通信学报 ›› 2021, Vol. 42 ›› Issue (11): 28-40.doi: 10.11959/j.issn.1000-436x.2021190

所属专题: 边缘计算 联邦学习 区块链

• 专题:计算机通信与网络系统安全技术 • 上一篇    下一篇

基于区块链和联邦学习的边缘计算隐私保护方法

方晨1, 郭渊博1, 王一丰1, 胡永进1, 马佳利1, 张晗2, 胡阳阳3   

  1. 1 信息工程大学密码工程学院,河南 郑州 450001
    2 郑州大学网络空间安全学院,河南 郑州 450003
    3 加利福尼亚大学河滨分校,河滨 CA92521
  • 修回日期:2021-09-15 出版日期:2021-11-25 发布日期:2021-11-01
  • 作者简介:方晨(1993− ),男,安徽宿松人,信息工程大学博士生,主要研究方向为机器学习隐私安全
    郭渊博(1975− ),男,陕西周至人,博士,信息工程大学教授、博士生导师,主要研究方向为大数据安全、态势感知
    王一丰(1994− ),男,江苏泰兴人,信息工程大学博士生,主要研究方向为深度学习、网络安全
    胡永进(1981− ),男,山东潍坊人,信息工程大学讲师,主要研究方向为大数据安全、态势感知
    马佳利(1996− ),男,河北邢台人,信息工程大学博士生,主要研究方向为数字孪生、机器学习
    张晗(1985− ),女,河南项城人,郑州大学讲师,主要研究方向为机器学习、自然语言处理
    胡阳阳(1990− ),男,江苏南京人,加利福尼亚大学河滨分校博士生,主要研究方向为机器学习
  • 基金资助:
    国家自然科学基金资助项目(61501515)

Edge computing privacy protection method based on blockchain and federated learning

Chen FANG1, Yuanbo GUO1, Yifeng WANG1, Yongjin HU1, Jiali MA1, Han ZHANG2, Yangyang HU3   

  1. 1 Department of Cryptogram Engineering, Information Engineering University, Zhengzhou 450001, China
    2 School of Cyberspace Security, Zhengzhou University, Zhengzhou 450003, China
    3 University of California, Riverside, Riverside CA92521, USA
  • Revised:2021-09-15 Online:2021-11-25 Published:2021-11-01
  • Supported by:
    The National Natural Science Foundation of China(61501515)

摘要:

针对边缘计算的数据隐私性、计算结果正确性和数据处理过程可审计性等需求,提出了一种基于区块链和联邦学习的边缘计算隐私保护方法,不需要可信环境和特殊硬件设施即可在网络边缘处联合多设备实现安全可靠的协同训练。利用区块链赋予边缘计算防篡改和抗单点故障攻击等特性,并在共识协议中融入梯度验证和激励机制,鼓励更多的本地设备诚实地向联邦学习贡献算力和数据。对于联邦学习共享模型参数导致的潜在隐私泄露问题,设计自适应差分隐私机制保护参数隐私的同时减小噪声对模型准确性的影响,并通过时刻统计精确追踪训练过程中的隐私损失。实验结果表明,所提方法能够抵抗30%的中毒攻击,并且能以较高的模型准确率实现隐私保护,适用于对安全性和准确性要求较高的边缘计算场景。

关键词: 联邦学习, 边缘计算, 区块链, 中毒攻击, 隐私保护

Abstract:

Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.

Key words: federated learning, edge computing, blockchain, poisoning attack, privacy preservation

中图分类号: 

No Suggested Reading articles found!