CN114861211B - Metadata scene-oriented data privacy protection method, system and storage medium - Google Patents
Metadata scene-oriented data privacy protection method, system and storage medium Download PDFInfo
- Publication number
- CN114861211B CN114861211B CN202210631627.1A CN202210631627A CN114861211B CN 114861211 B CN114861211 B CN 114861211B CN 202210631627 A CN202210631627 A CN 202210631627A CN 114861211 B CN114861211 B CN 114861211B
- Authority
- CN
- China
- Prior art keywords
- chain
- client
- local
- local model
- slave
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 60
- 238000010801 machine learning Methods 0.000 claims abstract description 46
- 238000012549 training Methods 0.000 claims abstract description 45
- 230000002776 aggregation Effects 0.000 claims abstract description 17
- 238000004220 aggregation Methods 0.000 claims abstract description 17
- 238000013500 data storage Methods 0.000 claims abstract description 8
- 230000008569 process Effects 0.000 claims description 19
- 238000005516 engineering process Methods 0.000 claims description 11
- 238000012795 verification Methods 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 10
- 238000007726 management method Methods 0.000 claims description 10
- 230000005540 biological transmission Effects 0.000 claims description 7
- 230000006870 function Effects 0.000 claims description 7
- 238000004806 packaging method and process Methods 0.000 claims description 6
- 230000007704 transition Effects 0.000 claims description 6
- 238000006116 polymerization reaction Methods 0.000 claims description 4
- 230000008901 benefit Effects 0.000 claims description 3
- 238000001514 detection method Methods 0.000 claims description 3
- 230000000717 retained effect Effects 0.000 claims description 3
- 230000003993 interaction Effects 0.000 description 6
- 238000013473 artificial intelligence Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000007654 immersion Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000006461 physiological response Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Artificial Intelligence (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Medical Informatics (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a data privacy protection method, a system and a storage medium for a meta-universe scene; the method comprises the following steps: uploading non-private data to a data storage module in the virtual world as a first local private data set to train a first local model; while private data with sensitive information is stored locally as a second local private data set training a second local model; constructing a metauniverse cross-chain federal machine learning framework, wherein the metauniverse cross-chain federal machine learning framework comprises a task publisher, a first client for training a first local model through a first local private data set, and a second client for training a second local model through a second local private data set; the task publisher and the first client are arranged in the virtual world, and the second client is arranged in the real world; the first client and the second client update and aggregate the first local model parameters and the second local model parameters based on a cross-chain aggregation method to obtain a new global model.
Description
Technical Field
The invention relates to the technical field of communication signal demodulation, in particular to a metadata scene-oriented data privacy protection method, a metadata scene-oriented data privacy protection system and a metadata scene-oriented storage medium.
Background
Federal learning (FEDERATED LEARNING) is an emerging artificial intelligence technology, and the design goal is to ensure information security during large data sharing and protect terminal data and personal data privacy; on the premise of ensuring legal compliance, high-efficiency machine learning model training is carried out among multiple participants or multiple computing nodes. The federal learning realizes the purposes of 'data availability is invisible', 'data is not out of the door' in an iterative training operation mode, and performs encryption operation on interactive data in the model training process, so that efficient model training is realized to a certain extent, the privacy of participant data is protected to the greatest extent, the problem of data privacy caused by the fact that a traditional machine learning model needs to access data is solved, and meanwhile, more organizations or institutions can be introduced for data addition, and the model quality is improved as a whole.
Blockchains, by virtue of their anonymous, non-tamperable, distributed, etc., provide a secure and reliable solution among multiple untrusted parties. The block chain is essentially a distributed account book, the biggest characteristic of the block chain is that the traditional centralization scheme is changed into a distributed network structure, and the security of data on the chain is ensured through cryptography technologies such as asymmetric encryption and the like; meanwhile, the reliability of the chain data is ensured among a plurality of untrusted distributed participants through a consensus mechanism, intelligent contracts and the like. Through authorization mechanisms, identity management and the like of the blockchain, mutually untrusted users can be integrated together as participants to establish a safe and trusted cooperation mechanism; in addition, model parameters learned by federation can be stored in a blockchain, so that the safety and reliability of the model parameters are ensured.
The current running blockchain networks are rich and various, but the blockchain networks are mutually independent, so that the interoperability among the blockchains is greatly limited. To connect different blockchain networks together to implement the value internet, blockchain cross-chain technology is critical. The whole structure of the cross-chain technology can be divided into information collection, information verification, system connection and information feedback, and information interaction between different parallel chains is realized by establishing a connecting party or expanding an intelligent contract, and after verification by two or more parties, the information interaction is recorded into a total blockchain account book. The relay chain is one of the mainstream cross-chain technologies at present, the relay chain does not completely depend on verification judgment of a trusted third party, and only data states of two block chains are collected by a middleman to carry out self verification, and the verification modes have obvious differences according to different structures of the relay chain. The relay chain is relatively large in implementation difficulty, but is perfect in function and characteristics, and has unique and important application value.
