InvisibleFL: Federated Learning over Non-Informative Intermediate Updates against Multimedia Privacy Leakages
Autor: | Chao Wu, Fan Yang, Wenwu Zhu, Xinglin Pan, Qiushi Li, Yaoxue Zhang, Yuezhi Zhou |
---|---|
Rok vydání: | 2020 |
Předmět: |
Scheme (programming language)
Multimedia business.industry Computer science Aggregate (data warehouse) Cloud computing Statistical model 02 engineering and technology Encryption computer.software_genre 020204 information systems Server Ciphertext 0202 electrical engineering electronic engineering information engineering 020201 artificial intelligence & image processing Enhanced Data Rates for GSM Evolution business computer computer.programming_language |
Zdroj: | ACM Multimedia |
DOI: | 10.1145/3394171.3413923 |
Popis: | In cloud and edge networks, federated learning involves training statistical models over decentralized data, where servers aggregate models through intermediate updates trained from clients. By utilizing private and local data it improves quality of personalized services and reduces user's concern for privacy. However, federated learning still leaks multimedia features through trained intermediate updates and thereby is not privacy-preserving for multimedia. Existing techniques applied from secure community attempt to avoid multimedia features leakages for federated learning but yet cannot address issues of privacy. In this paper, we propose a privacy-preserving solution that avoids multimedia privacy leakages in federated learning. Firstly, we devise a novel encryption scheme called Non-Informative Transformation (NIT) for federated aggregation to eliminates residual multimedia features in intermediate updates. Based on the scheme, we then propose Just-Learn-over-Ciphertext (JLoC) mechanism for federated learning, which includes three stages in each model iteration. The Encrypt stage encrypts intermediate updates and makes it non-informative distribution at clients. The Aggregate stage performs model aggregation without decryption at servers. Specifically, this stage just computes over ciphertext, and its output of aggregation also keeps non-informative. The Decrypt stage converts non-informative outputs of aggregation to available parameters for the next iteration at clients. Moreover, we implement a prototype and conduct experiments to evaluate its privacy and performance on real devices. The experimental results demonstrate that our methods can defend against potential attacks for multimedia privacy leakages without accuracy loss in commercial off-the-shelf products. |
Databáze: | OpenAIRE |
Externí odkaz: |