skip to main content
10.1145/3608251.3608281acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccmsConference Proceedingsconference-collections
research-article

FPPFL: FedAVG-based Privacy-Preserving Federated Learning

Authors Info & Claims
Published:17 August 2023Publication History

ABSTRACT

Edge computing can move storage and computing tasks from cloud data centers to the edge of networks, reducing latency. However, this carries security and privacy risks. Federated learning can protect privacy by transferring training models from edge compute nodes to local devices, which then train models on local datasets. But the parameters transmitted between local devices and edge nodes may contain raw data, which can be stolen. To address this, this paper proposes a FedAVG-based privacy-preserving federated learning (FPPFL) scheme to provide low latency and privacy protection. It optimizes key generation parameters with an improved Paillier homomorphic encryption algorithm, allowing for low-complexity exponential operations in the encryption stage, shortening data transmission time and protecting model parameters, while maintaining accuracy. Experiments demonstrate the improved Paillier algorithm achieves the same security level as benchmark schemes and outperforms them in computational complexity.

References

  1. K. Wang , ”Task Offloading With Multi-Tier Computing Resources in Next Generation Wireless Networks,” in IEEE Journal on Selected Areas in Communications, vol. 41, no. 2, pp. 306-319, Feb. 2023.Google ScholarGoogle ScholarCross RefCross Ref
  2. EmuraKeita, KatsumataShuichi, and WatanabeYohei, “Identity-based encryption with security against the KGC,” 2022.Google ScholarGoogle Scholar
  3. Z. H. Mahmood and M. K. Ibrahem, ”New Fully Homomorphic Encryption Scheme Based on Multistage Partial Homomorphic Encryption Applied in Cloud Computing,” 2018 1st Annual International Conference on Information and Sciences (AiCIS), Fallujah, Iraq, 2018, pp. 182-186.Google ScholarGoogle ScholarCross RefCross Ref
  4. R. Podschwadt, D. Takabi, and P. Hu, “SoK: Privacy-preserving Deep Learning with Homomorphic Encryption,” 2021.Google ScholarGoogle Scholar
  5. Alessandro Giuseppi, Lucrezia Della Torre, Danilo Menegatti, Francesco Delli Priscoli, Antonio Pietrabissa, and Cecilia Poli, ”An Adaptive Model Averaging Procedure for Federated Learning (AdaFed),” Journal of Advances in Information Technology, Vol. 13, No. 6, pp. 539-548, December 2022.Google ScholarGoogle ScholarCross RefCross Ref
  6. X. X. Tian, C. F. Sha, X. L. Wang, and A. Y. Zhou, “Privacy Preserving Query Processing on Secret Share Based Data Storage,” 2011.Google ScholarGoogle ScholarCross RefCross Ref
  7. Mart´ı , “Deep Learning with Differential Privacy,” ACM, 2016.Google ScholarGoogle Scholar
  8. Y. Wang, X. Liang, X. Hei, W. Ji, and L. Zhu, “Deep Learning Data Privacy Protection Based on Homomorphic Encryption in AIoT,” Mobile Information Systems, vol. 2021, no. 2, pp. 1–11, 2021.Google ScholarGoogle Scholar
  9. Z. Zhou, Y. Tian, and C. Peng, “Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching,” Wireless Communications and Mobile Computing, vol. 2021, pp. 1–14, 2021.Google ScholarGoogle Scholar
  10. Rukhin , “Statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST special publication,” 2010.Google ScholarGoogle Scholar

Index Terms

  1. FPPFL: FedAVG-based Privacy-Preserving Federated Learning

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCMS '23: Proceedings of the 2023 15th International Conference on Computer Modeling and Simulation
      June 2023
      293 pages
      ISBN:9798400707919
      DOI:10.1145/3608251

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 August 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)42
      • Downloads (Last 6 weeks)7

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format