The meta universe is the next generation of internet behind the web and the mobile internet, people can freely conduct social contact, entertainment and the like in a virtual world, and people can access the meta universe in an immersive way through technologies such as VR and AR. To enhance the sense of immersion of the metauniverse, the metauniverse needs to perform continuous data synchronization, acquire fresh data from the real world, and the quantity and variety richness of personal data collected in this process will be unprecedented. For example, in VR games, in order to keep the reality of the rendered scene, the actions of the user need to be read in real time through a sensor, and meanwhile, privacy data such as physiological responses and brain electricity modes of the user may not be read with the consent of the user. How to protect the private data in the virtual world is particularly important if the entire uploaded virtual world would result in the risk of disclosure and abuse of the private data.
The disadvantages of the current prior art are as follows: the AI model in the meta-universe needs to be trained by means of data generated in the real world and the virtual world to obtain better model performance, but if the local privacy data are all uploaded to the virtual world for training, on one hand, the real world data are uploaded to the virtual world storage module, so that larger communication overhead and storage overhead exist, and on the other hand, the privacy data are also caused to have risks of privacy leakage and data abuse.
Disclosure of Invention
The invention aims to solve the problems of the defects and the shortcomings of the prior art, and provides a data privacy protection method, a system and a storage medium for a meta-universe scene.
In order to achieve the above purpose of the present invention, the following technical scheme is adopted:
a data privacy protection method facing to a meta-universe scene comprises the following steps:
Dividing data into two parts according to data types and privacy protection requirements, and directly uploading non-private data to a data storage module in a virtual world to be used as a first local private data set to train a first local model; while private data with sensitive information is stored locally as a second local private data set training a second local model;
Constructing a metauniverse cross-chain federation machine learning framework with privacy protection, wherein the metauniverse cross-chain federation machine learning framework comprises a task publisher for storing a global model, a first client for training a first local model through a first local private data set and a second client for training a second local model through a second local private data set; the task publisher and the first client are arranged in the virtual world, and the second client is arranged in the real world;
And the first client and the second client update and aggregate the first local model parameters and the second local model parameters based on a cross-chain aggregation method to obtain a new global model.
Preferably, a block chain technology is utilized to build a decentralised meta universe cross-chain federation machine learning framework, wherein one block chain is used as a main chain, and the main chain is used as a storage management module of global model parameters; a first storage module taking one blockchain as a first slave chain and taking the first slave chain as a first local model parameter; a second storage module for taking one blockchain as a second slave chain and taking the second slave chain as a second local model parameter; a relay chain is also arranged, and the relay chain is used as a cross-chain management platform;
The task publisher transmits the initialized global model through the main chain, and receives updated parameters of the first local model and the second local model through the main chain;
The first client receives the initialized global model through a first slave chain and uploads the updated first local model parameters to the first slave chain;
the second client receives the initialized global model through a second slave chain and uploads the updated second local model parameters to the second slave chain;
the relay chain realizes bridging of the first slave chain, the second slave chain and the main chain.
Further, before the meta-universe cross-chain federal machine learning framework is trained, the meta-universe cross-chain federal machine learning framework is initialized as follows:
the first slave chain and the second slave chain register to the relay chain, a task publisher determines a federal machine learning task and searches a first client and a second client which participate in federal machine learning training;
the first client and the second client determine whether to participate in a federal machine learning task according to requirements; after the two parties reach the agreement, entering a federal machine learning process;
The task publisher uploads the initialized global model w t to the main chain, and the first client of the virtual world and the second client of the real world acquire the initialized global model w t through the corresponding first slave chain and the second slave chain respectively.
Still further, the federal machine learning process is specifically as follows:
The second client and the first client receive the initialized global model w t issued by the task issuing party and initialize the global model w t respectively to obtain a second local model First local model/>The initialization process is as follows:
Wherein, Representing a second set of clients in the real world,/>A first set of clients representing a virtual world; then, the first client and the second client respectively use the first local private data set D j and the second local private data set D i for training, D i represents the second local private data set held by the real-world second client i, and D j represents the first local private data set held by the virtual world first client j; the second local model and the first local model are respectively defined as follows:
Real world:
Virtual world:
Wherein w is a global model parameter, |d i | is the size of the dataset of the second client i, |d j | is the size of the dataset of the first client j, f k (w) is a local loss function, each client performs random gradient descent for a given number of iterations, and the training results in a second local model, the first local model being as follows:
wherein, eta is the learning rate, Is a gradient.
