计算机科学 ›› 2021, Vol. 48 ›› Issue (2): 311-316.doi: 10.11896/jsjkx.191000126

• 信息安全 • 上一篇    下一篇

一种可用于数据和模型分享的模型链

闫凯伦1, 张继连1,2   

  1. 1 广西师范大学计算机科学与信息工程学院 广西多源信息挖掘与安全重点实验室广西 桂林541004
    2 暨南大学网络空间安全学院 广州510632
  • 收稿日期:2019-10-21 修回日期:2020-04-23 出版日期:2021-02-15 发布日期:2021-02-04
  • 通讯作者: 张继连(zhangjilian@jnu.edu.cn)
  • 作者简介:victory_yan@foxmail.com
  • 基金资助:
    国家自然科学基金(61932011,61972177,61877029,62020106013);广西多源信息挖掘与安全重点实验室开放课题(MIMS18-09);广东省计算机网络重点实验室开放课题(CCNL201903)

Model Chain for Data and Model Sharing

YAN Kai-lun1, ZHANG Ji-lian1,2   

  1. 1 Guangxi Key Lab of MIMS, College of Computer Science, Information Engineering, Guangxi Normal University, Guilin, Guangxi 541004, China
    2 College of Cyber Security,Jinan University,Guangzhou 510632,China
  • Received:2019-10-21 Revised:2020-04-23 Online:2021-02-15 Published:2021-02-04
  • About author:YAN Kai-lun,born in 1994,postgra-duate.His main research interests include blockchain and machine learning.
    ZHANG Ji-lian,born in 1977,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include data management,information security and machine learning.
  • Supported by:
    The National Natural Science Foundation of China(61932011,61972177,61877029,62020106013),Guangxi Key Lab of MIMS (MIMS18-09) and Communication and Computer Network Lab of Guangdong(CCNL201903).

摘要: 机器学习开始在越来越多的行业中得到应用,但使用机器学习执行任务的软件一直受限于第三方软件商更新模型。文中基于区块链,将训练神经网络消耗的算力和区块链的工作量证明机制相结合,提出并实现了模型链。模型链作为一种可用于分享数据和机器学习模型的区块链,基于骨架网络训练神经网络模型,以全网节点匿名分享的数据作为训练模型的数据集,实现了不依赖第三方更新神经网络模型。模型链使用环签名来保护用户数据隐私,节点训练的模型使用统一的测试集评估,通过评估的模型将作为节点的工作量证明用于投票达成一致共识。文中提出了两种可行的激励机制,即物质奖励和模型奖励。对于潜在的威胁,如账本分析、脏数据攻击和欺骗投票,给出了相应的解决方案.实现了一个用于数字识别的模型链。实验结果表明,模型链中的模型可以适应实际场景下发生的用户变迁和数据变化。

关键词: 工作量证明, 区块链, 神经网络, 数据分享, 投票共识机制

Abstract: Machine learning has been applied in more and more scenarios,but software that employs machine learning to perform tasks depends on third-party to update the models.This paper proposes and implements a model chain by utilizing computation power of training neural network consumption with proof-of-work.As a blockchain that can be used to share data and machine learning models,the data shared anonymously by the whole network node are used in the model chain,and the neural network model is explored based on the primary network,thus realizing neural network model update without relying on the third-party.The shared data are signed with a ring signature to protect local data privacy.The whole network uses the same test set to evaluate the model,and the adopted model can be regarded as proof-of-work.This paper proposes two reward mechanisms,i.e.,material reward and model reward.To deal with potential threats,e.g.,blockchain ledger analysis,dirty data attacks and fraudulent voting,this paper proposes ideal ring signature scheme and several solutions.Finally,extensive experiments on real data are conducted,and the results show that the model in the model chain can adapt to the user changes and data changes.

