Computer Science ›› 2021, Vol. 48 ›› Issue (2): 311-316.doi: 10.11896/jsjkx.191000126

• Information Security • Previous Articles     Next Articles

Model Chain for Data and Model Sharing

YAN Kai-lun1, ZHANG Ji-lian1,2   

  1. 1 Guangxi Key Lab of MIMS, College of Computer Science, Information Engineering, Guangxi Normal University, Guilin, Guangxi 541004, China
    2 College of Cyber Security,Jinan University,Guangzhou 510632,China
  • Received:2019-10-21 Revised:2020-04-23 Online:2021-02-15 Published:2021-02-04
  • About author:YAN Kai-lun,born in 1994,postgra-duate.His main research interests include blockchain and machine learning.
    ZHANG Ji-lian,born in 1977,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include data management,information security and machine learning.
  • Supported by:
    The National Natural Science Foundation of China(61932011,61972177,61877029,62020106013),Guangxi Key Lab of MIMS (MIMS18-09) and Communication and Computer Network Lab of Guangdong(CCNL201903).

Abstract: Machine learning has been applied in more and more scenarios,but software that employs machine learning to perform tasks depends on third-party to update the models.This paper proposes and implements a model chain by utilizing computation power of training neural network consumption with proof-of-work.As a blockchain that can be used to share data and machine learning models,the data shared anonymously by the whole network node are used in the model chain,and the neural network model is explored based on the primary network,thus realizing neural network model update without relying on the third-party.The shared data are signed with a ring signature to protect local data privacy.The whole network uses the same test set to evaluate the model,and the adopted model can be regarded as proof-of-work.This paper proposes two reward mechanisms,i.e.,material reward and model reward.To deal with potential threats,e.g.,blockchain ledger analysis,dirty data attacks and fraudulent voting,this paper proposes ideal ring signature scheme and several solutions.Finally,extensive experiments on real data are conducted,and the results show that the model in the model chain can adapt to the user changes and data changes.

Key words: Blockchain, Data Sharing, Neural network, Proof-of-work, Voting consensus mechanism

CLC Number: 

