[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/3324320.3324405acmotherconferencesArticle/Chapter ViewAbstractPublication PagesewsnConference Proceedingsconference-collections
Article

Differentially Private Collaborative Learning for the IoT Edge

Published: 15 March 2019 Publication History

Abstract

Collaborative learning based on training data contributed by many edge devices is a promising paradigm for implementing crowd intelligence. The collaboratively trained model generally provides superior classification performance due to the increased volume and expanded coverage of the training data. However, the data contribution may incur the concern of privacy breach. This paper presents the design of a privacy-preserving collaborative learning approach, in which the edge devices and the cloud train different stages of a deep neural network, and the data transmitted from an edge device to the honest-but-curious cloud is perturbed by Laplacian random noises to achieve ε-differential privacy. We apply the proposed approach to a case study of collaboratively training a convolutional neural network for handwritten digit recognition. The results show that our approach maintains 99% and 96% classification accuracy in implementing privacy loss levels of ε = 5 and ε = 2, respectively.

References

[1]
M. Abadi, A. Chu, I. Goodfellow, H. McMahan, I. Mironov, K. Talwar, and L. Zhang. Deep learning with differential privacy. In ACM Conference on Computer and Communications Security (CCS), 2016.
[2]
K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H. B. McMahan, S. Patel, D. Ramage, A. Segal, and K. Seth. Practical secure aggregation for privacy preserving machine learning. In ACM Conference on Computer and Communications Security (CCS), 2017.
[3]
G. Danezis and C. Diaz. A survey of anonymous communication channels. Technical report, Microsoft Research, 2008. MSR-TR2008-35.
[4]
C. Dwork. Differential privacy. International Colloquium on Automata, Languages, and Programming (ICALP), 2006.
[5]
C. Dwork, F. McSherry, K. Nissim, and A. Smith. Calibrating noise to sensitivity in private data analysis. Conference on Theory of Cryptography, 2006.
[6]
C. Dwork, A. Roth, et al. The algorithmic foundations of differential privacy. Foundations and Trends R© in Theoretical Computer Science, 9(3–4):211–407, 2014.
[7]
Google AI. Federated learning: Collaborative machine learning without centralized training data, 2017. https://bit.ly/2IHdmzw.
[8]
T. Graepel, K. Lauter, and M. Naehrig. Ml confidential: Machine learning on encrypted data. In Intl. Conf. Inf. Security & Cryptology, 2012.
[9]
J. Hamm, A. Champion, G. Chen, M. Belkin, and D. Xuan. Crowdml: A privacy-preserving learning framework for a crowd of smart devices. In IEEE International Conference on Distributed Computing Systems (ICDCS), 2015.
[10]
B. Hitaj, G. Ateniese, and F. Perez-Cruz. Deep models under the gan: Information leakage from collaborative deep learning. In ACM Conference on Computer and Communications Security (CCS), 2017.
[11]
G. B. Huang and E. Learned-Miller. Labeled faces in the wild: Updates and new reporting procedures. Dept. Comput. Sci., Univ. Massachusetts Amherst, Tech. Rep, pages 14–003, 2014.
[12]
S. Ioffe and C. Szegedy. Batch normalization: Accelerating deep network training by reducing internal covariate shift. arXiv preprint arXiv:1502.03167, 2015.
[13]
A. Krizhevsky and G. Hinton. Learning multiple layers of features from tiny images. Technical report, 2009.
[14]
Y. LeCun, C. Corts, and C. J. Burges. The mnist database of handwritten digits, 2018. http://yann.lecun.com/exdb/mnist/.
[15]
B. Liu, Y. Jiang, F. Sha, and R. Govindan. Cloud-enabled privacypreserving collaborative learning for mobile sensing. In ACM Conference on Embedded Networked Sensor Systems (SenSys), 2012.
[16]
Y. Mao, S. Yi, Q. Li, J. Feng, F. Xu, and S. Zhong. Learning from differentially private neural activations with edge computing. In The Third ACM/IEEE Symposium on Edge Computing (SEC), 2018.
[17]
H. B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas. Communication-efficient learning of deep networks from decentralized data. In The 20th International Conference on Artificial Intelligence and Statistics (AISTATS), 2017.
[18]
A. Narayanan and V. Shmatikov. How to break anonymity of the netflix prize dataset. arXiv preprint arXiv:cs/0610105, 2006.
[19]
S. Osia, A. Shamsabadi, A. Taheri, H. Rabiee, N. Lane, and H. Haddadi. A hybrid deep learning architecture for privacy-preserving mobile analytics. arXiv preprint 1703.02952, 2018.
[20]
L. Phong, Y. Aono, T. Hayashi, L. Wang, and S. Moriai. Privacypreserving deep learning via additively homomorphic encryption. IEEE Trans. Information Forensics and Security, 13(5), 2018.
[21]
R. Shokri and V. Shmatikov. Privacy-preserving deep learning. In ACM Conf. Computer and Communications Security (CCS), 2015.
[22]
J. Wang, J. Zhang, W. Bao, X. Zhu, B. Cao, and P. Yu. Not just privacy: Improving performance of private deep learning in mobile cloud. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2018.
[23]
T. Zhang, Z. He, and R. Lee. Privacy-preserving machine learning through data obfuscation. arXiv preprint arXiv:1807.01860, 2018.

Cited By

View all
  • (2021)A Privacy Protection Scheme for IoT Big Data Based on Time and Frequency LimitationWireless Communications & Mobile Computing10.1155/2021/55456482021Online publication date: 1-Jan-2021
  1. Differentially Private Collaborative Learning for the IoT Edge

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    EWSN '19: Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks
    February 2019
    436 pages
    ISBN:9780994988638

    Sponsors

    • EWSN: International Conference on Embedded Wireless Systems and Networks

    In-Cooperation

    Publisher

    Junction Publishing

    United States

    Publication History

    Published: 15 March 2019

    Check for updates

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate 81 of 195 submissions, 42%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 21 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)A Privacy Protection Scheme for IoT Big Data Based on Time and Frequency LimitationWireless Communications & Mobile Computing10.1155/2021/55456482021Online publication date: 1-Jan-2021

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media