Still further, after the first client in the virtual world and the second client in the real world train the first local model and the second local model, the trained first local model parameters and second local model parameters are respectively uploaded to the first slave chain and the second slave chain, a cross-link request is initiated on the main chain by the first slave chain and the second slave chain respectively, the first local model parameters and the second local model parameters are updated and uploaded to the main chain by a block chain cross-link mode, and the main chain verifies the received first local model parameters and second local model parameters and performs an aggregation operation to obtain a new global model w t+1, which is defined as follows:
Iterating for a certain number of times until the global model converges, and ending the federal machine learning task at the moment; the learned global model will be retained in the backbone for subsequent predictive or classification work services.
Still further, there are four participants in the cross-chain polymerization-based method, and the functions are as follows:
the verifier: the method comprises the steps of taking charge of the block out of a relay chain network, running a client of one relay chain, and verifying a block generated by a nominated blockchain;
and (3) finishing: maintaining all nodes of a blockchain, helping a verifier to collect and verify the correctness of a transaction and submitting candidate blocks to the verifier;
the nominator: the party concerned who owns the token maintains and is responsible for verifying the security of the person;
the supervisor: the benefit is obtained by the detection of illegal transactions or illegal blocks.
Still further, the cross-chain process between the second slave chain and the master chain is as follows:
s101: the second client creates an account on the second slave chain and initializes information stored on the second slave chain;
s102: after the second client finishes training the second local model, the second client creates a transaction on the second slave chain and sends the transaction including the second local model parameters and the identity information to the main chain; the transaction is a second local model parameter uploading request;
s103: the second client signs and broadcasts the transaction;
S104: collecting transaction information from a collator of the chain, verifying the validity of the transaction, collating transaction data, and packaging into candidate blocks;
s105: the collator presents the candidate block and the transition proof of state to a verifier of the second slave chain;
s106: the verifier verifies the received candidate block, only the verification passes, only effective transactions are ensured to be contained in the candidate block, and the verifier mortises the tokens of the candidate block to prepare for the uplink of the candidate block;
s107: broadcasting the candidate block to the blockchain will be authorized when there are enough nominators to mortgage their tokens and nominating the verifier;
s108: when all authenticators agree on the relay chain block, the authenticators move the transaction on the second slave chain from the exit of the second slave chain to the entrance of the master chain to complete the transmission of the message;
S109: the main chain executes the transaction in the entrance queue and modifies the account book of the main chain;
s110: the task issuing side server obtains the updated parameters of the second local model, temporarily stores the updated parameters, and performs aggregation operation after waiting for the return results of a plurality of second clients.
Still further, the first slave chain and the main chain have the following cross-chain flow path:
s201: the first client creates an account on the first slave chain and initializes information stored on the first slave chain;
S202: after the first client finishes training the first local model, the first client creates a transaction on the first slave chain and sends the first local model parameters and identity information to the main chain; the transaction is a first local model parameter uploading request;
s203: the first client signs and broadcasts the transaction;
S204: collecting transaction information by a collator of a chain, verifying the validity of a transaction, collating transaction data, and packaging into candidate blocks;
s205: the collator presents the candidate block and the transition proof of state to the verifier of the first slave chain;
S206: the verifier verifies the received candidate block, only the verification passes, only effective transactions are ensured to be contained in the candidate block, and the verifier mortises the tokens of the candidate block to prepare for the uplink of the candidate block;
S207: broadcasting the candidate block to the blockchain will be authorized when there are enough nominators to mortgage their tokens and nominating the verifier;
S208: when all authenticators agree on the relay chain block, the authenticators move the transaction on the first slave chain from the exit of the first slave chain to the entrance of the master chain to complete the transmission of the message;
s209: the main chain executes the transaction in the entrance queue and modifies the account book of the main chain;
S210: the task issuing side server obtains the updated parameters of the first local model, temporarily stores the parameters, and performs aggregation operation after waiting for the return results of a plurality of first clients.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, said processor implementing the steps of the method as described above when said computer program is executed.
A computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of a method as described above.
The beneficial effects of the invention are as follows:
The invention does not simply upload all physical data collected by the sensor directly into the virtual world, but divides the data into two parts according to the data type and the privacy protection requirement, the non-privacy data can be directly uploaded into a virtual world data storage module (such as a cloud server, an edge server and the like), and the privacy data with sensitive information is stored locally, so that the privacy protection of the artificial intelligence application in the meta-universe scene is realized.
The invention utilizes the blockchain technology to build a decentralised meta universe cross-chain federal machine learning framework, which is different from the traditional federal machine learning framework, one blockchain in the framework is called a main chain and is used as a storage management module of global model parameters, a plurality of slave chains are used as storage modules of local model parameters, and the local training model parameters are uploaded into the slave chains. The meta-universe cross-chain federal machine learning framework can record the training process of the local model, and can realize privacy protection and auditability and traceability of the local training process.