  • TP311
[1] BONAWITZ K,EICHNER H,GRIESKAMP W,et al.Towards federated learning at scale:System design[J].arXiv:1902.01046,2019.
[2] LINDEN G,SMITH B,YORK J.Amazon.com recommenda-tions:Item-to-item collaborative filtering[J].IEEE Internet computing,2003 (1):76-80.
[3] ZHISONG P,SIQI T,JUNYANG Q,et al.Survey on Online Learning Algorithms[J].Journal of Data Acquisition and Processing,2016,31(6):1067-1082.
[4] NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].Bitcoin.-URL:https://bitcoin.org/bitcoin.pdf.
[5] ZHENG Z,XIE S,DAI H,et al.An overview of blockchain technology:Architecture,consensus,and future trends[C]//2017 IEEE International Congress on Big Data (BigData Congress).IEEE,2017:557-564.
[6] KURTULMUS A B,DANIEL K.Trustless machine learning contracts;evaluating and exchanging machine learning models on the ethereum blockchain[J].arXiv:1802.10185,2018.
[7] ANDROULAKI E,KARAME G O,ROESCHLIN M,et al.Evaluating user privacy in bitcoin[C]//International Conference on Financial Cryptography and Data Security.Berlin,Heidelberg:Springer,2013:34-51.
[8] CONTI M,KUMAR E S,LAL C,et al.A survey on security and privacy issues of bitcoin[J].IEEE Communications Surveys &Tutorials,2018,20(4):3416-3452.
[9] RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin,Heidelberg:Springer,2001:552-565.
[10] TIEYAN L,WEI C,TAIFENG W,et al.Machine Learning:Distributed Algorithms,Theory,and Practice[M].Beijing:China Machine Press,2018.
[11] SHIZHAO S,WEI CH,JIANG B,et al.Slim-DP:A Multi-Agent System for Communication-Efficient Distributed Deep Learning[C]//Proceeding of the 17th International Conference on Autonomous Agents and Multiagent Systems (AAMAS).2018.
[12] HAN S,POOL J,TRAN J,et al.Learning both weights andconnections for efficient neural network[C]//Advances in Neural Information Processing Systems.2015:1135-1143.
[13] YUAN Y,NI X C,ZENG S,et al.Blockchain consensus algorithms:the state of the art and future trends[J].Acta Automatica Sinica,2018,44(11):2011-2022.
[14] DOUCEUR J R.The sybil attack[C]//International workshop on peer-to-peer systems.Berlin,Heidelberg:Springer,2002:251-260.
[15] BENET J.Ipfs-content addressed,versioned,p2p file system[J].arXiv:1407.3561,2014.
[16] CHEN Y,LI H,LI K,et al.An improved P2P file systemscheme based on IPFS and Blockchain[C]//2017 IEEE International Conference on Big Data (Big Data).IEEE,2017:2652-2657.
[17] SCHOENMAKERS B.A simple publicly verifiable secret sharing scheme and its application to electronic voting[C]//Annual International Cryptology Conference.Springer,Berlin,Heidelberg,1999:148-164.
[18] SYTA E,JOVANOVIC P,KOGIAS E K,et al.Scalable Bias-Resistant Distributed Randomness[C]//2017 IEEE Symposium on Security and Privacy (SP).IEEE,2017.
[19] KIAYIAS A,RUSSELL A,DAVID B,et al.Ouroboros:A pro-vably secure proof-of-stake blockchain protocol[C]//Annual International Cryptology Conference.Springer,Cham,2017:357-388.
[20] BONNEAU J,CLARK J,GOLDFEDER S.On Bitcoin as a public randomness source[J].IACR Cryptology ePrint Archive,2015,2015:1015.
[21] COHEN B.Incentives build robustness in BitTorrent[C]//Workshop on Economics of Peer-to-Peer Systems.2003:68-72.
[22] LECUN Y,BOTTOU L,BENGIO Y,et al.Gradient-basedlearning applied to document recognition[J].Proceedings of the IEEE,1998,86(11):2278-2324.
[23] KRIZHEVSKY A,SUTSKEVER I,HINTON G E.Imagenet classification with deep convolutional neural networks[C]//Advances in neural information processing systems.2012:1097-1105.
[1] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[2] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[3] ZHOU Fang-quan, CHENG Wei-qing. Sequence Recommendation Based on Global Enhanced Graph Neural Network [J]. Computer Science, 2022, 49(9): 55-63.
[4] ZHOU Le-yuan, ZHANG Jian-hua, YUAN Tian-tian, CHEN Sheng-yong. Sequence-to-Sequence Chinese Continuous Sign Language Recognition and Translation with Multi- layer Attention Mechanism Fusion [J]. Computer Science, 2022, 49(9): 155-161.
[5] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[6] WANG Run-an, ZOU Zhao-nian. Query Performance Prediction Based on Physical Operation-level Models [J]. Computer Science, 2022, 49(8): 49-55.
[7] CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85.
[8] ZHU Cheng-zhang, HUANG Jia-er, XIAO Ya-long, WANG Han, ZOU Bei-ji. Deep Hash Retrieval Algorithm for Medical Images Based on Attention Mechanism [J]. Computer Science, 2022, 49(8): 113-119.
[9] YAN Jia-dan, JIA Cai-yan. Text Classification Method Based on Information Fusion of Dual-graph Neural Network [J]. Computer Science, 2022, 49(8): 230-236.
[10] QI Xiu-xiu, WANG Jia-hao, LI Wen-xiong, ZHOU Fan. Fusion Algorithm for Matrix Completion Prediction Based on Probabilistic Meta-learning [J]. Computer Science, 2022, 49(7): 18-24.
[11] YANG Bing-xin, GUO Yan-rong, HAO Shi-jie, Hong Ri-chang. Application of Graph Neural Network Based on Data Augmentation and Model Ensemble in Depression Recognition [J]. Computer Science, 2022, 49(7): 57-63.
[12] ZHANG Ying-tao, ZHANG Jie, ZHANG Rui, ZHANG Wen-qiang. Photorealistic Style Transfer Guided by Global Information [J]. Computer Science, 2022, 49(7): 100-105.
[13] DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119.
[14] LIU Yue-hong, NIU Shao-hua, SHEN Xian-hao. Virtual Reality Video Intraframe Prediction Coding Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(7): 127-131.
[15] XU Ming-ke, ZHANG Fan. Head Fusion:A Method to Improve Accuracy and Robustness of Speech Emotion Recognition [J]. Computer Science, 2022, 49(7): 132-141.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!