Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230700217-5.doi: 10.11896/jsjkx.230700217

• Information Security • Previous Articles     Next Articles

Study on Cryptographic Verification of Distributed Federated Learning for Internet of Things

ZANG Hongrui, YANG Tingting, LIU Hongbo, MA Kai   

  1. Information and Company of State Grid Jilin Electric Power Co.,LTD,Changchun 130000,China
  • Published:2024-06-06
  • About author:ZANG Hongrui,born in 1987,postgra-duate.His main research interests include information security and so on.
  • Supported by:
    Science and Technology Project of State Grid Jilin Electric Power Co.LTD(2023-49).

Abstract: Artificial intelligence is combined with the Internet of Things(IoT) to enhance application usage.In the IoT,data sharing can improve the quality of applications,but it also brings data security issues,such as data leakage and inability to verify du-ring the sharing process.This paper proposes a scheme combining distributed federated learning with blockchain and encryption verification to protect the privacy and effectiveness of shared data in the IoT.First,federated learning and blockchain are used to transform the direct sharing of original data into shared encryption model parameters in the IoT.Next,this paper proposes a method with encryption verification to verify and select on chain parameters during the model aggregation stage.Finally,the proposed method is compared with other methods,and experimental results show that our method can effectively ensure data privacy and achieve verification of encrypted data,ensuring the accuracy of the final model,and providing guarantees for high-quality data sharing in the IoT.

Key words: Federated learning, Blockchain, Internet of Things, Cryptographic verification, Homomorphic encryption

CLC Number: 

