Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Survey Report on Partially Homomorphic Encryption Techniques in Cloud Computing
International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 2 Issue 12, December - 2013 A Survey Report On Partially Homomorphic Encryption Techniques In Cloud Computing 1. S. Ramachandram 2. R.Sridevi 3. P. Srivani 1. Professor &Vice Principal, Oucollege Of Engineering,Dept Of Cse,Hyd 2. Associate Professor, Jntuh, Dept Of Cse,Hyd 3. Research Scholar & Asso.Prof., Det Of Cse, Hitam, Hyd Abstract: Homomorphic encryption is a used to create secure voting systems, form of encryption which allows specific collision-resistant hash functions, private types of computations to be carried out on information retrieval schemes and enable cipher text and obtain an encrypted result widespread use of cloud computing by which decrypted matches the result of ensuring the confidentiality of processed operations performed on the plaintext. As data. cloud computing provides different services, homomorphic encryption techniques can be There are several efficient, partially used to achieve security. In this paper , We homomorphic cryptosystems. Although a presented the partially homomorphic cryptosystem which is unintentionally encryption techniques. homomorphic can be subject to attacks on this basis, if treated carefully, Keywords: Homomorphic, ElGamal, Pailler, homomorphism can also be used to perform RSA, Goldwasser–Micali , Benaloh, computations securely. Section 2 describes Okamoto Uchiyama cryptosystemIJERT, IJERTabout the partially homomorphic encryption Naccache–Stern cryptosystem, RNS. techniques. 2. Partially Homomorphic Encryption Techniques 1. INTRODUCTION RSA Security is a desirable feature in modern system architectures. Homomorphic In cryptography, RSA[1] is an asymmetric encryption would allow the chaining encryption system. If the RSA public key is together of different services without modulus and exponent , then the exposing the data to each of those services. -
Explainable Federated Learning for Taxi Travel Time Prediction
Explainable Federated Learning for Taxi Travel Time Prediction Jelena Fiosina a Institute of Informatics, Clausthal Technical University, Julius-Albert Str. 4, D-38678, Clausthal-Zellerfeld, Germany Keywords: FCD Trajectories, Traffic, Travel Time Prediction, Federated Learning, Explainability. Abstract: Transportation data are geographically scattered across different places, detectors, companies, or organisations and cannot be easily integrated under data privacy and related regulations. The federated learning approach helps process these data in a distributed manner, considering privacy concerns. The federated learning archi- tecture is based mainly on deep learning, which is often more accurate than other machine learning models. However, deep-learning-based models are intransparent unexplainable black-box models, which should be explained for both users and developers. Despite the fact that extensive studies have been carried out on investigation of various model explanation methods, not enough solutions for explaining federated models exist. We propose an explainable horizontal federated learning approach, which enables processing of the dis- tributed data while adhering to their privacy, and investigate how state-of-the-art model explanation methods can explain it. We demonstrate this approach for predicting travel time on real-world floating car data from Brunswick, Germany. The proposed approach is general and can be applied for processing data in a federated manner for other prediction and classification tasks. 1 INTRODUCTION transparent. This feature of AI-driven systems com- plicates the user acceptance and can be troublesome Most real-world data are geographically scattered even for model developers. across different places, companies, or organisations, Therefore, the contemporary AI technologies and, unfortunately, cannot be easily integrated under should be capable of processing these data in a de- data privacy and related regulations. -
Exploiting Shared Representations for Personalized Federated Learning
Exploiting Shared Representations for Personalized Federated Learning Liam Collins 1 Hamed Hassani 2 Aryan Mokhtari 1 Sanjay Shakkottai 1 Abstract effective models for each client by leveraging the local com- putational power, memory, and data of all clients (McMahan Deep neural networks have shown the ability to et al., 2017). The task of coordinating between the clients extract universal feature representations from data is fulfilled by a central server that combines the models such as images and text that have been useful received from the clients at each round and broadcasts the for a variety of learning tasks. However, the updated information to them. Importantly, the server and fruits of representation learning have yet to be clients are restricted to methods that satisfy communica- fully-realized in federated settings. Although data tion and privacy constraints, preventing them from directly in federated settings is often non-i.i.d. across applying centralized techniques. clients, the success of centralized deep learning suggests that data often shares a global feature However, one of the most important challenges in federated representation, while the statistical heterogene- learning is the issue of data heterogeneity, where the under- ity across clients or tasks is concentrated in the lying data distribution of client tasks could be substantially labels. Based on this intuition, we propose a different from each other. In such settings, if the server novel federated learning framework and algorithm and clients learn a single shared model (e.g., by minimizing for learning a shared data representation across average loss), the resulting model could perform poorly for clients and unique local heads for each client. -
