Privacy-Preserving Federated Learning Secure Aggregation Strategy Based on Permissioned Blockchain
DOI: 10.23977/acss.2025.090113 | Downloads: 17 | Views: 563
Author(s)
Wang Chenyi 1, Wang Zhe 1, He Jiekai 1
Affiliation(s)
1 School of Artificial Intelligence, Guangxi Minzu University, Nanning, 530006, China
Corresponding Author
Wang ChenyiABSTRACT
In order to solve the problems of privacy-preserving federated learning in which the poisoning behaviour of client nodes as well as the malicious aggregation behaviour of aggregation server nodes lead to the failure of model training, a secure aggregation privacy-preserving federated learning strategy based on permissioned blockchain is proposed. In order to solve the problem of malicious behavior of aggregation server nodes, a trusted aggregation server node selection algorithm is designed to cancel the right of nodes with malicious aggregation behavior to participate in the aggregation server node election. Each node establishes a reputation value, proposes a reward and punishment algorithm based on the reputation value, and establishes a threshold, and nodes with a reputation value lower than the threshold will be refused to participate in the federated learning process to reduce the threat of client node poisoning attack behaviour on model learning.The experimental results show that the scheme is able to ensure secure model aggregation and achieve high model correctness in the presence of malicious aggregation behaviour at 50% of the nodes and poisoning attacks at 40% of the nodes.
KEYWORDS
Blockchain; federated learning; privacy protection; secure aggregationCITE THIS PAPER
Wang Chenyi, Wang Zhe, He Jiekai, Privacy-Preserving Federated Learning Secure Aggregation Strategy Based on Permissioned Blockchain. Advances in Computer, Signals and Systems (2025) Vol. 9: 84-99. DOI: http://dx.doi.org/10.23977/acss.2025.090113.
REFERENCES
[1] Xiao X, Tang Z, Xiao B. A survey on privacy and security issues in federated learning[J]. Chin. J. Comput, 2023, 46(5): 1019-1044.
[2] Xiao Xiong, Tang Zhuo, Xiao Bin, et al. Review of Privacy Protection and Security Defense Research in Federal Learning [J]. Journal of Computer Science, 2023,46 (05): 1019-1044.
[3] Kairouz P, McMahan H B, Avent B, et al. Advances and open problems in federated learning[J]. Foundations and Trends® in Machine Learning, 2021, 14(1–2): 1-210.
[4] Liu YX, Chen H, Liu YH, Li CP. Privacy-preserving Techniques in Federated Learning[J]. Journal of Software, 2022, 33(3): 1057-1092.
[5] Liu Yixuan, Chen Hong, Liu Yuhan, Li Cuiping. Privacy Technology in federated Learning [J]. Journal of Software, 2022,33 (3): 1057-1092.
[6] Li T, Sahu A K, Talwalkar A, et al. Federated learning: Challenges, methods, and future directions[J]. IEEE signal processing magazine, 2020, 37(3): 50-60.
[7] Zang XL ,Luo WH.Implementing Federated Learning Intrusion Detection Using Dynamic Clipping Differential Privacy[J]. Journal of Chinese Computer Systems. 2024, 45(6): 1474-1481.
[8] Zhang Xiaolong, Luo Wenhua. Implement federated learning intrusion detection using dynamic trimmed differential privacy [J]. Small microcomputer system. 2024,45(6):1474-1481.
[9] Fung C, Yoon C J M, Beschastnikh I. Mitigating sybils in federated learning poisoning[J]. arXiv preprint arXiv:1808.04866, 2018.
[10] Tolpegin V, Truex S, Gursoy M E, et al. Data poisoning attacks against federated learning systems[C]//Computer security–ESORICs 2020: 25th European symposium on research in computer security, ESORICs 2020, guildford, UK, September 14–18, 2020, proceedings, part i 25. Springer International Publishing, 2020: 480-501.
[11] Dong C, Weng J, Li M, et al. Privacy-preserving and byzantine-robust federated learning[J]. IEEETransactions on Dependable and Secure Computing, 2023, 21(2): 889-904.
[12] Blanchard P, El Mhamdi E M, Guerraoui R, et al. Machine learning with adversaries: Byzantine tolerant gradient descent[J]. Advances in neural information processing systems, 2017, 30.
[13] Yin D, Chen Y, Kannan R, et al. Byzantine-robust distributed learning: Towards optimal statistical rates[C]//International conference on machine learning. Pmlr, 2018: 5650-5659.
[14] Guerraoui R, Rouault S. The hidden vulnerability of distributed learning in byzantium[C]//International Conference on Machine Learning. PMLR, 2018: 3521-3530.
[15] Shen S, Tople S, Saxena P. Auror: Defending against poisoning attacks in collaborative deep learning systems[C]//Proceedings of the 32nd annual conference on computer security applications. 2016: 508-519.
[16] Liu X, Li H, Xu G, et al. Privacy-enhanced federated learning against poisoning adversaries[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 4574-4588.
[17] Ma Z, Ma J, Miao Y, et al. ShieldFL: Mitigating model poisoning attacks in privacy-preserving federated learning[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 1639-1654.
[18] Zhou J, Wu N, Wang Y, et al. A differentially private federated learning model against poisoning attacks in edge computing[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 20(3): 1941-1958.
[19] Li G, Wu J, Li S, et al. Multitentacle federated learning over software-defined industrial internet of things against adaptive poisoning attacks[J]. IEEE Transactions on Industrial Informatics, 2022, 19(2): 1260-1269.
[20] Majeed U, Hong C S. FLchain: Federated learning via MEC-enabled blockchain network[C]//2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2019: 1-4.
[21] Kim Y J, Hong C S. Blockchain-based node-aware dynamic weighting methods for improving federated learning performance[C]//2019 20th Asia-pacific network operations and management symposium (APNOMS). IEEE, 2019: 1-4.
[22] Qammar A, Karim A, Ning H, et al. Securing federated learning with blockchain: a systematic literature review[J]. Artificial Intelligence Review, 2023, 56(5): 3951-3985.
[23] SUN R, LI C, WANG W, et al. Research progress of blockchainbased federated learning[J]. Journal of Computer Applications, 2022, 42(11): 3413.
[24] Sun Rui, Li Chao, Wang Wei, et al. Progress in blockchain-based federal learning research [J]. Computer Applications, 2022,42 (11): 3413-3420.
[25] Miao Y, Liu Z, Li H, et al. Privacy-preserving Byzantine-robust federated learning via blockchain systems[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 2848-2861.
[26] Shayan M, Fung C, Yoon C J M, et al. Biscotti: A blockchain system for private and secure federated learning[J]. IEEE Transactions on Parallel and Distributed Systems, 2020, 32(7): 1513-1525.
[27] Chillotti I, Gama N, Georgieva M, et al. TFHE: fast fully homomorphic encryption over the torus[J]. Journal of Cryptology, 2020, 33(1): 34-91.
[28] Chowdhury S, Sinha S, Singh A, et al. Efficient threshold FHE with application to real-time systems[J]. Cryptology ePrint Archive, 2022.
[29] Zu J, Xu F, Jin T, et al. Reward and Punishment Mechanism with weighting enhances cooperation in evolutionary games[J]. Physica A: Statistical Mechanics and its Applications, 2022, 607: 128165 .
Downloads: | 38553 |
---|---|
Visits: | 697909 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Journal of Artificial Intelligence Practice
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks