Decentralized Privacy Using Blockchain-Enabled Federated Learning in Fog Computing

As the extension of cloud computing and a foundation of IoT, fog computing is experiencing fast prosperity because of its potential to mitigate some troublesome issues, such as network congestion, latency, and local autonomy. However, privacy issues and the subsequent inefficiency are dragging down the performances of fog computing. The majority of existing works hardly consider a reasonable balance between them while suffering from poisoning attacks. To address the aforementioned issues, we propose a novel blockchain-enabled federated learning (FL-Block) scheme to close the gap. FL-Block allows local learning updates of end devices exchanges with a blockchain-based global learning model, which is verified by miners. Built upon this, FL-Block enables the autonomous machine learning without any centralized authority to maintain the global model and coordinates by using a Proof-of-Work consensus mechanism of the blockchain. Furthermore, we analyze the latency performance of FL-Block and further derive the optimal block generation rate by taking communication, consensus delays, and computation cost into consideration. Extensive evaluation results show the superior performances of FL-Block from the aspects of privacy protection, efficiency, and resistance to the poisoning attack.

[1]  Wanlei Zhou,et al.  A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks , 2018, IEEE Transactions on Computational Social Systems.

[2]  Takayuki Nishio,et al.  Client Selection for Federated Learning with Heterogeneous Resources in Mobile Edge , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[3]  Rong Yu,et al.  Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.

[4]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[5]  Lei Yang,et al.  Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC , 2018, Wirel. Commun. Mob. Comput..

[6]  Matteo Bernardini,et al.  Blockchains Meet Distributed Hash Tables: Decoupling Validation from State Storage , 2019, DLT@ITASEC.

[7]  Kemal Akkaya,et al.  Privacy-Preserving Power Injection Over a Hybrid AMI/LTE Smart Grid Network , 2017, IEEE Internet of Things Journal.

[8]  Jelena V. Misic,et al.  Security and Privacy of Connected Vehicular Cloud Computing , 2018, IEEE Netw..

[9]  Xuefeng Liu,et al.  Privacy-Preserving Reputation Management for Edge Computing Enhanced Mobile Crowdsensing , 2019, IEEE Transactions on Services Computing.

[10]  Peter Richtárik,et al.  Federated Learning: Strategies for Improving Communication Efficiency , 2016, ArXiv.

[11]  Dusit Niyato,et al.  Auction Mechanisms in Cloud/Fog Computing Resource Allocation for Public Blockchain Networks , 2018, IEEE Transactions on Parallel and Distributed Systems.

[12]  Guidelines for evaluation of radio interface technologies for IMT-Advanced , 2008 .

[13]  Ahmed Ahmim,et al.  Privacy-Preserving Schemes for Ad Hoc Social Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.

[14]  Peter Richtárik,et al.  Federated Optimization: Distributed Machine Learning for On-Device Intelligence , 2016, ArXiv.

[15]  Yuan-Shun Dai,et al.  Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds , 2018, IEEE Transactions on Emerging Topics in Computing.

[16]  Xu Chen,et al.  In-Edge AI: Intelligentizing Mobile Edge Computing, Caching and Communication by Federated Learning , 2018, IEEE Network.

[17]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[18]  Mauro Conti,et al.  Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.

[19]  Jie Li,et al.  A novel broadcast authentication protocol for internet of vehicles , 2016, Peer-to-Peer Networking and Applications.

[20]  Xiangjian He,et al.  Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[21]  Gang Qu,et al.  A Privacy-Preserving Trust Model Based on Blockchain for VANETs , 2018, IEEE Access.

[22]  Yan Zhang,et al.  Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.

[23]  Rongxing Lu,et al.  Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications , 2018, IEEE Internet of Things Journal.

[24]  Roch H. Glitho,et al.  A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges , 2017, IEEE Communications Surveys & Tutorials.

[25]  Jianbing Ni,et al.  Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing , 2020, IEEE Transactions on Dependable and Secure Computing.

[26]  Jun Shao,et al.  Data Security and Privacy in Fog Computing , 2018, IEEE Network.

[27]  Cheng Huang,et al.  Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications , 2017, SecureComm.

[28]  Mario Gerla,et al.  Securing Vehicle to Vehicle Communications using Blockchain through Visible Light and Acoustic Side-Channels , 2017, ArXiv.

[29]  Walid Saad,et al.  Distributed Federated Learning for Ultra-Reliable Low-Latency Vehicular Communications , 2018, IEEE Transactions on Communications.

[30]  Lie-Liang Yang,et al.  Energy-Efficient Cross-Layer Design of Wireless Mesh Networks for Content Sharing in Online Social Networks , 2017, IEEE Transactions on Vehicular Technology.

[31]  Ke Xiao,et al.  Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things , 2018, IEEE Wireless Communications.

[32]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[33]  Tie Qiu,et al.  Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things , 2017, IEEE Internet of Things Journal.

[34]  Sung Bum Pan,et al.  Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs , 2018, Wirel. Commun. Mob. Comput..

[35]  Xiaodong Wang,et al.  Privacy on the Edge: Customizable Privacy-Preserving Context Sharing in Hierarchical Edge Computing , 2020, IEEE Transactions on Network Science and Engineering.

[36]  Qingqi Pei,et al.  Decentralized Privacy-Preserving Reputation Management for Mobile Crowdsensing , 2019, SecureComm.

[37]  Marimuthu Palaniswami,et al.  PPFA: Privacy Preserving Fog-Enabled Aggregation in Smart Grid , 2018, IEEE Transactions on Industrial Informatics.

[38]  Theodore S. Rappaport,et al.  Millimeter Wave Channel Modeling and Cellular Capacity Evaluation , 2013, IEEE Journal on Selected Areas in Communications.

[39]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.