Proceedings of the International Conference on Internet of Things Design and Implementation 2019
DOI: 10.1145/3302505.3310070
|View full text |Cite
|
Sign up to set email alerts
|

On lightweight privacy-preserving collaborative learning for internet-of-things objects

Abstract: The Internet of Things (IoT) will be a main data generation infrastructure for achieving better system intelligence. This paper considers the design and implementation of a practical privacypreserving collaborative learning scheme, in which a curious learning coordinator trains a better machine learning model based on the data samples contributed by a number of IoT objects, while the confidentiality of the raw forms of the training data is protected against the coordinator. Existing distributed machine learnin… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
28
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(28 citation statements)
references
References 38 publications
0
28
0
Order By: Relevance
“…In this section, we introduce the assumptions on the main entities involved in PAutoBotCatcher, namely IoT devices, gateways, block generators, and the graph aggregator. Many of them are commonly adopted by several proposals targeting the IoT scenario (e.g., [14,34,35]).…”
Section: Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, we introduce the assumptions on the main entities involved in PAutoBotCatcher, namely IoT devices, gateways, block generators, and the graph aggregator. Many of them are commonly adopted by several proposals targeting the IoT scenario (e.g., [14,34,35]).…”
Section: Threat Modelmentioning
confidence: 99%
“…Code availability. The authors declare that they have made the source code of all the parts of PAutoBotCatcher: PAutoBotCatcher Blockchain 12 , Botnet Detection Smart Contract 13 , and (k-l)-anonymization layer 14 open source and they are available freely online.…”
Section: Declarationsmentioning
confidence: 99%
“…The computation is limited to a polynomial of bounded degree; thus, it works in a linear nature. Another weakness of HE-based PPDL is the slow training process as it has huge complexity, and the computation process will lead to data swelling [113].…”
Section: B Data Transmission Approachmentioning
confidence: 99%
“…This trusted coordinator is vulnerable to a single point of failure. If this kind of failure occurs and each participant perturbs the training data, the model will yield poor accuracy [113]. Thus, a centralized coordinator is very susceptible to the single point of failure problem.…”
Section: B Data Transmission Approachmentioning
confidence: 99%
“…Hence, FL can help to achieve personalization as well as enhance the performance of devices in IoT applications. In[Jiang et al (2019),Ren et al (2019)], the method is to use deep reinforcement learning to improve unloading results for IoT systems. The main idea is to consider proxy data is fewer related to the data kept on IoT machines.…”
mentioning
confidence: 99%