Secure peer-to-peer learning using feature embeddings

被引:1
|
作者
Kasturi, Anirudh [1 ]
Agrawal, Akshat [1 ]
Hota, Chittaranjan [1 ]
机构
[1] BITS Pilani, Comp Sci Dept, Hyderabad Campus, Hyderabad 500078, Telangana, India
关键词
Distributed learning; Communication efficiency; Privacy; Peer-to-Peer learning; Serverless computing;
D O I
10.1007/s10586-023-04155-y
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With more personal devices being connected to the internet, individuals are becoming increasingly concerned about privacy. Therefore, it is important to develop machine learning algorithms that can use customer data to create personalized models while still adhering to strict privacy laws. In this paper, we propose a robust solution to this problem in a distributed, asynchronous environment with a verifiable convergence rate. Our proposed framework trains a Convolutional Neural Network on each client and sends the feature embeddings to other clients for data aggregation. This allows each client to train a deep-learning model on feature embeddings gathered from various clients in a single communication cycle. We provide a detailed description of the architecture and execution of our suggested approach. Our technique's effectiveness is evaluated by comparing it to the top central training and federated learning (FL) algorithms, and our tests on diverse datasets demonstrate that our method outperforms FL in terms of accuracy and is comparable to central training algorithms. Our findings also show that our proposed method reduces data transfer by over 75% compared to FL, resulting in significant bandwidth savings. As a result, model training can assist companies with high security and data protection concerns in setting up reliable collaboration platforms without requiring a central service provider.
引用
收藏
页码:3471 / 3479
页数:9
相关论文
共 50 条
  • [41] A secure multicast model for peer-to-peer and access networks using the Host Identity Protocol
    Zhu, Xueyong
    Atwood, J. William
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 1098 - +
  • [42] Peer-to-peer computing for secure high performance data copying
    Hanushevsky, A
    Trunov, A
    Cottrell, L
    PROCEEDINGS OF CHEP 2001, 2001, : 444 - 447
  • [43] Scaling secure group communication systems: Beyond peer-to-peer
    Amir, Y
    Nita-Rotaru, C
    Stanton, J
    Tsudik, G
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, : 226 - 237
  • [44] Peer-to-peer secure and private community based multimedia communications
    Frangoudis, Pantelis A.
    Polyzos, George C.
    ISM 2006: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2006, : 1004 - +
  • [45] Secure Referee Selection for Fair and Responsive Peer-to-Peer Gaming
    Webb, Steven Daniel
    Soh, Sieteng
    Trahan, Jerry L.
    SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2009, 85 (09): : 608 - 618
  • [46] An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games
    Zhi-Yuan Li
    Lu Liu
    Ru-Long Chen
    Jun-Lei Bi
    Peer-to-Peer Networking and Applications, 2016, 9 : 1005 - 1019
  • [47] Peer-to-Peer Secure Multi-Party Numerical Computation
    Bickson, Danny
    Dolev, Danny
    Bezman, Genia
    Pinkas, Benny
    P2P'08: EIGHTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2008, : 257 - +
  • [48] Secure Interdependent Networks for Peer-to-Peer and Online Social Network
    Han, Qiyi
    Wen, Hong
    Feng, Gang
    Wang, Longye
    Pan, Fei
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [49] Secure acknowledgment of multicast messages in open peer-to-peer networks
    Nicolosi, A
    Mazières, D
    PEER-TO-PEER SYSTEMS III, 2004, 3279 : 259 - 268
  • [50] An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games
    Li, Zhi-Yuan
    Liu, Lu
    Chen, Ru-Long
    Bi, Jun-Lei
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (06) : 1005 - 1019