Secure Distributed On-Device Learning Networks With Byzantine Adversaries

Yanjie Dong,Julian Cheng,Md. Jahangir Hossain,Victor C. M. Leung
DOI: https://doi.org/10.48550/arXiv.1906.00887
2019-06-03
Abstract:The privacy concern exists when the central server has the copies of datasets. Hence, there is a paradigm shift for the learning networks to change from centralized in-cloud learning to distributed \mbox{on-device} learning. Benefit from the parallel computing, the on-device learning networks have a lower bandwidth requirement than the in-cloud learning networks. Moreover, the on-device learning networks also have several desirable characteristics such as privacy preserving and flexibility. However, the \mbox{on-device} learning networks are vulnerable to the malfunctioning terminals across the networks. The worst-case malfunctioning terminals are the Byzantine adversaries, that can perform arbitrary harmful operations to compromise the learned model based on the full knowledge of the networks. Hence, the design of secure learning algorithms becomes an emerging topic in the on-device learning networks with Byzantine adversaries. In this article, we present a comprehensive overview of the prevalent secure learning algorithms for the two promising on-device learning networks: Federated-Learning networks and decentralized-learning networks. We also review several future research directions in the \mbox{Federated-Learning} and decentralized-learning networks.
Machine Learning,Cryptography and Security
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is: in distributed device - side learning networks, how to design secure learning algorithms to deal with the threats of Byzantine adversaries. Specifically, the paper focuses on how to ensure the security and robustness of Federated - Learning Networks (FLNs) and Decentralized - Learning Networks (DLNs) when some terminal devices may exhibit arbitrary malicious behaviors. ### Decomposition of the Core Problems in the Paper 1. **Privacy Protection and Bandwidth Requirements**: - Traditional centralized cloud - learning networks have the risk of privacy leakage because both the central server and terminal devices hold copies of the data set. - Distributed device - side learning networks reduce the risk of privacy leakage and lower the bandwidth requirements by keeping data on terminal devices. 2. **Threats of Byzantine Adversaries**: - Byzantine adversaries refer to faulty terminals that can perform any harmful operations based on a complete understanding of the network. - These adversaries may upload malicious gradients or model parameters, thus undermining the accuracy and convergence of the entire learning process. 3. **Design of Secure Learning Algorithms**: - The paper proposes several secure learning algorithms against Byzantine adversaries, including methods based on aggregation rules, pre - processing, model design, and adversarial detection. - The goal is to ensure that in the presence of Byzantine adversaries, the learning algorithms can still converge to optimal or sub - optimal model parameters. ### Main Contributions - **Classification and Comparison of Secure Federated Learning Algorithms (SFLAs)**: The paper classifies existing secure federated learning algorithms into four categories and provides a qualitative comparison. - **Review of the Research Progress of Decentralized Learning Algorithms (SDLAs)**: Although the research on decentralized learning algorithms is still in its early stages, the paper still reviews some representative works. - **Proposing Future Research Directions**: The paper discusses potential research directions for further improving secure learning algorithms in the presence of Byzantine adversaries. ### Formula Representation To ensure the correctness and readability of formulas, the following are some key formulas involved in the paper: - **Average Loss Function**: \[ \hat{f}_k(w)=\mathbb{E}_{z_k}[f(w; z_k)] \] where \(z_k\) represents the randomly distributed data on the \(k\) - th terminal, and \(f(w; z_k)\) represents the prediction accuracy related to the model parameter \(w\). - **Global Gradient Aggregation**: \[ g_{\text{global}}=\sum_{k = 1}^K\nabla\hat{f}_k(w) \] where \(\nabla\hat{f}_k(w)\) is the local gradient on the \(k\) - th terminal. - **Geometric Median (GeoMed)**: \[ \text{GeoMed}(g_1, g_2,\ldots, g_K)=\arg\min_g\sum_{i = 1}^K\|g - g_i\| \] where \(g_i\) is the local gradient uploaded by the \(i\) - th terminal. Through these formulas, the paper shows how to design effective secure learning algorithms in the presence of Byzantine adversaries to ensure the robustness and security of distributed device - side learning networks.