Double Perturbation-Based Privacy-Preserving Federated Learning against Inference Attack

被引:2
|
作者
Jiang, Yongqi [1 ]
Shi, Yanhang [1 ]
Chen, Siguang [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Internet Things, Nanjing, Peoples R China
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Federated learning; inference attack; privacy; preservation; perturbation;
D O I
10.1109/GLOBECOM48099.2022.10001075
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Federated Learning (FL) is a well discussed distributed training framework, which allows scattered clients to collaboratively train a central model without directly sharing raw data. However, recent researches have stated that the model updates or gradients uploaded by FL can be used to infer sensitive data of clients, and this attack poses severe threats to FL. Several solutions are developed to address this threat. Although these solutions can achieve privacy preservation to a certain extent, their accuracy is severely degraded, and they are unable to provide strong privacy protection. Under this background, we propose a double perturbation-based privacy-preserving federated learning method, in which a feature extractor and an additional blurry function are utilized to improve the objective function of Conditional Generative Adversarial Networks (CGANs) and the generated data by CGANs are mixed with real data to construct fake-training data. Meanwhile, we design an algorithm to perturb the information contained in the gradient of fully connected layers that is most favorable for the attacker to reconstruct data. Finally, simulation results show that our developed method can effectively resist inference attack with a negligible decline in accuracy.
引用
收藏
页码:5451 / 5456
页数:6
相关论文
共 50 条
  • [1] Efficient Privacy-Preserving Federated Learning Against Inference Attacks for IoT
    Miao, Yifeng
    Chen, Siguang
    2023 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC, 2023,
  • [2] BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack
    Ren, Yanli
    Hu, Mingqi
    Yang, Zhe
    Feng, Guorui
    Zhang, Xinpeng
    INFORMATION SCIENCES, 2024, 665
  • [3] BPFL: Blockchain-based privacy-preserving federated learning against poisoning attack
    Ren, Yanli
    Hu, Mingqi
    Yang, Zhe
    Feng, Guorui
    Zhang, Xinpeng
    Information Sciences, 2024, 665
  • [4] Staged Noise Perturbation for Privacy-Preserving Federated Learning
    Li, Zhe
    Chen, Honglong
    Gao, Yudong
    Ni, Zhichen
    Xue, Huansheng
    Shao, Huajie
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2024, 9 (06): : 936 - 947
  • [5] Cross the Chasm: Scalable Privacy-Preserving Federated Learning against Poisoning Attack
    Li, Yiran
    Hu, Guiqiang
    Liu, Xiaoyuan
    Ying, Zuobin
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [6] An Attack-Defense Game-Based Reinforcement Learning Privacy-Preserving Method Against Inference Attack in Double Auction Market
    Li, Donghe
    Hu, Chunlin
    Yang, Qingyu
    Ma, Yuhao
    Zhang, Feiye
    An, Dou
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024,
  • [7] RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack
    Miao, Yinbin
    Yan, Xinru
    Li, Xinghua
    Xu, Shujiang
    Liu, Ximeng
    Li, Hongwei
    Deng, Robert H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 5814 - 5827
  • [8] Turning Privacy-preserving Mechanisms against Federated Learning
    Arazzi, Marco
    Conti, Mauro
    Nocera, Antonino
    Picek, Stjepan
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1482 - 1495
  • [9] Adversarial Privacy-Preserving Graph Embedding Against Inference Attack
    Li, Kaiyang
    Luo, Guangchun
    Ye, Yang
    Li, Wei
    Ji, Shihao
    Cai, Zhipeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08) : 6904 - 6915
  • [10] Novel Temporal Perturbation-Based Privacy-Preserving Mechanism for Smart Meters
    Xiaoyan Wang
    Zhenquan Xu
    Ziwei Cai
    Tao Wang
    Mobile Networks and Applications, 2020, 25 : 1548 - 1562