A Security-Oriented Architecture for Federated Learning in Cloud Environments

Federate architectures are able to provide a scalable and shared environment for the distributed training and testing of machine learning applications. However, federated learning architectures shows potential security vulnerabilities in particular to the data poisoning attacks, incoming from participants to the federation. In such a scenario, a malicious participant may inject bad data in order to sabotage the result of the training. Such attacks may provide both a downgrade of the general performance of the learned model and may compromise the fairness of the machine learning application. As such applications are growing in criticality, such learning models must face with security and privacy as well as with scalability issues. The aim of the paper is to improve federated models by providing an architecture base on cloud computing which grants these additional features. The paper also discusses technical details, in particular, the usage of blockchain schemes to provide integrity and homomorphic cryptography for guaranteeing privacy.

[1]  Youssef Iraqi,et al.  Blockchain-Based Distributed Trust and Reputation Management Systems: A Survey , 2020, IEEE Access.

[2]  Qiang Yang,et al.  Federated Machine Learning , 2019, ACM Trans. Intell. Syst. Technol..

[3]  Ernesto Damiani,et al.  Blockchain-Based E-Vote-as-a-Service , 2019, 2019 IEEE 12th International Conference on Cloud Computing (CLOUD).

[4]  Dave E. Eckhardt,et al.  A theoretical investigation of generalized voters for redundant systems , 1989, [1989] The Nineteenth International Symposium on Fault-Tolerant Computing. Digest of Papers.

[5]  Bing Chen,et al.  Poisoning Attack in Federated Learning using Generative Adversarial Nets , 2019, 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[6]  Hubert Eichner,et al.  Towards Federated Learning at Scale: System Design , 2019, SysML.

[7]  Wil M. P. van der Aalst,et al.  Workflow mining: discovering process models from event logs , 2004, IEEE Transactions on Knowledge and Data Engineering.

[8]  Misbah Liaqat,et al.  Federated cloud resource management: Review and discussion , 2017, J. Netw. Comput. Appl..

[9]  Corrado Aaron Visaggio,et al.  Adversarial deep learning for energy management in buildings , 2019, SummerSim.

[10]  Brian M. Gaff,et al.  Privacy and Big Data , 2014, Computer.

[11]  Marko Vukolic,et al.  Hyperledger fabric: a distributed operating system for permissioned blockchains , 2018, EuroSys.

[12]  Emanuele Bellini,et al.  A blockchain based Trusted Persistent Identifier system for Big Data in Science , 2019, Foundations of Computing and Decision Sciences.

[13]  Flora Amato,et al.  A Federation of Cognitive Cloud Services for Trusting Data Sources , 2018, CISIS.

[14]  Fakhri Karray,et al.  Multisensor data fusion: A review of the state-of-the-art , 2013, Inf. Fusion.

[15]  Franco Pirri,et al.  Enhancing IoT Data Dependability through a Blockchain Mirror Model , 2019, Future Internet.

[16]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[17]  Dawn Xiaodong Song,et al.  Targeted Backdoor Attacks on Deep Learning Systems Using Data Poisoning , 2017, ArXiv.

[18]  Lukasz Golab,et al.  FastFabric: Scaling Hyperledger Fabric to 20,000 Transactions per Second , 2019, International Conference on Blockchain.

[19]  Anit Kumar Sahu,et al.  Federated Learning: Challenges, Methods, and Future Directions , 2019, IEEE Signal Processing Magazine.

[20]  Shiho Moriai,et al.  Privacy-Preserving Deep Learning via Additively Homomorphic Encryption , 2018, IEEE Transactions on Information Forensics and Security.

[21]  Valentin-Alexandru Vladuta,et al.  Applying Neural Network Approach to Homomorphic Encrypted Data , 2018, 2018 10th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).

[22]  Yanjiao Chen,et al.  Privacy-Preserving Collaborative Deep Learning With Unreliable Participants , 2020, IEEE Transactions on Information Forensics and Security.

[23]  Mohammad Al-Rubaie,et al.  Privacy-Preserving Machine Learning: Threats and Solutions , 2018, IEEE Security & Privacy.

[24]  Juan Benet,et al.  IPFS - Content Addressed, Versioned, P2P File System , 2014, ArXiv.