Privacy-preserving cloud-edge collaborative learning without trusted third-party coordinator

被引:1
|
作者
Yu, Xiaopeng [1 ]
Tang, Dianhua [1 ,2 ]
Zhao, Wei [1 ]
机构
[1] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Edge computing; Collaborative learning; Parallel processing; Security and privacy; Homomorphic encryption; CRYPTOSYSTEMS; NOISE;
D O I
10.1186/s13677-023-00394-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud-edge collaborative learning has received considerable attention recently, which is an emerging distributed machine learning (ML) architecture for improving the performance of model training among cloud center and edge nodes. However, existing cloud-edge collaborative learning schemes cannot efficiently train high-performance models on large-scale sparse samples, and have the potential risk of revealing the privacy of sensitive data. In this paper, adopting homomorphic encryption (HE) cryptographic technique, we present a privacy-preserving cloud-edge collaborative learning over vertically partitioned data, which allows cloud center and edge node to securely train a shared model without a third-party coordinator, and thus greatly reduces the system complexity. Furthermore, the proposed scheme adopts the batching technique and single instruction multiple data (SIMD) to achieve parallel processing. Finally, the evaluation results show that the proposed scheme improves the model performance and reduces the training time compared with the existing methods; the security analysis indicates that our scheme can guarantee the security in semi-honest model.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Efficient privacy-preserving third-party auditing for ambient intelligence systems
    Wan, Changsheng
    Zhang, Juan
    Pei, Bei
    Chen, Changsong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (01) : 21 - 27
  • [22] TraceMixer: Privacy-Preserving Crowd-Sensing sans Trusted Third Party
    Ziegeldorf, Jan Henrik
    Henze, Martin
    Bavendiek, Jens
    Wehrle, Klaus
    2017 13TH ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES (WONS), 2017, : 17 - 24
  • [23] kubeFlower : A privacy-preserving framework for Kubernetes-based federated learning in cloud-edge environments
    Parra-Ullauri, Juan Marcelo
    Madhukumar, Hari
    Nicolaescu, Adrian-Cristian
    Zhang, Xunzheng
    Bravalheri, Anderson
    Hussain, Rasheed
    Vasilakos, Xenofon
    Nejabati, Reza
    Simeonidou, Dimitra
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 157 : 558 - 572
  • [24] Privacy-Preserving Multi-Party Access Control for Third-Party UAV Services
    George, Dominik Roy
    Sciancalepore, Savio
    Zannone, Nicola
    PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, : 19 - 30
  • [25] Privacy-Preserving Optimal Energy Management for Smart Grid With Cloud-Edge Computing
    Fu, Weiming
    Wan, Yanni
    Qin, Jiahu
    Kang, Yu
    Li, Li
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (06) : 4029 - 4038
  • [26] Privacy-Preserving Task Distribution Mechanism with Cloud-Edge IoT for the Mobile Crowdsensing
    Jiang, Liquan
    Qin, Zhiguang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [27] Smart Meter Data Obfuscation With a Hybrid Privacy-Preserving Data Publishing Scheme Without a Trusted Third Party
    Tran, Hong-Yen
    Hu, Jiankun
    Pota, Hemanshu R.
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (17) : 16080 - 16095
  • [28] A Privacy-preserving Data Collection and Processing Framework for Third-party UAV Services
    Liu, Tianyuan
    Guo, Hongpeng
    Danilov, Claudiu
    Nahrstedt, Klara
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 683 - 690
  • [29] Lightweight Accountable Privacy-Preserving Protocol Allowing the Cloud Client to Audit the Third-Party Auditor for Malicious Activities
    Frej, Mohamed Ben Haj
    Dichter, Julius
    Gupta, Navarun
    APPLIED SCIENCES-BASEL, 2019, 9 (15):
  • [30] Best-practice example from Australia: privacy-preserving approach using semi-trusted third-party models
    Churches, Tim
    EUROPEAN JOURNAL OF PUBLIC HEALTH, 2010, 20 : 102 - 102