The invention also provides a cross-chain aggregation method, wherein the interaction of the local model parameters between the master chain and the slave chain is performed in a cross-chain mode, so that the traceability is ensured, and meanwhile, the safety of the interaction of the local model parameters is ensured to a certain extent.
Drawings
Fig. 1 is a schematic diagram of a data privacy protection method according to embodiment 1.
FIG. 2 is a schematic diagram of a cross-chain polymerization-based process as described in example 1.
Detailed Description
The invention is described in detail below with reference to the drawings and the detailed description.
Example 1
As shown in fig. 1, a metadata scene-oriented data privacy protection method includes the following steps:
Dividing data into two parts according to data types and privacy protection requirements, and directly uploading non-private data to a data storage module in a virtual world to be used as a first local private data set to train a first local model; while private data with sensitive information is stored locally as a second local private data set training a second local model;
Constructing a metauniverse cross-chain federation machine learning framework with privacy protection, wherein the metauniverse cross-chain federation machine learning framework comprises a task publisher for storing a global model, a first client for training a first local model through a first local private data set and a second client for training a second local model through a second local private data set; the task publisher and the first client are arranged in the virtual world, and the second client is arranged in the real world;
And the first client and the second client update and aggregate the first local model parameters and the second local model parameters based on a cross-chain aggregation method to obtain a new global model.
In a specific embodiment, a block chain technology is utilized to build a decentralised meta universe cross-chain federation machine learning framework, wherein one block chain is used as a main chain, and the main chain is used as a storage management module of global model parameters; a first storage module taking one blockchain as a first slave chain and taking the first slave chain as a first local model parameter; a second storage module for taking one blockchain as a second slave chain and taking the second slave chain as a second local model parameter; a relay chain is also arranged, and the relay chain is used as a cross-chain management platform;
The task publisher transmits the initialized global model through the main chain, and receives updated parameters of the first local model and the second local model through the main chain;
The first client receives the initialized global model through a first slave chain and uploads the updated first local model parameters to the first slave chain;
the second client receives the initialized global model through a second slave chain and uploads the updated second local model parameters to the second slave chain;
the relay chain realizes bridging of the first slave chain, the second slave chain and the main chain.
In a specific embodiment, before the meta-universe cross-chain federal machine learning framework is trained, the meta-universe cross-chain federal machine learning framework is initialized as follows:
the first slave chain and the second slave chain register to the relay chain, a task publisher determines a federal machine learning task and searches a first client and a second client which participate in federal machine learning training;
the first client and the second client determine whether to participate in a federal machine learning task according to requirements; after the two parties reach the agreement, entering a federal machine learning process;
The task publisher uploads the initialized global model w t to the main chain, and the first client of the virtual world and the second client of the real world acquire the initialized global model w t through the corresponding first slave chain and the second slave chain respectively.
In a specific embodiment, the federal machine learning process is specifically as follows:
The second client and the first client receive the initialized global model w t issued by the task issuing party and initialize the global model w t respectively to obtain a second local model First local model/>The initialization process is as follows:
Wherein, Representing a second set of clients in the real world,/>A first set of clients representing a virtual world; then, the first client and the second client respectively use the first local private data set D j and the second local private data set D i for training, D i represents the second local private data set held by the real-world second client i, and D j represents the first local private data set held by the virtual world first client j; the second local model and the first local model are respectively defined as follows:
Real world:
Virtual world:
Wherein w is a global model parameter, |d i | is the size of the dataset of the second client i, |d j | is the size of the dataset of the first client j, f k (w) is a local loss function, each client performs random gradient descent for a given number of iterations, and the training results in a second local model, the first local model being as follows:
wherein, eta is the learning rate, Is a gradient.
In a specific embodiment, after the first client in the virtual world and the second client in the real world train the first local model and the second local model, the trained first local model parameters and second local model parameters are respectively uploaded to the first slave chain and the second slave chain, a cross-link request is respectively initiated on the first slave chain and the second slave chain to the main chain, the first local model parameters and the second local model parameters are updated and uploaded to the main chain in a block chain cross-link mode, and the main chain verifies the received first local model parameters and second local model parameters and performs an aggregation operation to obtain a new global model w t+1, which is defined as follows:
Iterating for a certain number of times until the global model converges, and ending the federal machine learning task at the moment; the learned global model will be retained in the backbone for subsequent predictive or classification work services.
