Boosting Communication Efficiency of Federated Learning's Secure Aggregation

Niousha Nazemi,Omid Tavallaie,Shuaijun Chen,Albert Y. Zomaya,Ralph Holz
2024-05-02
Abstract:Federated Learning (FL) is a decentralized machine learning approach where client devices train models locally and send them to a server that performs aggregation to generate a global model. FL is vulnerable to model inversion attacks, where the server can infer sensitive client data from trained models. Google's Secure Aggregation (SecAgg) protocol addresses this data privacy issue by masking each client's trained model using shared secrets and individual elements generated locally on the client's device. Although SecAgg effectively preserves privacy, it imposes considerable communication and computation overhead, especially as network size increases. Building upon SecAgg, this poster introduces a Communication-Efficient Secure Aggregation (CESA) protocol that substantially reduces this overhead by using only two shared secrets per client to mask the model. We propose our method for stable networks with low delay variation and limited client dropouts. CESA is independent of the data distribution and network size (for higher than 6 nodes), preventing the honest-but-curious server from accessing unmasked models. Our initial evaluation reveals that CESA significantly reduces the communication cost compared to SecAgg.
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is that while the Secure Aggregation (SecAgg) protocol in Federated Learning (FL) protects data privacy, it brings significant communication and computational overhead problems. Specifically: 1. **Trade - off between privacy protection and communication overhead**: - In FL, client devices train models locally and send the models to the server for aggregation to generate a global model. However, FL is vulnerable to model inversion attacks, that is, the server can infer the sensitive data of the client through the trained model. - The SecAgg protocol proposed by Google effectively protects data privacy by using shared secrets and locally generated random elements to mask the training model of each client. But this method increases communication and computational costs, and this overhead becomes more significant especially when the network scale expands. 2. **Reducing communication and computational overhead**: - In order to reduce the communication and computational overhead brought by SecAgg, this paper proposes a new communication - efficient secure aggregation protocol - CESA (Communication - Efficient Secure Aggregation). CESA improves SecAgg in the following ways: - Each client only uses two shared secrets to mask the model instead of generating multiple masks for each pair of clients. - No encryption operation is required, reducing the computational burden. - It is suitable for a stable network environment with low - latency variation and limited client drop - out. 3. **Preventing model inversion attacks**: - CESA ensures that even in the case of a large network scale (more than 6 nodes), an honest - but - curious server cannot access the unmasked model, thus effectively preventing model inversion attacks. ### Formula Representation In the CESA protocol, the shared secret \( s_{i,j} \) between client \( i \) and client \( j \) can be represented by the following formula: \[ s_{i,j} \equiv A_i^{a_j} \equiv (g^{a_i})^{a_j} \equiv g^{a_i a_j} \pmod{p} \] where: - \( p \) is a large prime number, - \( g \) is a primitive root modulo \( p \), - \( a_i \) and \( a_j \) are the private keys of client \( i \) and client \( j \) respectively, - \( A_i \equiv g^{a_i} \pmod{p} \) and \( A_j \equiv g^{a_j} \pmod{p} \) are the public keys of client \( i \) and client \( j \) respectively. In this way, client \( i \) and client \( j \) can generate the same shared secret \( s_{i,j} \) for subsequent mask generation. ### Summary The main contribution of this paper is the proposal of the CESA protocol, which significantly reduces communication and computational overhead while maintaining data privacy, especially in large - scale network environments. Preliminary evaluations show that CESA significantly reduces communication costs compared to SecAgg and provides an effective defense mechanism to prevent model inversion attacks.