Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230600211-6.doi: 10.11896/jsjkx.230600211

• Information Security • Previous Articles     Next Articles

Federated Learning Scheme Based on Differential Privacy

SUN Min, DING Xining, CHENG Qian   

  1. College of Computer and Information Technology,Shanxi University,Taiyuan 030000,China
  • Published:2024-06-06
  • About author:SUN Min,born in 1966,master,professor.Her main research interests include computer network and information security.
  • Supported by:
    Shanxi Province Basic Research Program,China(20210302123455,201701D121052).

Abstract: One of the characteristics of federated learning is that the server being trained does not directly contact the data,so federated learning itself has the characteristics of protecting data security.However,research shows that federated learning has privacy leakage problems in local data training and central model aggregation.Differential privacy is a noise augmentation technique that adds appropriate noise to prevent an attacker from distinguishing user information.We study a hybrid noise adding algorithm based on local and central differential privacy(LCDP-FL),which can provide local or hybrid differential privacy protection for each client according to its different weights and privacy requirements.It’s shown that the algorithm can provide users with the privacy they need with minimal computational overhead.The algorithm is tested on the MNIST dataset and CIFAR-10 dataset,and compared with local differential privacy(LDP-FL) and central differential privacy(CDP-FL) algorithms,and the results show that the hybrid algorithm has improved accuracy,loss rate and privacy security,and its algorithm performance is the best.

Key words: Federated learning, Differential privacy, Privacy protection, Hybrid noise, Gradient descent

CLC Number: 

  • TP393
[1]LIU Y X,CHEN H,LIU Y H,et al.Privacy-preserving techniques in federated learning[J].Journal of Software,2022,33(3):1057-1092.
[2]GEYER R C,KLEIN T,NABI M.Differentially private federa-ted learning:a client level perspective[J].arXiv:1712.07557,2017.
[3]TRUEX S,LIU L,CHOW K H,et al.LDP-Fed:federated lear-ning with local differential privacy[C]//Proceedings of the Third ACM International Workshop on Edge Systems,Analytics and Networking.New York:ACM Press,2020:61-66.
[4]LIU X Y,LI H W,XU G W,et al.Privacy-enhanced federated learning against poisoning adversaries[J].IEEE Transactions on Information Forensics and Security,2021,16:4574-4588.
[5]PHONG L T,AONO Y,HAYASHI T,et al.Privacy-preserving deep learning via additively homomorphic encryption[C]//Proceedings of IEEE Transactions on Information Forensics and Security.Piscataway:IEEE Press,2019:1333-1345.
[6]OU W,ZENG J,GUO Z,et al.A homomorphic-encryption-based vertical federated learning scheme for rick management[J].Computer Science and Information Systems,2020,17(3):819-834.
[7]TANG L T,WANG D,ZHANG L F,et al.Federated learning scheme based on secure multi-party computation and differential privacy[J].Computer Science,2022,49(9):297-305.
[8]KAIROUZ P,BONAWITZ K,RAMAGE D.Discrete distribution estimation under local privacy[C]//International Confe-rence on Machine Learning.PMLR,2016:2436-2444.
[9]NASERI M,HAYES J,DE CRISTOFARO E.Toward robustness and privacy in federated learning:Experimenting with local and central differential privacy[C]//Proceedings of the 33rd International Conference on International Conference on Machine Learning(ICML’16).Volume 48.2016:2436-2444.
[10]KAIROUZ P,BONAWITZ K,RAMAGE D.Discrete Distribution Estimation under Local Privacy[C]//Proceedings of the 33rd International Conference on International Conference on Machine Learning(ICML’16).2016:2436-2444.
[11]HUANG J W.Federated learning data privacy security techno-logy based on differential privacy[J].Communication Technology,2022,55(12):1618-1625.
[1] ZHOU Tianyang, YANG Lei. Study on Client Selection Strategy and Dataset Partition in Federated Learning Basedon Edge TB [J]. Computer Science, 2024, 51(6A): 230800046-6.
[2] WANG Chenzhuo, LU Yanrong, SHEN Jian. Study on Fingerprint Recognition Algorithm for Fairness in Federated Learning [J]. Computer Science, 2024, 51(6A): 230800043-9.
[3] ZANG Hongrui, YANG Tingting, LIU Hongbo, MA Kai. Study on Cryptographic Verification of Distributed Federated Learning for Internet of Things [J]. Computer Science, 2024, 51(6A): 230700217-5.
[4] LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14.
[5] SUN Jianming, ZHAO Mengxin. Survey of Application of Differential Privacy in Edge Computing [J]. Computer Science, 2024, 51(6A): 230700089-9.
[6] TAN Zhiwen, XU Ruzhi, WANG Naiyu, LUO Dan. Differential Privacy Federated Learning Method Based on Knowledge Distillation [J]. Computer Science, 2024, 51(6A): 230600002-8.
[7] LIU Dongqi, ZHANG Qiong, LIANG Haolan, ZHANG Zidong, ZENG Xiangjun. Study on Smart Grid AMI Intrusion Detection Method Based on Federated Learning [J]. Computer Science, 2024, 51(6A): 230700077-8.
[8] LIU Jianxun, ZHANG Xinglin. Federated Learning Client Selection Scheme Based on Time-varying Computing Resources [J]. Computer Science, 2024, 51(6): 354-363.
[9] XU Yicheng, DAI Chaofan, MA Wubin, WU Yahui, ZHOU Haohao, LU Chenyang. Particle Swarm Optimization-based Federated Learning Method for Heterogeneous Data [J]. Computer Science, 2024, 51(6): 391-398.
[10] DENG Ziwei, CHEN Ling, LIU Wei. Continuous Influence Maximization Under Independent Cascade Propagation Model [J]. Computer Science, 2024, 51(6): 161-171.
[11] MIN Lihua, DING Tianzhong, JIN Zhengmeng. Deformable Image Registration Model Based on Weighted Bounded Deformation Function [J]. Computer Science, 2024, 51(6): 206-214.
[12] WANG Zhen, NIE Kai, HAN Lin. Auto-vectorization Cost Model Based on Instruction MKS [J]. Computer Science, 2024, 51(4): 78-85.
[13] LU Yanfeng, WU Tao, LIU Chunsheng, YAN Kang, QU Yuben. Survey of UAV-assisted Energy-Efficient Edge Federated Learning [J]. Computer Science, 2024, 51(4): 270-279.
[14] WANG Degang, SUN Yi, GAO Qi. Active Membership Inference Attack Method Based on Multiple Redundant Neurons [J]. Computer Science, 2024, 51(4): 373-380.
[15] YOU Feifu, CAI Jianping, SUN Lan. Census Associated Multiple Attributes Data Release Based on Differential Privacy [J]. Computer Science, 2024, 51(3): 368-377.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!