2020
DOI: 10.1109/jiot.2020.2987958
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Federated Learning in Fog Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 196 publications
(71 citation statements)
references
References 31 publications
0
69
0
2
Order By: Relevance
“…Thus, IoT units communicate with each other in a p2p fashion, and, following a similar process as that described above, after a certain rounds of model exchanges and updates, they obtain a finally consensual model [ 7 ]. Each of the mentioned strategies, centralized and decentralized, are related to different networking architectures, which follow different paradigms, such as edge [ 14 ] or fog [ 15 ] computing, respectively. Figure 2 presents the architecture of both the approaches.…”
Section: Background: Enabling Technologiesmentioning
confidence: 99%
“…Thus, IoT units communicate with each other in a p2p fashion, and, following a similar process as that described above, after a certain rounds of model exchanges and updates, they obtain a finally consensual model [ 7 ]. Each of the mentioned strategies, centralized and decentralized, are related to different networking architectures, which follow different paradigms, such as edge [ 14 ] or fog [ 15 ] computing, respectively. Figure 2 presents the architecture of both the approaches.…”
Section: Background: Enabling Technologiesmentioning
confidence: 99%
“…However, the system transfers data over the network, allowing the leakage of critical data [ 31 ] and the increasing risk of side-channel attack [ 32 ]. The edge computing framework utilizes federated learning technology, prevents direct access to the data, moves the compute resource to the edge, and prevents the raw data exchange to the central server [ 33 , 34 , 35 , 36 ]. For example, a smartphone that collects location data allows weather forecasting applications to directly access the user’s location, which violates information-based privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Among them, multiple works focus on the integration of DP and federated learning. However, most of them (e.g., [8], [9], [10], [11], [12], [13], [14], [15], [16], [17]) demonstrate the performance of proposed approaches merely by experiments, with no theoretical analysis on the convergence. However, experimental observations are not always reliable since the performance of machine learning algorithms heavily rely on hyper-parameter tuning, and an algorithm that is observed to perform better than other algorithms may just be the algorithm that is better tuned.…”
Section: Related Workmentioning
confidence: 99%
“…In order to motivate and retain edge devices in federated learning, it is desirable to provide rigorous differential privacy (DP) guarantee for devices. While there have been multiple works focusing on the integration of DP and federated learning [8], [9], [10], [11], [12], [13], [14], [15], [16], [17], most of the work demonstrate the performance of proposed approaches by experiments, whose results heavily rely on hyper-parameter tuning. The main focus of this paper is to provide a differentially-private federated learning approach with convergence performance bound.…”
Section: Introductionmentioning
confidence: 99%