Architectural Patterns for the Design of Federated Learning Systems
Architectural Patterns for the Design of Federated Learning Systems a,b < a,b a,b b a,b a Sin Kit Lo , , Qinghua Lu , Liming Zhu , Hye-Young Paik , Xiwei Xu and Chen Wang aData61, CSIRO, Australia bUniversity of New South Wales, Australia ARTICLEINFO ABSTRACT Federated learning has received fast-growing interests from academia and industry to tackle the chal- Keywords: lenges of data hungriness and privacy in machine learning. A federated learning system can be viewed as a large-scale distributed system with different components and stakeholders as numerous client de- Federated Learning vices participate in federated learning. Designing a federated learning system requires software system design thinking apart from the machine learning knowledge. Although much effort has been put into Pattern federated learning from the machine learning technique aspects, the software architecture design con- Software Architecture cerns in building federated learning systems have been largely ignored. Therefore, in this paper, we present a collection of architectural patterns to deal with the design challenges of federated learning Machine Learning systems. Architectural patterns present reusable solutions to a commonly occurring problem within a Artificial Intelligence given context during software architecture design. The presented patterns are based on the results of a systematic literature review and include three client management patterns, four model management patterns, three model training patterns, and four model aggregation patterns. The patterns are asso- ciated to the particular state transitions in a federated learning model lifecycle, serving as a guidance for effective use of the patterns in the design of federated learning systems. Central Model 1. Introduction Server aggregation Federated Learning Overview The ever-growing use of big data systems, industrial-scale IoT platforms, and smart devices contribute to the exponen- tial growth in data dimensions [30]. -
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data
This paper is a slight variant of the Extended Abstract that appears in the Proceedings of the 22nd Information Security Conference, ISC 2019 (September 16–18, New-York, USA) Springer-Verlag, LNCS ?????, pages ???–???. Decentralized Evaluation of Quadratic Polynomials on Encrypted Data Chloé Hébant1,2, Duong Hieu Phan3, and David Pointcheval1,2 1 DIENS, École normale supérieure, CNRS, PSL University, Paris, France 2 INRIA, Paris, France 3 Université de Limoges, France Abstract Since the seminal paper on Fully Homomorphic Encryption (FHE) by Gentry in 2009, a lot of work and improvements have been proposed, with an amazing number of possible applications. It allows outsourcing any kind of computations on encrypted data, and thus without leaking any information to the provider who performs the computations. This is quite useful for many sensitive data (finance, medical, etc.). Unfortunately, FHE fails at providing some computation on private inputs to a third party, in cleartext: the user that can decrypt the result is able to decrypt the inputs. A classical approach to allow limited decryption power is distributed decryption. But none of the actual FHE schemes allows distributed decryption, at least with an efficient protocol. In this paper, we revisit the Boneh-Goh-Nissim (BGN) cryptosystem, and the Freeman’s variant, that allow evaluation of quadratic polynomials, or any 2-DNF formula. Whereas the BGN scheme relies on integer factoring for the trapdoor in the composite-order group, and thus possesses one public/secret key only, the Freeman’s scheme can handle multiple users with one general setup that just needs to define a pairing-based algebraic structure. -
A Survey on Federated Learning and Its Applications for Accelerating Industrial Internet of Things
A Survey on Federated Learning and its Applications for Accelerating Industrial Internet of Things Jiehan Zhou Shouhua Zhang Qinghua Lu [email protected] [email protected] [email protected] University of Oulu University of Oulu CSIRO, Data61 13 Garden Street Eveleigh SYDNEY Wenbin Dai Min Chen Xin Liu [email protected] [email protected] [email protected] Shanghai Jiao Tong University Huazhong Univ. of Science China University of and Technology, China Petroleum Huadong Susanna Pirttikangas Yang Shi Weishan Zhang [email protected] [email protected] [email protected] University of Oulu University of Victoria China University of Petroleum Huadong - Qingdao Campus Enrique Herrera-Viedma [email protected] (IoT) is being widely applied in mobile services. There are few Abstract—Federated learning (FL) brings collaborative reports on applying large-scale data and deep learning (DL) to intelligence into industries without centralized training data to implement large-scale enterprise intelligence. One of the accelerate the process of Industry 4.0 on the edge computing level. reasons is lack of machine learning (ML) approaches which can FL solves the dilemma in which enterprises wish to make the use make distributed learning available while not infringing the of data intelligence with security concerns. To accelerate user’s data privacy. Clearly, FL trains a model by enabling the industrial Internet of things with the further leverage of FL, existing achievements on FL are developed from three aspects: 1) individual devices to act as local learners and send local model define terminologies and elaborate a general framework of FL for parameters to a federal server (defined in section 2) instead of accommodating various scenarios; 2) discuss the state-of-the-art training data. -
