Education, Science, Technology, Innovation and Life
Open Access
Sign In

Privacy-Preserving Federated Learning Secure Aggregation Strategy Based on Permissioned Blockchain

Download as PDF

DOI: 10.23977/acss.2025.090113 | Downloads: 17 | Views: 563

Author(s)

Wang Chenyi 1, Wang Zhe 1, He Jiekai 1

Affiliation(s)

1 School of Artificial Intelligence, Guangxi Minzu University, Nanning, 530006, China

Corresponding Author

Wang Chenyi

ABSTRACT

In order to solve the problems of privacy-preserving federated learning in which the poisoning behaviour of client nodes as well as the malicious aggregation behaviour of aggregation server nodes lead to the failure of model training, a secure aggregation privacy-preserving federated learning strategy based on permissioned blockchain is proposed. In order to solve the problem of malicious behavior of aggregation server nodes, a trusted aggregation server node selection algorithm is designed to cancel the right of nodes with malicious aggregation behavior to participate in the aggregation server node election. Each node establishes a reputation value, proposes a reward and punishment algorithm based on the reputation value, and establishes a threshold, and nodes with a reputation value lower than the threshold will be refused to participate in the federated learning process to reduce the threat of client node poisoning attack behaviour on model learning.The experimental results show that the scheme is able to ensure secure model aggregation and achieve high model correctness in the presence of malicious aggregation behaviour at 50% of the nodes and poisoning attacks at 40% of the nodes.

KEYWORDS

Blockchain; federated learning; privacy protection; secure aggregation

CITE THIS PAPER

Wang Chenyi, Wang Zhe, He Jiekai, Privacy-Preserving Federated Learning Secure Aggregation Strategy Based on Permissioned Blockchain. Advances in Computer, Signals and Systems (2025) Vol. 9: 84-99. DOI: http://dx.doi.org/10.23977/acss.2025.090113.

REFERENCES

[1] Xiao X, Tang Z, Xiao B. A survey on privacy and security issues in federated learning[J]. Chin. J. Comput, 2023, 46(5): 1019-1044.
[2] Xiao Xiong, Tang Zhuo, Xiao Bin, et al. Review of Privacy Protection and Security Defense Research in Federal Learning [J]. Journal of Computer Science, 2023,46 (05): 1019-1044.
[3] Kairouz P, McMahan H B, Avent B, et al. Advances and open problems in federated learning[J]. Foundations and Trends® in Machine Learning, 2021, 14(1–2): 1-210.
[4] Liu YX, Chen H, Liu YH, Li CP. Privacy-preserving Techniques in Federated Learning[J]. Journal of Software, 2022, 33(3): 1057-1092.
[5] Liu Yixuan, Chen Hong, Liu Yuhan, Li Cuiping. Privacy Technology in federated Learning [J]. Journal of Software, 2022,33 (3): 1057-1092.
[6] Li T, Sahu A K, Talwalkar A, et al. Federated learning: Challenges, methods, and future directions[J]. IEEE signal processing magazine, 2020, 37(3): 50-60.
[7] Zang XL ,Luo WH.Implementing Federated Learning Intrusion Detection Using Dynamic Clipping Differential Privacy[J]. Journal of Chinese Computer Systems. 2024, 45(6): 1474-1481.
[8] Zhang Xiaolong, Luo Wenhua. Implement federated learning intrusion detection using dynamic trimmed differential privacy [J]. Small microcomputer system. 2024,45(6):1474-1481.
[9] Fung C, Yoon C J M, Beschastnikh I. Mitigating sybils in federated learning poisoning[J]. arXiv preprint arXiv:1808.04866, 2018.
[10] Tolpegin V, Truex S, Gursoy M E, et al. Data poisoning attacks against federated learning systems[C]//Computer security–ESORICs 2020: 25th European symposium on research in computer security, ESORICs 2020, guildford, UK, September 14–18, 2020, proceedings, part i 25. Springer International Publishing, 2020: 480-501.
[11] Dong C, Weng J, Li M, et al. Privacy-preserving and byzantine-robust federated learning[J]. IEEETransactions on Dependable and Secure Computing, 2023, 21(2): 889-904. 
[12] Blanchard P, El Mhamdi E M, Guerraoui R, et al. Machine learning with adversaries: Byzantine tolerant gradient descent[J]. Advances in neural information processing systems, 2017, 30.
[13] Yin D, Chen Y, Kannan R, et al. Byzantine-robust distributed learning: Towards optimal statistical rates[C]//International conference on machine learning. Pmlr, 2018: 5650-5659.
[14] Guerraoui R, Rouault S. The hidden vulnerability of distributed learning in byzantium[C]//International Conference on Machine Learning. PMLR, 2018: 3521-3530.
[15] Shen S, Tople S, Saxena P. Auror: Defending against poisoning attacks in collaborative deep learning systems[C]//Proceedings of the 32nd annual conference on computer security applications. 2016: 508-519.
[16] Liu X, Li H, Xu G, et al. Privacy-enhanced federated learning against poisoning adversaries[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 4574-4588.
[17] Ma Z, Ma J, Miao Y, et al. ShieldFL: Mitigating model poisoning attacks in privacy-preserving federated learning[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 1639-1654.
[18] Zhou J, Wu N, Wang Y, et al. A differentially private federated learning model against poisoning attacks in edge computing[J]. IEEE Transactions on Dependable and Secure Computing, 2022, 20(3): 1941-1958.
[19] Li G, Wu J, Li S, et al. Multitentacle federated learning over software-defined industrial internet of things against adaptive poisoning attacks[J]. IEEE Transactions on Industrial Informatics, 2022, 19(2): 1260-1269.
[20] Majeed U, Hong C S. FLchain: Federated learning via MEC-enabled blockchain network[C]//2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2019: 1-4.
[21] Kim Y J, Hong C S. Blockchain-based node-aware dynamic weighting methods for improving federated learning performance[C]//2019 20th Asia-pacific network operations and management symposium (APNOMS). IEEE, 2019: 1-4.
[22] Qammar A, Karim A, Ning H, et al. Securing federated learning with blockchain: a systematic literature review[J]. Artificial Intelligence Review, 2023, 56(5): 3951-3985.
[23] SUN R, LI C, WANG W, et al. Research progress of blockchainbased federated learning[J]. Journal of Computer Applications, 2022, 42(11): 3413.
[24] Sun Rui, Li Chao, Wang Wei, et al. Progress in blockchain-based federal learning research [J]. Computer Applications, 2022,42 (11): 3413-3420.
[25] Miao Y, Liu Z, Li H, et al. Privacy-preserving Byzantine-robust federated learning via blockchain systems[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 2848-2861.
[26] Shayan M, Fung C, Yoon C J M, et al. Biscotti: A blockchain system for private and secure federated learning[J]. IEEE Transactions on Parallel and Distributed Systems, 2020, 32(7): 1513-1525.
[27] Chillotti I, Gama N, Georgieva M, et al. TFHE: fast fully homomorphic encryption over the torus[J]. Journal of Cryptology, 2020, 33(1): 34-91. 
[28] Chowdhury S, Sinha S, Singh A, et al. Efficient threshold FHE with application to real-time systems[J]. Cryptology ePrint Archive, 2022.
[29] Zu J, Xu F, Jin T, et al. Reward and Punishment Mechanism with weighting enhances cooperation in evolutionary games[J]. Physica A: Statistical Mechanics and its Applications, 2022, 607: 128165 .

Downloads: 38553
Visits: 697909

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.