Federated Singular Vector Decomposition

With the promulgation of data protection laws (e.g., GDPR in 2018), privacy preservation has become a general agreement in applications where cross-domain sensitive data are utilized. Out of many privacy-preserving techniques, federated learning (FL) has received much attention as a bridge for secure data connection and cooperation. Although FL’s research works have surged, some classical data modeling methods are not well accommodated in FL. In this paper, we propose the first masking-based federated singular vector decomposition method, called FedSVD. FedSVD protects the raw data through a singular value invariance mask, which can be further removed from the SVD results. Compared with prior privacy-preserving SVD solutions, FedSVD has lossless results, high confidentiality, and excellent scalability. We provide privacy proof showing that FedSVD has guaranteed data confidentiality. Empirical experiments on real-life datasets and synthetic data have verified the effectiveness of our method. The reconstruction error of FedSVD is around 0.000001% of the raw data, validating the lossless property of FedSVD. The scalability of FedSVD is nearly the same as the standalone SVD algorithm. Hence, FedSVD can bring privacy protection almost without sacrificing any computation time or communication overhead.

[1]  Fillia Makedon,et al.  Using singular value decomposition approximation for collaborative filtering , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).

[2]  Yi Mu,et al.  Cloud-Based Outsourcing for Enabling Privacy-Preserving Large-Scale Non-Negative Matrix Factorization , 2019, IEEE Transactions on Services Computing.

[3]  A. Rukhin Matrix Variate Distributions , 1999, The Multivariate Normal Distribution.

[4]  Jon Crowcroft,et al.  Federated Principal Component Analysis , 2019, NeurIPS.

[5]  Zhenguo Li,et al.  Federated Meta-Learning with Fast Convergence and Efficient Communication , 2018, 1802.07876.

[6]  Changqing Luo,et al.  SecFact: Secure Large-scale QR and LU Factorizations , 2017, IEEE Transactions on Big Data.

[7]  Alex Krizhevsky,et al.  Learning Multiple Layers of Features from Tiny Images , 2009 .

[8]  Peter Wiemer-Hastings,et al.  Latent semantic analysis , 2004, Annu. Rev. Inf. Sci. Technol..

[9]  Yang Liu,et al.  Federated Learning , 2019, Synthesis Lectures on Artificial Intelligence and Machine Learning.

[10]  Wenliang Du,et al.  SVD-based collaborative filtering with privacy , 2005, SAC '05.

[11]  Q. Guo,et al.  An Efficient SVD-Based Method for Image Denoising , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[12]  G. Stewart,et al.  Reorthogonalization and stable algorithms for updating the Gram-Schmidt QR factorization , 1976 .

[13]  Kai Chen,et al.  Secure Federated Matrix Factorization , 2019, IEEE Intelligent Systems.

[14]  Peter Richtárik,et al.  Federated Learning: Strategies for Improving Communication Efficiency , 2016, ArXiv.

[15]  Ivan Damgård,et al.  Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.

[16]  Hyunsoo Yoon,et al.  Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption , 2016, IACR Cryptol. ePrint Arch..

[17]  Heng Tao Shen,et al.  Principal Component Analysis , 2009, Encyclopedia of Biometrics.

[18]  István Hegedüs,et al.  Fully distributed robust singular value decomposition , 2014, 14-th IEEE International Conference on Peer-to-Peer Computing.

[19]  Stratis Ioannidis,et al.  Privacy-preserving matrix factorization , 2013, CCS.

[20]  Roksana Boreli,et al.  Applying Differential Privacy to Matrix Factorization , 2015, RecSys.

[21]  Sarvar Patel,et al.  Practical Secure Aggregation for Federated Learning on User-Held Data , 2016, ArXiv.

[22]  Gerald E. Plassman A Survey of Singular Value Decomposition Methods and Performance Comparison of Some Available Serial Codes , 2013 .

[23]  Yuanman Li,et al.  Secure and Verifiable Outsourcing of Large-Scale Nonnegative Matrix Factorization (NMF) , 2021, IEEE Transactions on Services Computing.

[24]  Yehuda Lindell,et al.  How To Simulate It - A Tutorial on the Simulation Proof Technique , 2016, IACR Cryptol. ePrint Arch..

[25]  Blaise Agüera y Arcas,et al.  Communication-Efficient Learning of Deep Networks from Decentralized Data , 2016, AISTATS.

[26]  Yehuda Koren,et al.  Matrix Factorization Techniques for Recommender Systems , 2009, Computer.

[27]  Anand Rangarajan,et al.  Image Denoising Using the Higher Order Singular Value Decomposition , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[28]  Philip S. Yu,et al.  Privacy-Preserving Singular Value Decomposition , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[29]  Sheng Zhong,et al.  Secure and Efficient Outsourcing of PCA-Based Face Recognition , 2020, IEEE Transactions on Information Forensics and Security.

[30]  Simon Haykin,et al.  GradientBased Learning Applied to Document Recognition , 2001 .