Abstract
Clinical trials and drug discovery would not be effective without the collaboration of institutions. Earlier, it has been at the cost of individual’s privacy. Several pacts and compliances have been enforced to avoid data breaches. The existing schemes collect the participant’s data to a central repository for learning predictions as the collaboration is indispensable for research advances. The current COVID pandemic has put a question mark on our existing setup where the existing data repository has proved to be obsolete. There is a need for contemporary data collection, processing, and learning. The smartphones and devices held by the last person of the society have also made them a potential contributor. It demands to design a distributed and decentralized Collaborative Learning system that would make the knowledge inference from every data point. Federated Learning [21], proposed by Google, brings the concept of in-place model training by keeping the data intact to the device. Though it is privacy-preserving in nature, however, it is susceptible to inference, poisoning, and Sybil attacks. Blockchain is a decentralized programming paradigm that provides a broader control of the system, making it attack resistant. It poses challenges of high computing power, storage, and latency. These emerging technologies can contribute to the desired learning system and motivate them to address their security and efficiency issues. This article systematizes the security issues in Federated Learning, its corresponding mitigation strategies, and Blockchain’s challenges. Further, a Blockchain-based Federated Learning architecture with two layers of participation is presented, which improves the global model accuracy and guarantees participant’s privacy. It leverages the channel mechanism of Blockchain for parallel model training and distribution. It facilitates establishing decentralized trust between the participants and the gateways using the Blockchain, which helps to have only honest participants.
- Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, and William J. Buchanan. 2020. A distributed trust framework for privacy-preserving machine learning. Retrieved from https://arXiv:2006.02456.Google Scholar
- Marco Barreno, Blaine Nelson, Anthony D. Joseph, and J. Doug Tygar. 2010. The security of machine learning. Mach. Learn. 81, 2 (2010), 121–148. Google Scholar
Digital Library
- Peva Blanchard, El Mahdi El Mhamdi, Rachid Guerraoui, and Julien Stainer. 2017. Machine learning with adversaries: Byzantine tolerant gradient descent. In Proceedings of the 31st International Conference on Neural Information Processing Systems (NIPS’17). Curran Associates, Red Hook, NY, 118–128. Google Scholar
Digital Library
- Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, and Karn Seth. 2016. Practical secure aggregation for federated learning on user-held data. Retrieved from http://arxiv.org/abs/1611.04482.Google Scholar
- Theodora S. Brisimi, Ruidi Chen, Theofanie Mela, Alex Olshevsky, Ioannis Ch Paschalidis, and Wei Shi. 2018. Federated learning of predictive models from federated electronic health records. Int. J. Med. Info. 112 (2018), 59–67.Google Scholar
Cross Ref
- Jan Camenisch and Anna Lysyanskaya. 2003. A signature scheme with efficient protocols. In Security in Communication Networks, Stelvio Cimato, Giuseppe Persiano, and Clemente Galdi (Eds.). Springer, Berlin, 268–289. Google Scholar
Digital Library
- Jianmin Chen, Rajat Monga, Samy Bengio, and Rafal Józefowicz. 2016. Revisiting distributed synchronous SGD. Retrieved from http://arxiv.org/abs/1604.00981.Google Scholar
- Yiqiang Chen, Xin Qin, Jindong Wang, Chaohui Yu, and Wen Gao. 2020. Fedhealth: A federated transfer learning framework for wearable healthcare. IEEE Intell. Syst. 35, 4 (2020), 83–93. https://doi.org/10.1109/MIS.2020.2988604Google Scholar
Cross Ref
- Cynthia Dwork. 2010. Differential privacy in new settings. In Proceedings of the 21st Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, 174–183. Google Scholar
Digital Library
- Clement Fung, Chris J. M. Yoon, and Ivan Beschastnikh. 2018. Mitigating sybils in federated learning poisoning. Retrieved from https://arXiv:1808.04866.Google Scholar
- Briland Hitaj, Giuseppe Ateniese, and Fernando Perez-Cruz. 2017. Deep models under the GAN: Information leakage from collaborative deep learning. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 603–618. Google Scholar
Digital Library
- Jiawen Kang, Zehui Xiong, Dusit Niyato, Shengli Xie, and Junshan Zhang. 2019. Incentive mechanism for reliable federated learning: A joint optimization approach to combining reputation and contract theory. IEEE Internet Things J. 6, 6 (2019), 10700–10714.Google Scholar
Cross Ref
- Hyesung Kim, Jihong Park, Mehdi Bennis, and Seong-Lyun Kim. 2019. Blockchained on-device federated learning. IEEE Commun. Lett. 24, 6 (2019), 1279–1283.Google Scholar
Cross Ref
- Santosh Kumar, Sanjay Kumar Singh, Amit Kumar Singh, Shrikant Tiwari, and Ravi Shankar Singh. 2018. Privacy-preserving security using biometrics in cloud computing. Multimedia Tools Appl. 77, 9 (May 2018), 11017–11039. DOI:https://doi.org/10.1007/s11042-017-4966-5 Google Scholar
Digital Library
- Dianbo Liu, Timothy Miller, Raheel Sayeed, and Kenneth D. Mandl. 2018. Fadl: Federated-autonomous deep learning for distributed electronic health record. Retrieved from https://arXiv:1811.11400.Google Scholar
- Songtao Lu, Yawen Zhang, Yunlong Wang, and Christina Mack. 2019. Learn electronic health records by fully decentralized federated learning. Retrieved from https://arXiv:1912.01792.Google Scholar