In a specific embodiment, the cross-chain polymerization-based method has four kinds of participants, and the functions of the four kinds of participants are as follows:
the verifier: the method comprises the steps of taking charge of the block out of a relay chain network, running a client of one relay chain, and verifying a block generated by a nominated blockchain;
and (3) finishing: maintaining all nodes of a blockchain, helping a verifier to collect and verify the correctness of a transaction and submitting candidate blocks to the verifier;
the nominator: the party concerned who owns the token maintains and is responsible for verifying the security of the person;
the supervisor: the benefit is obtained by the detection of illegal transactions or illegal blocks.
In a specific embodiment, the cross-chain process between the second slave chain and the master chain is as follows:
s101: the second client creates an account on the second slave chain and initializes information stored on the second slave chain;
s102: after the second client finishes training the second local model, the second client creates a transaction on the second slave chain and sends the transaction including the second local model parameters and the identity information to the main chain; the transaction is a second local model parameter uploading request;
s103: the second client signs and broadcasts the transaction;
S104: collecting transaction information from a collator of the chain, verifying the validity of the transaction, collating transaction data, and packaging into candidate blocks;
s105: the collator presents the candidate block and the transition proof of state to a verifier of the second slave chain;
s106: the verifier verifies the received candidate block, only the verification passes, only effective transactions are ensured to be contained in the candidate block, and the verifier mortises the tokens of the candidate block to prepare for the uplink of the candidate block;
s107: broadcasting the candidate block to the blockchain will be authorized when there are enough nominators to mortgage their tokens and nominating the verifier;
s108: when all authenticators agree on the relay chain block, the authenticators move the transaction on the second slave chain from the exit of the second slave chain to the entrance of the master chain to complete the transmission of the message;
S109: the main chain executes the transaction in the entrance queue and modifies the account book of the main chain;
s110: the task issuing side server obtains the updated parameters of the second local model, temporarily stores the updated parameters, and performs aggregation operation after waiting for the return results of a plurality of second clients.
In a specific embodiment, the first slave chain and the main chain have the following cross-chain flow path:
s201: the first client creates an account on the first slave chain and initializes information stored on the first slave chain;
S202: after the first client finishes training the first local model, the first client creates a transaction on the first slave chain and sends the first local model parameters and identity information to the main chain; the transaction is a first local model parameter uploading request;
s203: the first client signs and broadcasts the transaction;
S204: collecting transaction information by a collator of a chain, verifying the validity of a transaction, collating transaction data, and packaging into candidate blocks;
s205: the collator presents the candidate block and the transition proof of state to the verifier of the first slave chain;
S206: the verifier verifies the received candidate block, only the verification passes, only effective transactions are ensured to be contained in the candidate block, and the verifier mortises the tokens of the candidate block to prepare for the uplink of the candidate block;
S207: broadcasting the candidate block to the blockchain will be authorized when there are enough nominators to mortgage their tokens and nominating the verifier;
S208: when all authenticators agree on the relay chain block, the authenticators move the transaction on the first slave chain from the exit of the first slave chain to the entrance of the master chain to complete the transmission of the message;
s209: the main chain executes the transaction in the entrance queue and modifies the account book of the main chain;
S210: the task issuing side server obtains the updated parameters of the first local model, temporarily stores the parameters, and performs aggregation operation after waiting for the return results of a plurality of first clients.
The invention does not simply upload all physical data collected by the sensor directly into the virtual world, but divides the data into two parts according to the data type and the privacy protection requirement, the non-privacy data can be directly uploaded into a virtual world data storage module (such as a cloud server, an edge server and the like), and the privacy data with sensitive information is stored locally, so that the privacy protection of the artificial intelligence application in the meta-universe scene is realized.
The invention utilizes the blockchain technology to build a decentralised meta universe cross-chain federal machine learning framework, which is different from the traditional federal machine learning framework, one blockchain in the framework is called a main chain and is used as a storage management module of global model parameters, a plurality of slave chains are used as storage modules of local model parameters, and the local training model parameters are uploaded into the slave chains. The meta-universe cross-chain federal machine learning framework can record the training process of the local model, and can realize privacy protection and auditability and traceability of the local training process.
The invention also provides a cross-chain aggregation method, wherein the interaction of the local model parameters between the master chain and the slave chain is performed in a cross-chain mode, so that the traceability is ensured, and meanwhile, the safety of the interaction of the local model parameters is ensured to a certain extent.
Example 2
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, said processor implementing the steps of a data privacy protection method for a meta-cosmic scene when said computer program is executed:
Dividing data into two parts according to data types and privacy protection requirements, and directly uploading non-private data to a data storage module in a virtual world to be used as a first local private data set to train a first local model; while private data with sensitive information is stored locally as a second local private data set training a second local model;
Constructing a metauniverse cross-chain federation machine learning framework with privacy protection, wherein the metauniverse cross-chain federation machine learning framework comprises a task publisher for storing a global model, a first client for training a first local model through a first local private data set and a second client for training a second local model through a second local private data set; the task publisher and the first client are arranged in the virtual world, and the second client is arranged in the real world;
And the first client and the second client update and aggregate the first local model parameters and the second local model parameters based on a cross-chain aggregation method to obtain a new global model.