Key words: Blockchain, Data Sharing, Neural network, Proof-of-work, Voting consensus mechanism

中图分类号: 

  • TP311
[1] BONAWITZ K,EICHNER H,GRIESKAMP W,et al.Towards federated learning at scale:System design[J].arXiv:1902.01046,2019.
[2] LINDEN G,SMITH B,YORK J.Amazon.com recommenda-tions:Item-to-item collaborative filtering[J].IEEE Internet computing,2003 (1):76-80.
[3] ZHISONG P,SIQI T,JUNYANG Q,et al.Survey on Online Learning Algorithms[J].Journal of Data Acquisition and Processing,2016,31(6):1067-1082.
[4] NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].Bitcoin.-URL:https://bitcoin.org/bitcoin.pdf.
[5] ZHENG Z,XIE S,DAI H,et al.An overview of blockchain technology:Architecture,consensus,and future trends[C]//2017 IEEE International Congress on Big Data (BigData Congress).IEEE,2017:557-564.
[6] KURTULMUS A B,DANIEL K.Trustless machine learning contracts;evaluating and exchanging machine learning models on the ethereum blockchain[J].arXiv:1802.10185,2018.
[7] ANDROULAKI E,KARAME G O,ROESCHLIN M,et al.Evaluating user privacy in bitcoin[C]//International Conference on Financial Cryptography and Data Security.Berlin,Heidelberg:Springer,2013:34-51.
[8] CONTI M,KUMAR E S,LAL C,et al.A survey on security and privacy issues of bitcoin[J].IEEE Communications Surveys &Tutorials,2018,20(4):3416-3452.
[9] RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin,Heidelberg:Springer,2001:552-565.
[10] TIEYAN L,WEI C,TAIFENG W,et al.Machine Learning:Distributed Algorithms,Theory,and Practice[M].Beijing:China Machine Press,2018.
[11] SHIZHAO S,WEI CH,JIANG B,et al.Slim-DP:A Multi-Agent System for Communication-Efficient Distributed Deep Learning[C]//Proceeding of the 17th International Conference on Autonomous Agents and Multiagent Systems (AAMAS).2018.
[12] HAN S,POOL J,TRAN J,et al.Learning both weights andconnections for efficient neural network[C]//Advances in Neural Information Processing Systems.2015:1135-1143.
[13] YUAN Y,NI X C,ZENG S,et al.Blockchain consensus algorithms:the state of the art and future trends[J].Acta Automatica Sinica,2018,44(11):2011-2022.
[14] DOUCEUR J R.The sybil attack[C]//International workshop on peer-to-peer systems.Berlin,Heidelberg:Springer,2002:251-260.
[15] BENET J.Ipfs-content addressed,versioned,p2p file system[J].arXiv:1407.3561,2014.
[16] CHEN Y,LI H,LI K,et al.An improved P2P file systemscheme based on IPFS and Blockchain[C]//2017 IEEE International Conference on Big Data (Big Data).IEEE,2017:2652-2657.
[17] SCHOENMAKERS B.A simple publicly verifiable secret sharing scheme and its application to electronic voting[C]//Annual International Cryptology Conference.Springer,Berlin,Heidelberg,1999:148-164.
[18] SYTA E,JOVANOVIC P,KOGIAS E K,et al.Scalable Bias-Resistant Distributed Randomness[C]//2017 IEEE Symposium on Security and Privacy (SP).IEEE,2017.
[19] KIAYIAS A,RUSSELL A,DAVID B,et al.Ouroboros:A pro-vably secure proof-of-stake blockchain protocol[C]//Annual International Cryptology Conference.Springer,Cham,2017:357-388.
[20] BONNEAU J,CLARK J,GOLDFEDER S.On Bitcoin as a public randomness source[J].IACR Cryptology ePrint Archive,2015,2015:1015.
