Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning

被引:15
|
作者
Jiang, Yili [1 ,2 ]
Zhang, Kuan [2 ]
Qian, Yi [2 ]
Zhou, Liang [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Commun & Informat Engn, Nanjing 210003, Peoples R China
[2] Univ Nebraska Lincoln, Dept Elect & Comp Engn, Omaha, NE 68106 USA
关键词
Authentication; Protocols; Data models; Servers; Computational modeling; Privacy; Vehicular ad hoc networks; Distributed learning; privacy preservation; anonymous authentication; efficiency; COMMUNICATION;
D O I
10.1109/TIFS.2022.3181848
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Distributed learning is proposed as a promising technique to reduce heavy data transmissions in centralized machine learning. By allowing the participants training the model locally, raw data is unnecessarily uploaded to the centralized cloud server, reducing the risks of privacy leakage as well. However, the existing studies have shown that an adversary is able to derive the raw data by analyzing the obtained machine learning models. To tackle this challenge, the state-of-the-art solutions mainly depend on differential privacy and encryption techniques (e.g., homomorphic encryption). Whereas, differential privacy degrades data utility and leads to inaccurate learning, while encryption based approaches are not effective to all machine learning algorithms due to the limited operations and excessive computation cost. In this work, we propose a novel scheme to resolve the privacy issues from the anonymous authentication approach. Different from the two types of existing solutions, this approach is generalized to all machine learning algorithms without reducing data utility, while guaranteeing privacy preservation. In addition, it can be integrated with detection schemes against data poisoning attacks and free-rider attacks, being more practical for distributed learning. To this end, we first design a pairing-based certificateless signature scheme. Based on the signature scheme, we further propose an anonymous and efficient authentication protocol which supports dynamic batch verification. The proposed protocol guarantees the desired security properties while being computationally efficient. Formal security proof and analysis have been provided to demonstrate the achieved security properties, including confidentiality, anonymity, mutual authentication, unlinkability, unforgeability, forward security, backward security, and non-repudiation. In addition, the performance analysis reveals that our proposed protocol significantly reduces the time consumption in batch verification, achieving high computational efficiency.
引用
收藏
页码:2227 / 2240
页数:14
相关论文
共 50 条
  • [1] Anonymous and Efficient Authentication Scheme for Privacy-Preserving Federated Cross Learning
    Li, Zeshuai
    Liang, Xiaoyan
    [J]. ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 281 - 293
  • [2] An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications
    Ren, Jian
    Harn, Lein
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (03) : 1018 - 1025
  • [3] An Efficient Anonymous Authentication Scheme for Privacy-preserving in Smart Grid
    Xia, Xueya
    Ji, Sai
    [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [4] An improved efficient anonymous authentication with conditional privacy-preserving scheme for VANETs
    Cahyadi, Eko Fajar
    Hwang, Min-Shiang
    [J]. PLOS ONE, 2021, 16 (09):
  • [5] An efficient anonymous authentication and key agreement scheme with privacy-preserving for smart cities
    Xia, Xueya
    Ji, Sai
    Vijayakumar, Pandi
    Shen, Jian
    Rodrigues, Joel J. P. C.
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2021, 17 (06)
  • [6] Efficient privacy-preserving anonymous authentication scheme for human predictive online education system
    Jegadeesan, Subramani
    Obaidat, Mohammad S.
    Vijayakumar, Pandi
    Azees, Maria
    Karuppiah, Marimuthu
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2557 - 2571
  • [7] Efficient privacy-preserving anonymous authentication scheme for human predictive online education system
    Subramani Jegadeesan
    Mohammad S. Obaidat
    Pandi Vijayakumar
    Maria Azees
    Marimuthu Karuppiah
    [J]. Cluster Computing, 2022, 25 : 2557 - 2571
  • [8] EPPS: Efficient Privacy-Preserving Scheme in Distributed Deep Learning
    Li, Yiran
    Li, Hongwei
    Xu, Guowen
    Liu, Sen
    Lu, Rongxing
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [9] Efficient and privacy-preserving online face authentication scheme
    Li, Ming
    Yang, Xiaopeng
    Zhu, Hui
    Wang, Fengwei
    Li, Qi
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (05): : 205 - 215
  • [10] EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
    Azees, Maria
    Vijayakumar, Pandi
    Deboarh, Lazarus Jegatha
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2017, 18 (09) : 2467 - 2476