Where the memory and the processor are connected by a bus, the bus may comprise any number of interconnected buses and bridges, the buses connecting the various circuits of the one or more processors and the memory together. The bus may also connect various other circuits such as peripherals, voltage regulators, and power management circuits, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or may be a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor is transmitted over the wireless medium via the antenna, which further receives the data and transmits the data to the processor.
Example 3
A computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of a method for protecting data privacy for a metauniverse scene:
Dividing data into two parts according to data types and privacy protection requirements, and directly uploading non-private data to a data storage module in a virtual world to be used as a first local private data set to train a first local model; while private data with sensitive information is stored locally as a second local private data set training a second local model;
Constructing a metauniverse cross-chain federation machine learning framework with privacy protection, wherein the metauniverse cross-chain federation machine learning framework comprises a task publisher for storing a global model, a first client for training a first local model through a first local private data set and a second client for training a second local model through a second local private data set; the task publisher and the first client are arranged in the virtual world, and the second client is arranged in the real world;
And the first client and the second client update and aggregate the first local model parameters and the second local model parameters based on a cross-chain aggregation method to obtain a new global model.
Those skilled in the art will appreciate that all or part of the steps in implementing the methods of the embodiments described above may be implemented by a program stored in a storage medium, including instructions for causing a device (which may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps of the methods of the embodiments of the application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-only memory (ROM), a random access memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
It is to be understood that the above examples of the present invention are provided by way of illustration only and not by way of limitation of the embodiments of the present invention. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the invention are desired to be protected by the following claims.
Claims (10)
1. A data privacy protection method for a meta-universe scene is characterized by comprising the following steps of: the method comprises the following steps:
Dividing data into two parts according to data types and privacy protection requirements, and directly uploading non-private data to a data storage module in a virtual world to be used as a first local private data set to train a first local model; while private data with sensitive information is stored locally as a second local private data set training a second local model;
Constructing a metauniverse cross-chain federation machine learning framework with privacy protection, wherein the metauniverse cross-chain federation machine learning framework comprises a task publisher for storing a global model, a first client for training a first local model through a first local private data set and a second client for training a second local model through a second local private data set; the task publisher and the first client are arranged in the virtual world, and the second client is arranged in the real world;
The first client and the second client update and aggregate the first local model parameters and the second local model parameters based on a cross-chain aggregation method to obtain a new global model;
Constructing a decentralised meta universe cross-chain federation machine learning framework by using a blockchain technology, wherein one blockchain is used as a main chain, and the main chain is used as a storage management module of global model parameters; a first storage module taking one blockchain as a first slave chain and taking the first slave chain as a first local model parameter; a second storage module for taking one blockchain as a second slave chain and taking the second slave chain as a second local model parameter; and a relay chain is also arranged, and the relay chain is used as a cross-chain management platform.
2. The meta-universe scene-oriented data privacy protection method of claim 1, characterized by:
The task publisher transmits the initialized global model through the main chain, and receives updated parameters of the first local model and the second local model through the main chain;
The first client receives the initialized global model through a first slave chain and uploads the updated first local model parameters to the first slave chain;
the second client receives the initialized global model through a second slave chain and uploads the updated second local model parameters to the second slave chain;
the relay chain realizes bridging of the first slave chain, the second slave chain and the main chain.
3. The meta-universe scene-oriented data privacy protection method of claim 2, characterized by: before training the meta-universe cross-chain federal machine learning framework, initializing is carried out, and the method specifically comprises the following steps:
the first slave chain and the second slave chain register to the relay chain, a task publisher determines a federal machine learning task and searches a first client and a second client which participate in federal machine learning training;
the first client and the second client determine whether to participate in a federal machine learning task according to requirements; after the two parties reach the agreement, entering a federal machine learning process;
The task publisher uploads the initialized global model w t to the main chain, and the first client of the virtual world and the second client of the real world acquire the initialized global model w t through the corresponding first slave chain and the second slave chain respectively.
4. The meta-universe scene-oriented data privacy protection method of claim 3, characterized by: the federal machine learning process is specifically as follows:
The second client and the first client receive the initialized global model w t issued by the task issuing party and initialize the global model w t respectively to obtain a second local model First local model/>The initialization process is as follows:
Where P represents a second set of real-world clients, A first set of clients representing a virtual world; then, the first client and the second client respectively use the first local private data set D j and the second local private data set D i for training, D i represents the second local private data set held by the real-world second client i, and D j represents the first local private data set held by the virtual world first client j; the second local model and the first local model are respectively defined as follows:
Real world:
Virtual world:
Wherein w is a global model parameter, |d i | is the size of the dataset of the second client i, |d j | is the size of the dataset of the first client j, f k (w) is a local loss function, each client performs random gradient descent for a given number of iterations, and the training results in a second local model, the first local model being as follows:
wherein, eta is the learning rate, Is a gradient.
