Secure peer-to-peer learning using feature embeddings

被引:1
|
作者
Kasturi, Anirudh [1 ]
Agrawal, Akshat [1 ]
Hota, Chittaranjan [1 ]
机构
[1] BITS Pilani, Comp Sci Dept, Hyderabad Campus, Hyderabad 500078, Telangana, India
关键词
Distributed learning; Communication efficiency; Privacy; Peer-to-Peer learning; Serverless computing;
D O I
10.1007/s10586-023-04155-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With more personal devices being connected to the internet, individuals are becoming increasingly concerned about privacy. Therefore, it is important to develop machine learning algorithms that can use customer data to create personalized models while still adhering to strict privacy laws. In this paper, we propose a robust solution to this problem in a distributed, asynchronous environment with a verifiable convergence rate. Our proposed framework trains a Convolutional Neural Network on each client and sends the feature embeddings to other clients for data aggregation. This allows each client to train a deep-learning model on feature embeddings gathered from various clients in a single communication cycle. We provide a detailed description of the architecture and execution of our suggested approach. Our technique's effectiveness is evaluated by comparing it to the top central training and federated learning (FL) algorithms, and our tests on diverse datasets demonstrate that our method outperforms FL in terms of accuracy and is comparable to central training algorithms. Our findings also show that our proposed method reduces data transfer by over 75% compared to FL, resulting in significant bandwidth savings. As a result, model training can assist companies with high security and data protection concerns in setting up reliable collaboration platforms without requiring a central service provider.
引用
收藏
页码:3471 / 3479
页数:9
相关论文
共 50 条
  • [1] Towards a Secure Peer-to-Peer Federated Learning Framework
    Piotrowski, Tim
    Nochta, Zoltan
    ADVANCES IN SERVICE-ORIENTED AND CLOUD COMPUTING, ESOCC 2022, 2022, 1617 : 19 - 31
  • [2] Collaborative IoT learning with secure peer-to-peer federated approach
    Hijazi, Neveen Mohammad
    Aloqaily, Moayad
    Guizani, Mohsen
    COMPUTER COMMUNICATIONS, 2024, 228
  • [3] A Peer-to-Peer Secure VoIP Architecture
    Cirani, Simone
    Pecori, Riccardo
    Veltri, Luca
    TRUSTWORTHY INTERNET, 2011, : 105 - 115
  • [4] Implementation of secure peer group in peer-to-peer network
    Li, ZP
    Dong, YG
    Zhuang, L
    Huang, JH
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 192 - 195
  • [5] Secure identity and location decoupling using peer-to-peer networks
    Herborn, S
    Hu, THT
    Boreli, R
    Seneviratne, A
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 617 - 624
  • [6] Secure peer-to-peer networks for trusted collaboration
    Hamlen, Kevin W.
    Thuraisingham, Bhavani
    2007 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2008, : 58 - 63
  • [7] Secure peer-to-peer networking: the JXTA example
    Americas, Sun Microsystems' iPlanet Professional Services Group
    IT Professional, 2002, 4 (02) : 53 - 57
  • [8] Is peer-to-peer secure enough for corporate use?
    Lawton, G
    COMPUTER, 2004, 37 (01) : 22 - 25
  • [9] Secure peer-to-peer Group Communication Framework
    Noda, J
    Taguchi, D
    Tani, M
    Nakamura, N
    NEC RESEARCH & DEVELOPMENT, 2003, 44 (04): : 333 - 339
  • [10] Secure Peer-to-Peer Trading for Multiplayer Games
    GauthierDickey, Chris
    Ritzdorf, Craig
    2012 11TH ANNUAL WORKSHOP ON NETWORK AND SYSTEMS SUPPORT FOR GAMES (NETGAMES), 2012,