2021
DOI: 10.1109/jiot.2020.3022911
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Federated Learning Framework Based on Chained Secure Multiparty Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
56
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 164 publications
(57 citation statements)
references
References 22 publications
0
56
0
1
Order By: Relevance
“…The experimental results show that the proposed system is beneficial for saving the energy of IoT devices and security analysis suggests that the differential privacy technique can protect against sensitive health data from being obtained maliciously. In our future work, we will investigate how to incorporate highly efficient blockchain and federated learning techniques [ 19 , 30 ] into our solution in order to improve privacy preservation while maintaining high accuracy in the data inferencing system.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The experimental results show that the proposed system is beneficial for saving the energy of IoT devices and security analysis suggests that the differential privacy technique can protect against sensitive health data from being obtained maliciously. In our future work, we will investigate how to incorporate highly efficient blockchain and federated learning techniques [ 19 , 30 ] into our solution in order to improve privacy preservation while maintaining high accuracy in the data inferencing system.…”
Section: Discussionmentioning
confidence: 99%
“…The authors claimed that the proposed scheme could achieve higher processing efficiency when compared to traditional location privacy protection algorithms. Another privacy-preserving framework for exchanging gradients in federated learning with chained secure multi-part computing technique is proposed in Li et al [ 19 ]. The authors argued that the proposed approach is equivalent to differential privacy when E = 0, which prevents sensitive information leakage (e.g., gradients).…”
Section: Related Workmentioning
confidence: 99%
“…Li et al [120] propose a privacy-preserving FL framework based on secure multiparty computing called chain-PPFL. This approach is similar to [31], except that here the authors are based on the principle of secure multiparty computing instead of DP.…”
Section: Main Contributionmentioning
confidence: 99%
“…Collaborative Learning with Secure Muti-Party Computation. Another widely applied cryptographic method is secure multi-party computation (SMC), which allows mutual distrust participants to jointly compute a function over their inputs and preserve the privacy of inputs [65], [66], [174], [175]. Bonawitz et al [65] proposed a communicationefficient, failure-robust secure aggregation of high dimensional model updates without learning each participant's sensitive information with SMC, which can defense both passive and active adversaries.…”
Section: B Cryptographic Privacy-preserving Collaborative Learningmentioning
confidence: 99%
“…To address the above integrity and privacy threats, many methods are proposed to defend these attacks [24], [26], [28], [35]- [48], [48], [49], [49]- [66]. For instance, to achieve byzantine-resilient collaborative learning, Blanchard et al [28] use statistic tools to inspect the updates of participants at each iteration and abandon potential malicious updates when aggregating updates.…”
Section: Introductionmentioning
confidence: 99%