5. The meta-universe scene-oriented data privacy protection method of claim 4, characterized by: after the first client in the virtual world and the second client in the real world train the first local model and the second local model, the trained first local model parameters and second local model parameters are respectively uploaded to a first slave chain and a second slave chain, a cross-link request is respectively initiated on the main chain by the first slave chain and the second slave chain, the first local model parameters and the second local model parameters are updated and uploaded to the main chain in a block chain cross-link mode, and the main chain verifies the received first local model parameters and second local model parameters and performs aggregation operation to obtain a new global model w t+1, which is defined as follows:
Iterating for a certain number of times until the global model converges, and ending the federal machine learning task at the moment; the learned global model will be retained in the backbone for subsequent predictive or classification work services.
6. The meta-universe scene-oriented data privacy protection method of claim 5, characterized by: four participants are in total in the cross-chain polymerization method, and the functions of the four participants are as follows:
the verifier: the method comprises the steps of taking charge of the block out of a relay chain network, running a client of one relay chain, and verifying a block generated by a nominated blockchain;
and (3) finishing: maintaining all nodes of a blockchain, helping a verifier to collect and verify the correctness of a transaction and submitting candidate blocks to the verifier;
the nominator: the party concerned who owns the token maintains and is responsible for verifying the security of the person;
the supervisor: the benefit is obtained by the detection of illegal transactions or illegal blocks.
7. The meta-universe scene-oriented data privacy protection method of claim 6, characterized by: the process of crossing the chain between the second slave chain and the main chain is as follows:
s101: the second client creates an account on the second slave chain and initializes information stored on the second slave chain;
s102: after the second client finishes training the second local model, the second client creates a transaction on the second slave chain and sends the transaction including the second local model parameters and the identity information to the main chain; the transaction is a second local model parameter uploading request;
s103: the second client signs and broadcasts the transaction;
S104: collecting transaction information from a collator of the chain, verifying the validity of the transaction, collating transaction data, and packaging into candidate blocks;
s105: the collator presents the candidate block and the transition proof of state to a verifier of the second slave chain;
s106: the verifier verifies the received candidate block, only the verification passes, only effective transactions are ensured to be contained in the candidate block, and the verifier mortises the tokens of the candidate block to prepare for the uplink of the candidate block;
s107: broadcasting the candidate block to the blockchain will be authorized when there are enough nominators to mortgage their tokens and nominating the verifier;
s108: when all authenticators agree on the relay chain block, the authenticators move the transaction on the second slave chain from the exit of the second slave chain to the entrance of the master chain to complete the transmission of the message;
S109: the main chain executes the transaction in the entrance queue and modifies the account book of the main chain;
s110: the task issuing side server obtains the updated parameters of the second local model, temporarily stores the updated parameters, and performs aggregation operation after waiting for the return results of a plurality of second clients.
8. The meta-universe scene-oriented data privacy protection method of claim 6, characterized by: the first slave chain and the main chain have the following cross-chain flow path:
s201: the first client creates an account on the first slave chain and initializes information stored on the first slave chain;
S202: after the first client finishes training the first local model, the first client creates a transaction on the first slave chain and sends the first local model parameters and identity information to the main chain; the transaction is a first local model parameter uploading request;
s203: the first client signs and broadcasts the transaction;
S204: collecting transaction information by a collator of a chain, verifying the validity of a transaction, collating transaction data, and packaging into candidate blocks;
s205: the collator presents the candidate block and the transition proof of state to the verifier of the first slave chain;
S206: the verifier verifies the received candidate block, only the verification passes, only effective transactions are ensured to be contained in the candidate block, and the verifier mortises the tokens of the candidate block to prepare for the uplink of the candidate block;
S207: broadcasting the candidate block to the blockchain will be authorized when there are enough nominators to mortgage their tokens and nominating the verifier;
S208: when all authenticators agree on the relay chain block, the authenticators move the transaction on the first slave chain from the exit of the first slave chain to the entrance of the master chain to complete the transmission of the message;
s209: the main chain executes the transaction in the entrance queue and modifies the account book of the main chain;
S210: the task issuing side server obtains the updated parameters of the first local model, temporarily stores the parameters, and performs aggregation operation after waiting for the return results of a plurality of first clients.
9. A computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, characterized by: the processor, when executing the computer program, performs the steps of the method according to any one of claims 1 to 8.
