MPCFL: Towards Multi-party Computation for Secure Federated Learning Aggregation

被引:2
|
作者
Kaminaga, Hiroki [1 ]
Awaysheh, Feras M. [2 ]
Alawadi, Sadi [3 ]
Kamm, Liina [1 ]
机构
[1] Cybernetica AS, Informat Secur Res Inst, Tallinn, Estonia
[2] Univ Tartu, Inst Comp Scince, Delta Ctr, Tartu, Estonia
[3] Blekinge Inst Technol, Dept Comp Sci, Karlskrona, Sweden
关键词
Federated Learning; Multi-party Computation; Secret Sharing; Privacy-preserving; Data Security;
D O I
10.1145/3603166.3632144
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the rapidly evolving machine learning (ML) and distributed systems realm, the escalating concern for data privacy naturally comes to the forefront of discussions. Federated learning (FL) emerges as a pivotal technology capable of addressing the inherent issues of centralized data privacy. However, FL architectures with centralized orchestration are still vulnerable, especially in the aggregation phase. A malicious server can exploit the aggregation process to learn about participants' data. This study proposes MPCFL, a secure FL algorithm based on secure multi-party computation (MPC) and secret sharing. The proposed algorithm leverages the Sharemind MPC framework to aggregate local model updates for securely formulating a global model. MPCFL provides practical mitigation of trending FL concerns, e.g., inference attack, gradient leakage attack, model poisoning, and model inversion. The algorithm is evaluated on several benchmark datasets and shows promising results. Our results demonstrate that the proposed algorithm is viable for developing secure and privacy-preserving FL applications, significantly improving all performance metrics while maintaining security and reliability. This investigation is a precursor to deeper explorations to craft robust FL aggregation algorithms.
引用
收藏
页数:10
相关论文
共 50 条
  • [21] A New Efficient Secure Multi-party Computation
    Tang Yonglong
    EMERGING SYSTEMS FOR MATERIALS, MECHANICS AND MANUFACTURING, 2012, 109 : 626 - 630
  • [22] FairplayMP - A System for Secure Multi-Party Computation
    Ben-David, Assaf
    Nisan, Noam
    Pinkas, Benny
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 257 - 266
  • [23] Secure multi-party computation made simple
    Maurer, U
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 14 - 28
  • [24] THE STUDY ON GENERAL SECURE MULTI-PARTY COMPUTATION
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Chen, Tzer-Shyong
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (1B): : 895 - 910
  • [25] Secure multi-party computation in large networks
    Varsha Dani
    Valerie King
    Mahnush Movahedi
    Jared Saia
    Mahdi Zamani
    Distributed Computing, 2017, 30 : 193 - 229
  • [26] Secure Multi-Party Computation without Agreement
    Shafi Goldwasser
    Yehuda Lindell
    Journal of Cryptology, 2005, 18 : 247 - 287
  • [27] Wiretap Codes for Secure Multi-Party Computation
    Thobaben, Ragnar
    Dan, Gyorgy
    Sandberg, Henrik
    2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1349 - 1354
  • [28] Secure Multi-Party Computation with Identifiable Abort
    Ishai, Yuval
    Ostrovsky, Rafail
    Zikas, Vassilis
    ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 369 - 386
  • [29] Learning Without Peeking: Secure Multi-party Computation Genetic Programming
    Kim, Jinhan
    Epitropakis, Michael G.
    Yoo, Shin
    SEARCH-BASED SOFTWARE ENGINEERING, SSBSE 2018, 2018, 11036 : 246 - 261
  • [30] Realistic Failures in Secure Multi-party Computation
    Zikas, Vassilis
    Hauser, Sarah
    Maurer, Ueli
    THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 274 - 293