A Federated Learning Framework for On-Device Anomaly Data Detection
Federated Learning for Internet of Things Tuo Zhang*, Chaoyang He*, Tianhao Ma, Lei Gao, Mark Ma, Salman Avestimehr Univerisity of Southern California Los Angeles, California, USA ABSTRACT anomaly-detection-based intrusion detection in IoT devices. IoTDe- Federated learning can be a promising solution for enabling IoT fender [2] is another similar framework but obtains a personalized cybersecurity (i.e., anomaly detection in the IoT environment) model by fine-tuning the global model trained with FL.[4] evaluates while preserving data privacy and mitigating the high communica- FL-based anomaly detection framework with learning tasks such tion/storage overhead (e.g., high-frequency data from time-series as aggressive driving detection and human activity recognition. [8] sensors) of centralized over-the-cloud approaches. In this paper, to further proposes an attention-based CNN-LSTM model to detect further push forward this direction with a comprehensive study anomalies in an FL manner, and reduces the communication cost in both algorithm and system design, we build FedIoT platform by using Top-: gradient compression. Recently, [15] even evaluates that contains FedDetect algorithm for on-device anomaly data the impact of malicious clients under the setting of FL-based anom- detection and a system design for realistic evaluation of federated aly detection. However, these works do not evaluate the efficacy learning on IoT devices. Furthermore, the proposed FedDetect of FL in a wide range of attack types and lack system design and learning framework improves the performance by utilizing a local performance analysis in a real IoT platform. adaptive optimizer (e.g., Adam) and a cross-round learning rate To further push forward the research in FL-based IoT cybersecu- scheduler. -
Fundamentals of Fully Homomorphic Encryption – a Survey
Electronic Colloquium on Computational Complexity, Report No. 125 (2018) Fundamentals of Fully Homomorphic Encryption { A Survey Zvika Brakerski∗ Abstract A homomorphic encryption scheme is one that allows computing on encrypted data without decrypting it first. In fully homomorphic encryption it is possible to apply any efficiently com- putable function to encrypted data. We provide a survey on the origins, definitions, properties, constructions and uses of fully homomorphic encryption. 1 Homomorphic Encryption: Good, Bad or Ugly? In the seminal RSA cryptosystem [RSA78], the public key consists of a product of two primes ∗ N = p · q as well as an integer e, and the message space is the set of elements in ZN . Encrypting a message m involved simply raising it to the power e and taking the result modulo N, i.e. c = me (mod N). For the purpose of the current discussion we ignore the decryption process. It is not hard to see that the product of two ciphertexts c1 and c2 encrypting messages m1 and m2 allows e to compute the value c1 · c2 (mod N) = (m1m2) (mod N), i.e. to compute an encryption of m1 · m2 without knowledge of the secret private key. Rabin's cryptosystem [Rab79] exhibited similar behavior, where a product of ciphertexts corresponded to an encryption of their respective plaintexts. This behavior can be expressed in formal terms by saying that the ciphertext space and the plaintext space are homomorphic (multiplicative) groups. The decryption process defines the homomorphism by mapping a ciphertext to its image plaintext. Rivest, Adleman and Dertouzos [RAD78] realized the potential advantage of this property. -
Selective Federated Transfer Learning Using Representation Similarity
Selective Federated Transfer Learning using Representation Similarity Tushar Semwal1, Haofan Wang2, Chinnakotla Krishna Teja Reddy3 { 1The University of Edinburgh, 2Carnegie Mellon University, 3GE Healthcare, 1;2;3OpenMined} { [email protected], 2 [email protected], [email protected] } Abstract Transfer Learning (TL) has achieved significant developments in the past few years. However, the majority of work on TL assume implicit access to both the target and source datasets, which limits its application in the context of Federated Learning (FL), where target (client) datasets are usually not directly accessible. In this paper, we address the problem of source model selection in TL for federated scenarios. We propose a simple framework, called Selective Federated Transfer Learning (SFTL), to select the best pre-trained models which provide a positive performance gain when their parameters are transferred on to a new task. We leverage the concepts from representation similarity to compare the similarity of the client model and the source models and provide a method which could be augmented to existing FL algorithms to improve both the communication cost and the accuracy of client models. 1 Introduction The conventional deep learning (DL) approaches involve first collecting data (for instance, images or text) from various sources such as smartphones, and storage devices, and then training a Deep Neural Network (DNN) using this centrally aggregated data. Though this centralised form of architecture is relatively practical to implement and provides full control, the act of gathering data in third-party private servers raises serious privacy concerns. Further, with the Internet of Things (IoT) entering a new era of development, International Data Corporation is estimating a total of 41.6 billion connected IoT devices generating 79.4 zettabytes of data in 2025 [1]. -
ASSIST-Iot Technical Report #2