10. A computer-readable storage medium having stored thereon a computer program, characterized by: the computer program, when executed by a processor, performs the steps of the method according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210631627.1A CN114861211B (en) | 2022-06-06 | 2022-06-06 | Metadata scene-oriented data privacy protection method, system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210631627.1A CN114861211B (en) | 2022-06-06 | 2022-06-06 | Metadata scene-oriented data privacy protection method, system and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114861211A CN114861211A (en) | 2022-08-05 |
CN114861211B true CN114861211B (en) | 2024-06-07 |
Family
ID=82624055
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210631627.1A Active CN114861211B (en) | 2022-06-06 | 2022-06-06 | Metadata scene-oriented data privacy protection method, system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114861211B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115329385B (en) * | 2022-10-11 | 2022-12-16 | 北京理工大学 | Model training method and device based on block chain cross-chain privacy protection |
CN116489637B (en) * | 2023-04-25 | 2023-11-03 | 北京交通大学 | Mobile edge computing method oriented to meta universe and based on privacy protection |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114417421A (en) * | 2022-01-26 | 2022-04-29 | 深圳技术大学 | Meta-universe-based shared information privacy protection method and related device |
CN114510150A (en) * | 2022-02-17 | 2022-05-17 | 李双江 | Experience system of virtual digital world |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100161413A1 (en) * | 2008-12-18 | 2010-06-24 | International Business Machines Corporation | Virtual universe exchanges based on real-world transactions |
US11694110B2 (en) * | 2019-06-12 | 2023-07-04 | International Business Machines Corporation | Aggregated machine learning verification for database |
US11580240B2 (en) * | 2020-03-24 | 2023-02-14 | Kyndryl, Inc. | Protecting sensitive data |
CN112434313A (en) * | 2020-11-11 | 2021-03-02 | 北京邮电大学 | Data sharing method, system, electronic device and storage medium |
-
2022
- 2022-06-06 CN CN202210631627.1A patent/CN114861211B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114417421A (en) * | 2022-01-26 | 2022-04-29 | 深圳技术大学 | Meta-universe-based shared information privacy protection method and related device |
CN114510150A (en) * | 2022-02-17 | 2022-05-17 | 李双江 | Experience system of virtual digital world |
Non-Patent Citations (1)
Title |
---|
面向移动计算的安全与隐私保护研究;康嘉文;《中国博士学位论文全文数据库(电子期刊)》;20181015(第10期);I138-11 * |
Also Published As
Publication number | Publication date |
---|---|
CN114861211A (en) | 2022-08-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yin et al. | FDC: A secure federated deep learning mechanism for data collaborations in the Internet of Things | |
CN110599147B (en) | Ciphertext retrieval fair payment method and system based on block chain | |
Xu et al. | A blockchain-enabled energy-efficient data collection system for UAV-assisted IoT | |
Kim et al. | Lightweight knowledge-based authentication model for intelligent closed circuit television in mobile personal computing | |
Ali et al. | Metaverse communications, networking, security, and applications: Research issues, state-of-the-art, and future directions | |
Li et al. | Preserving edge knowledge sharing among IoT services: A blockchain-based approach | |
EP3907931B1 (en) | Blockchain-implemented system and method | |
CN114861211B (en) | Metadata scene-oriented data privacy protection method, system and storage medium | |
CN112540926B (en) | Federal learning method for fair resource allocation based on blockchain | |
CN107579998A (en) | Personal data center and digital identification authentication method based on block chain, digital identity and intelligent contract | |
CN110457878A (en) | A kind of identity identifying method based on block chain, apparatus and system | |
CN109274505A (en) | A kind of anonymous electronic voting method based on block chain technology | |
CN114362987B (en) | Distributed voting system and method based on block chain and intelligent contract | |
CN109165946A (en) | A kind of transaction verification system based on block chain | |
CN112073222A (en) | Air-ground network mobile management architecture based on block chain cross-chain technology | |
Alferaidi et al. | Federated learning algorithms to optimize the client and cost selections | |
Doku et al. | LightChain: On the lightweight blockchain for the Internet-of-Things | |
CN110766551A (en) | Alliance chain based on improved Kafka consensus mechanism and transaction method | |
CN115952532A (en) | Privacy protection method based on federation chain federal learning | |
Al-madani et al. | IoT data security via blockchain technology and service-centric networking | |
CN111291628A (en) | Face data distributed recognition and storage architecture based on block chain technology | |
CN117411640A (en) | Multi-universe identity mutual identification and information transmission system and method thereof | |
CN115544557A (en) | Block chain face recognition system based on federal learning | |
CN111931230A (en) | Data authorization method and device, storage medium and electronic device | |
CN117010018A (en) | Federal prediction method, federal prediction system and related equipment for local model |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |