A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing

Jun Zhou,Nan Wu,Yisong Wang,Shouzhen Gu,Zhenfu Cao,Xiaolei Dong,Kim-Kwang Raymond Choo
DOI: https://doi.org/10.1109/tdsc.2022.3168556
2022-01-01
IEEE Transactions on Dependable and Secure Computing
Abstract:Federated learning is increasingly popular, as it allows us to circumvent challenges due to data islands (e.g., challenges in getting access to raw datasets, particularly when data are owned by multiple data owners) by training a global model using data from one or more data owners / sources. However, in an edge computing deployment one cannot assume that resource-constrained end devices are sufficiently secure. In other words, we have to consider the possibility of these devices being compromised and can be abused to facilitate poisoning attacks. Privacy-preserving is another important property to consider when dealing with sensitive user data on end devices. Most existing approaches only consider either defending against poisoning attacks or supporting privacy, but not both properties simultaneously. In this paper, we propose a differentially private federated learning model against poisoning attacks, designed for edge computing deployment. First, we design a weight-based algorithm to perform anomaly detection on the parameters uploaded by end devices in edge nodes, which improves detection rate using only small-size validation datasets and minimizes the communication cost. Then, differential privacy technology is leveraged to protect the privacy of both data and model in an edge computing setting. We also evaluate the detection performance in the presence of random and customized malicious end devices, and compare its performance with those of two other competing approaches published in IEEE Transactions on Dependable and Secure Computing, in terms of attack resiliency, and communication and computation costs. Experimental results demonstrate that our scheme can achieve an optimal tradeoff between security, efficiency and accuracy.
What problem does this paper attempt to address?