  • TP391
[1]JIA B,ZHANG X,LIU J,et al.Blockchain-enabled federatedlearning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT[J].IEEE Transactions on Industrial Informatics,2021,18(6):4049-4058.
[2]FU L Y,LU G H,WU Y M,et al.Overview of Research and Development of Blockchain Technology[J].Computer Science,2022,49(S1):447-461.
[3]MIAO Y,LIU Z,LI H,et al.Privacy-preserving Byzantine-ro-bust federated learning via blockchain systems[J].IEEE Transactions on Information Forensics and Security,2022,17:2848-2861.
[4]SUN Z,WAN J,YIN L,et al.A blockchain-based audit ap-proach for encrypted data in federated learning[J].Digital Communications and Networks,2022,8(5):614-624
[5]BHAGOJI A N,CHAKRABORTY S,MITTAL P,et al.Analyzing federated learning through an adversarial lens[C]//International Conference on Machine Learning.PMLR,2019:634-643.
[6]SHEN S,TOPLE S,SAXENA P.Auror:Defending against poisoning attacks in collaborative deep learning systems[C]//Proceedings of the 32nd Annual Conference on Computer Security Applications.2016:508-519.
[7]QU X,WANG S,HU Q,et al.Proof of federated learning:A novel energy-recycling consensus algorithm[J].IEEE Transactions on Parallel and Distributed Systems,2021,32(8):2074-2085.
[8]LIU Y,QU Y,XU C,et al.Blockchain-enabled asynchronousfederated learning in edge computing[J].Sensors,2021,21(10):3335.
[9]LIU X,LI H,XU G,et al.Privacy-enhanced federated learning against poisoning adversaries[J].IEEE Transactions on Information Forensics and Security,2021,16:4574-4588.
[10]LU Y,HUANG X,DAI Y,et al.Blockchain and FederatedLearning for Privacy-Preserved Data Sharing in Industrial IoT[J].IEEE Transactions on Industrial Informatics,2020,16(6):4177-4186.
[11]QU X,WANG S,HU Q,et al.Proof of federated learning:A novel energy-recycling consensus algorithm[J].IEEE Transactions on Parallel and Distributed Systems,2021,32(8):2074-2085.
[12]BLANCHARD P,EL MHAMDI E M,GUERRAOUI R,et al.Machine learning with adversaries:Byzantine tolerant gradient descent[J].Advances in Neural Information Processing Systems,2017,30:118-128.
[13]FUNG C,YOON C J M,BESCHASTNIKH I.Mitigating sybils in federated learning poisoning[J].arXiv:1808.04866,2018.
[14]ZHU L,LIU Z,HAN S.Deep leakage from gradients[J].Advances in Neural Information Processing Systems,2019,32:17-31.
[15]ZHU H,WANG R,JINY,et al.Distributed Additive Encryption and Quantization for Privacy Preserving Federated Deep Lear-ning[J].Neurocomputing,2020,463:309-327.
[16]ZHOU H,WORNELL G.Efficient homomorphic encryption on integer vectors and its applications[C]//2014 Information Theory and Applications Workshop(ITA).2014:1-9.
[17]KETKAR N,SANTANA E.Deep learning with Python[M].Berkeley,CA:Apress,2017:97-111.
[18]DILLON,JOSHUA V,et al.Tensorflow distributions[J].ar-Xiv:1711.10604,2017.
[19]“Fiscobcos”[EB/OL].https://github.com/fisco-bcos.
[20]AONO Y,HAYASHI T,WANG L,et al.Privacy-preserving deep learning via additively homomorphic encryption[J].IEEE Transactions on Information Forensics and Security,2017,13(5):1333-1345.
[1] ZHOU Tianyang, YANG Lei. Study on Client Selection Strategy and Dataset Partition in Federated Learning Basedon Edge TB [J]. Computer Science, 2024, 51(6A): 230800046-6.
[2] ZHU Jun, ZHANG Guoyin, WAN Jingjing. Study on Data Security Framework Based on Identity and Blockchain Integration [J]. Computer Science, 2024, 51(6A): 230400056-5.
[3] LAN Yajie, MA Ziqiang, CHEN Jiali, MIAO Li, XU Xin. Survey on Application of Searchable Attribute-based Encryption Technology Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230800016-14.
[4] SUN Min, DING Xining, CHENG Qian. Federated Learning Scheme Based on Differential Privacy [J]. Computer Science, 2024, 51(6A): 230600211-6.
[5] TAN Zhiwen, XU Ruzhi, WANG Naiyu, LUO Dan. Differential Privacy Federated Learning Method Based on Knowledge Distillation [J]. Computer Science, 2024, 51(6A): 230600002-8.
[6] LIU Dongqi, ZHANG Qiong, LIANG Haolan, ZHANG Zidong, ZENG Xiangjun. Study on Smart Grid AMI Intrusion Detection Method Based on Federated Learning [J]. Computer Science, 2024, 51(6A): 230700077-8.
[7] TAN Jingqi, XUE Lingyan, HUANG Haiping, CHEN Long, LI Yixuan. Data Security Management Scheme Based on Editable Medical Consortium Chain [J]. Computer Science, 2024, 51(6A): 240400056-8.
[8] KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6.
[9] GENG Qian, CHUAI Ziang, JIN Jian. Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange [J]. Computer Science, 2024, 51(6A): 230800145-9.
[10] WANG Chenzhuo, LU Yanrong, SHEN Jian. Study on Fingerprint Recognition Algorithm for Fairness in Federated Learning [J]. Computer Science, 2024, 51(6A): 230800043-9.
[11] TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7.
[12] LIU Jianxun, ZHANG Xinglin. Federated Learning Client Selection Scheme Based on Time-varying Computing Resources [J]. Computer Science, 2024, 51(6): 354-363.
[13] XU Yicheng, DAI Chaofan, MA Wubin, WU Yahui, ZHOU Haohao, LU Chenyang. Particle Swarm Optimization-based Federated Learning Method for Heterogeneous Data [J]. Computer Science, 2024, 51(6): 391-398.
[14] ZHANG Ruirong, NIU Baoning, FAN Xing. Multi-attribute Blockchain Decentralization Degree Measurement Model [J]. Computer Science, 2024, 51(5): 382-389.
[15] DING Hongfa, YU Yingying, JIANG Heling. Correctness Verifiable Outsourcing Computation Scheme of Shortest Path Querying over Encrypted Graph Data [J]. Computer Science, 2024, 51(5): 400-413.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!