This project has received funding from the European’s Union Horizon 2020 research innovation programme under Grant Agreement No. 957258 Architecture for Scalable, Self-*, human-centric, Intelligent, Secure, and Tactile next generation IoT ASSIST-IoT Technical Report #2 Sunday-FL – Developing Open Source Platform for Federated Learning Piotr Niedziela, Anastasiya Danilenka, Dominik Kolasa, Maria Ganzha, Marcin Paprzycki, Kumar Nalinaksh 2021 Emerging Trends in Industry 4.0 (ETI 4.0) Sunday-FL – Developing Open Source Platform for Federated Learning Piotr Niedziela, Anastasiya Danilenka, Maria Ganzha, Marcin Paprzycki Kumar Nalinaksh Dominik Kolasa Systems Research Institute Institute of Management and Department of Mathematics and Information Science Polish Academy of Sciences Technical Sciences Warsaw University of Technology fi[email protected] Warsaw Management University Abstract—Since its inception, in approximately 2017, federated The latter should be understood as follows. While it is possible learning became an area of intensive research. Obviously, such that computing takes place within a network of workstations, research requires tools that can be used for experimentation. loosely connected using PVM [4], or Condor middleware [5], Here, the biggest industrial players proposed their own platforms, but these platforms are anchored in tools that they “promote”. all nodes havw a single owner and should be treated jointly Moreover, they are mainly “all-in-one” solutions, aimed at as a part of single “virtual computer”. facilitating the federate learning process, rather than supporting Keeping this in mind, let us reflect on changes that took research “about it”. Taking this into account, we have decided place within last few years (and are still ongoing). -
Efficient and Less Centralized Federated Learning
Efficient and Less Centralized Federated Learning Li Chou?, Zichang Liu? ( ), Zhuang Wang, and Anshumali Shrivastava Department of Computer Science Rice University, Houston TX, USA flchou,zl71,zw50,[email protected] Abstract. With the rapid growth in mobile computing, massive amounts of data and computing resources are now located at the edge. To this end, Federated learning (FL) is becoming a widely adopted distributed machine learning (ML) paradigm, which aims to harness this expanding skewed data locally in order to develop rich and informative models. In centralized FL, a collection of devices collaboratively solve a ML task under the coordination of a central server. However, existing FL frame- works make an over-simplistic assumption about network connectivity and ignore the communication bandwidth of the different links in the network. In this paper, we present and study a novel FL algorithm, in which devices mostly collaborate with other devices in a pairwise man- ner. Our nonparametric approach is able to exploit network topology to reduce communication bottlenecks. We evaluate our approach on various FL benchmarks and demonstrate that our method achieves 10× better communication efficiency and around 8% increase in accuracy compared to the centralized approach. Keywords: Machine Learning · Federated Learning · Distributed Sys- tems. 1 Introduction The rapid growth in mobile computing on edge devices, such as smartphones and tablets, has led to a significant increase in the availability of distributed computing resources and data sources. These devices are equipped with ever more powerful sensors, higher computing power, and storage capability, which is contributing to the next wave of massive data in a decentralized manner. -
Homomorphic Encryption Applied to the Cloud Computing Security
Proceedings of the World Congress on Engineering 2012 Vol I WCE 2012, July 4 - 6, 2012, London, U.K. Homomorphic Encryption Applied to the Cloud Computing Security Maha TEBAA, Saïd EL HAJJI, Abdellatif EL GHAZI Abstract—Cloud computing security challenges and it’s also In Section II, we are introducing the concept of Cloud an issue to many researchers; first priority was to focus on Computing and the necessity to adopt Homomorphic security which is the biggest concern of organizations that are Encryption to secure the calculation of data hosted by the considering a move to the cloud. The advantages of cloud Cloud provider. In section III, we’ll define Homomorphic computing include reduced costs, easy maintenance and re- provisioning of resources, and thereby increased profits. But Encryption and we’ll illustrate some examples of existing the adoption and the passage to the Cloud Computing applies Homomorphic cryptosystems. In section IV, we’ll present only if the security is ensured. How to guaranty a better data our scheme and our implementation. The conclusion and security and also how can we keep the client private perspectives will be mentioned in section V. information confidential? There are two major questions that present a challenge to Cloud Computing providers. When the data transferred to the Cloud we use standard encryption methods to secure the operations and the storage of II. Cloud computing the data. But to process data located on a remote server, the Definition [1]: By cloud computing we mean: The Cloud providers need to access the raw data. In this paper we Information Technology (IT) model for computing, which is are proposing an application of a method to execute operations composed of all the IT components (hardware, software, on encrypted data without decrypting them which will provide networking, and services) that are necessary to enable us with the same results after calculations as if we have worked development and delivery of cloud services via the Internet directly on the raw data.