pawel Szalachowski. (Short Paper) Towards More Reliable Bitcoin Timestamps. IEEE International Conference on Crypto Valley Conference on Blockchain Technology (CVCBT), 2018.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICBCT '21: Proceedings of the 2021 3rd International Conference on Blockchain Technology
    March 2021
    216 pages
    ISBN:9781450389624
    DOI:10.1145/3460537

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 20 July 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format