[21] COHEN B.Incentives build robustness in BitTorrent[C]//Workshop on Economics of Peer-to-Peer Systems.2003:68-72.
[22] LECUN Y,BOTTOU L,BENGIO Y,et al.Gradient-basedlearning applied to document recognition[J].Proceedings of the IEEE,1998,86(11):2278-2324.
[23] KRIZHEVSKY A,SUTSKEVER I,HINTON G E.Imagenet classification with deep convolutional neural networks[C]//Advances in neural information processing systems.2012:1097-1105.
[1] 周芳泉, 成卫青.
基于全局增强图神经网络的序列推荐
Sequence Recommendation Based on Global Enhanced Graph Neural Network
计算机科学, 2022, 49(9): 55-63. https://doi.org/10.11896/jsjkx.210700085
[2] 周乐员, 张剑华, 袁甜甜, 陈胜勇.
多层注意力机制融合的序列到序列中国连续手语识别和翻译
Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion
计算机科学, 2022, 49(9): 155-161. https://doi.org/10.11896/jsjkx.210800026
[3] 宁晗阳, 马苗, 杨波, 刘士昌.
密码学智能化研究进展与分析
Research Progress and Analysis on Intelligent Cryptology
计算机科学, 2022, 49(9): 288-296. https://doi.org/10.11896/jsjkx.220300053
[4] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[5] 李宗民, 张玉鹏, 刘玉杰, 李华.
基于可变形图卷积的点云表征学习
Deformable Graph Convolutional Networks Based Point Cloud Representation Learning
计算机科学, 2022, 49(8): 273-278. https://doi.org/10.11896/jsjkx.210900023
[6] 郝志荣, 陈龙, 黄嘉成.
面向文本分类的类别区分式通用对抗攻击方法
Class Discriminative Universal Adversarial Attack for Text Classification
计算机科学, 2022, 49(8): 323-329. https://doi.org/10.11896/jsjkx.220200077
[7] 王润安, 邹兆年.
基于物理操作级模型的查询执行时间预测方法
Query Performance Prediction Based on Physical Operation-level Models
计算机科学, 2022, 49(8): 49-55. https://doi.org/10.11896/jsjkx.210700074
[8] 陈泳全, 姜瑛.
基于卷积神经网络的APP用户行为分析方法
Analysis Method of APP User Behavior Based on Convolutional Neural Network
计算机科学, 2022, 49(8): 78-85. https://doi.org/10.11896/jsjkx.210700121
[9] 朱承璋, 黄嘉儿, 肖亚龙, 王晗, 邹北骥.
基于注意力机制的医学影像深度哈希检索算法
Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism
计算机科学, 2022, 49(8): 113-119. https://doi.org/10.11896/jsjkx.210700153
[10] 檀莹莹, 王俊丽, 张超波.
基于图卷积神经网络的文本分类方法研究综述
Review of Text Classification Methods Based on Graph Convolutional Network
计算机科学, 2022, 49(8): 205-216. https://doi.org/10.11896/jsjkx.210800064
[11] 闫佳丹, 贾彩燕.
基于双图神经网络信息融合的文本分类方法
Text Classification Method Based on Information Fusion of Dual-graph Neural Network
计算机科学, 2022, 49(8): 230-236. https://doi.org/10.11896/jsjkx.210600042
[12] 金方焱, 王秀利.
融合RACNN和BiLSTM的金融领域事件隐式因果关系抽取
Implicit Causality Extraction of Financial Events Integrating RACNN and BiLSTM
计算机科学, 2022, 49(7): 179-186. https://doi.org/10.11896/jsjkx.210500190
[13] 彭双, 伍江江, 陈浩, 杜春, 李军.
基于注意力神经网络的对地观测卫星星上自主任务规划方法
Satellite Onboard Observation Task Planning Based on Attention Neural Network
计算机科学, 2022, 49(7): 242-247. https://doi.org/10.11896/jsjkx.210500093
[14] 费星瑞, 谢逸.
基于HMM-NN的用户点击流识别
Click Streams Recognition for Web Users Based on HMM-NN
计算机科学, 2022, 49(7): 340-349. https://doi.org/10.11896/jsjkx.210600127
[15] 赵冬梅, 吴亚星, 张红斌.
基于IPSO-BiLSTM的网络安全态势预测
Network Security Situation Prediction Based on IPSO-BiLSTM
计算机科学, 2022, 49(7): 357-362. https://doi.org/10.11896/jsjkx.210900103
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!