- Yunlong Lu, Xiaohong Huang, Yueyue Dai, Sabita Maharjan, and Yan Zhang. 2019. Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Trans. Industr. Info. 16, 6 (2019), 4177–4186.Google Scholar
Cross Ref
- Chuan Ma, Jun Li, Ming Ding, Howard H. Yang, Feng Shu, Tony Q. S. Quek, and H. Vincent Poor. 2020. On safeguarding privacy and security in the framework of federated learning. IEEE Netw. 34, 4 (2020), 242–248. DOI:10.1109/MNET.001.1900506Google Scholar
Cross Ref
- Jonathan Magen Numhauser. 2012. Fog computing introduction to a new cloud evolution. In Proceedings from the Cies III Congress on Information Security and Cryptology. 111–126. Google Scholar
- Umer Majeed and Choong Seon Hong. 2019. FLchain: Federated learning via MEC-enabled blockchain network. In Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium (APNOMS’19). IEEE, 1–4.Google Scholar
Cross Ref
- H. Brendan McMahan, Eider Moore, Daniel Ramage, and Blaise Agüera y Arcas. 2016. Federated learning of deep networks using model averaging. Retrieved from http://arxiv.org/abs/1602.05629.Google Scholar
- Luca Melis, Congzheng Song, Emiliano De Cristofaro, and Vitaly Shmatikov. 2018. Inference attacks against collaborative learning. Retrieved from http://arxiv.org/abs/1805.04049.Google Scholar
- Milad Nasr, Reza Shokri, and Amir Houmansadr. 2018. Comprehensive privacy analysis of deep learning: Stand-alone and federated learning under passive and active white-box inference attacks. Retrieved from https://arXiv:1812.00910.Google Scholar
- Zonyin Shae and Jeffrey Tsai. 2018. Transform blockchain into distributed parallel computing architecture for precision medicine. In Proceedings of the IEEE 38th International Conference on Distributed Computing Systems (ICDCS’18). IEEE, 1290–1299.Google Scholar
Cross Ref
- Ohad Shamir, Nati Srebro, and Tong Zhang. 2014. Communication-efficient distributed optimization using an approximate newton-type method. In Proceedings of the International Conference on Machine Learning. 1000–1008. Google Scholar
Digital Library
- Reza Shokri and Vitaly Shmatikov. 2015. Privacy-preserving deep learning. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS’15). Association for Computing Machinery, New York, NY, 1310–1321. DOI:https://doi.org/10.1145/2810103.2813687 Google Scholar
Digital Library
- Okeke Stephen, Mangal Sain, Uchenna Joseph Maduh, and Do-Un Jeong. 2019. An efficient deep learning approach to pneumonia classification in healthcare. J. Healthcare Eng. 2019, Article 4180949 (2019), 7 pages. DOI: https://doi.org/10.1155/2019/4180949Google Scholar
- Praneeth Vepakomma, Otkrist Gupta, Tristan Swedish, and Ramesh Raskar. 2018. Split learning for health: Distributed deep learning without sharing raw patient data. Retrieved from http://arxiv.org/abs/1812.00564.Google Scholar
- Fengwei Wang, Hui Zhu, Ximeng Liu, Rongxing Lu, Jiafeng Hua, Hui Li, and Hao Li. 2019. Privacy-preserving collaborative model learning scheme for E-healthcare. IEEE Access 7 (2019), 166054–166065.Google Scholar
Cross Ref
- Jiasi Weng, Jian Weng, Jilian Zhang, Ming Li, Yue Zhang, and Weiqi Luo. 2019. Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Trans. Depend. Secure Comput. 1 (2019), 1–1. DOI:10.1109/TDSC.2019.2952332Google Scholar
Digital Library
- Guowen Xu, Hongwei Li, Sen Liu, Kan Yang, and Xiaodong Lin. 2019. Verifynet: Secure and verifiable federated learning. IEEE Trans. Info. Forensics Secur. 15 (2019), 911–926.Google Scholar
Digital Library
- Jie Xu and Fei Wang. 2019. Federated learning for healthcare informatics. Retrieved from https://arXiv:1911.06270.Google Scholar
- Qiang Yang, Yang Liu, Tianjian Chen, and Yongxin Tong. 2019. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. 10, 2 (2019), 1–19. Google Scholar
Digital Library
- Andrew Chi-Chih Yao. 1986. How to generate and exchange secrets. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science (SFCS’86). IEEE, 162–167. Google Scholar
Digital Library
- Dong Yin, Yudong Chen, Kannan Ramchandran, and Peter L. Bartlett. 2018. Byzantine-robust distributed learning: Towards optimal statistical rates. Retrieved from http://arxiv.org/abs/1803.01498.Google Scholar
- Yang Zhao, Jun Zhao, Linshan Jiang, Rui Tan, and Dusit Niyato. 2019. Mobile edge computing, blockchain and reputation-based crowdsourcing IoT federated learning: A secure, decentralized and privacy-preserving system. Retrieved from http://arxiv.org/abs/1906.10893.Google Scholar
Index Terms
Privacy-preserving Decentralized Learning Framework for Healthcare System
Recommendations
Privacy-preserving Byzantine-robust federated learning
Highlights- We propose a scheme of Privacy-preserving Byzantine-robust federated learning (PBFL).
AbstractRobustness of federated learning has become one of the major concerns since some Byzantine adversaries, who may upload false data owning to unreliable communication channels, corrupted hardware or even malicious attacks, might be ...
Privacy-preserving distributed k-anonymity
DBSec'05: Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Securityk-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous data, the model has been that of a single source wanting to publish ...
Achieving security and privacy in federated learning systems: Survey, research challenges and future directions
AbstractFederated learning (FL) allows a server to learn a machine learning (ML) model across multiple decentralized clients that privately store their own training data. In contrast with centralized ML approaches, FL saves computation to the ...
Highlights- We survey privacy and security attacks to federated learning and mitigation measures.






Comments