Back to Search Start Over

BVDFed: Byzantine-resilient and verifiable aggregation for differentially private federated learning.

Authors :
Gao, Xinwen
Fu, Shaojing
Liu, Lin
Luo, Yuchuan
Source :
Frontiers of Computer Science; Oct2024, Vol. 18 Issue 5, p1-17, 17p
Publication Year :
2024

Abstract

Federated Learning (FL) has emerged as a powerful technology designed for collaborative training between multiple clients and a server while maintaining data privacy of clients. To enhance the privacy in FL, Differentially Private Federated Learning (DPFL) has gradually become one of the most effective approaches. As DPFL operates in the distributed settings, there exist potential malicious adversaries who manipulate some clients and the aggregation server to produce malicious parameters and disturb the learning model. However, existing aggregation protocols for DPFL concern either the existence of some corrupted clients (Byzantines) or the corrupted server. Such protocols are limited to eliminate the effects of corrupted clients and server when both are in existence simultaneously due to the complicated threat model. In this paper, we elaborate such adversarial threat model and propose BVDFed. To our best knowledge, it is the first Byzantine-resilient and Verifiable aggregation for Differentially private FEDerated learning. In specific, we propose Differentially Private Federated Averaging algorithm (DPFA) as our primary workflow of BVDFed, which is more lightweight and easily portable than traditional DPFL algorithm. We then introduce Loss Score to indicate the trustworthiness of disguised gradients in DPFL. Based on Loss Score, we propose an aggregation rule DPLoss to eliminate faulty gradients from Byzantine clients during server aggregation while preserving the privacy of clients’ data. Additionally, we design a secure verification scheme DPVeri that are compatible with DPFA and DPLoss to support the honest clients in verifying the integrity of received aggregated results. And DPVeri also provides resistance to collusion attacks with no more than t participants for our aggregation. Theoretical analysis and experimental results demonstrate our aggregation to be feasible and effective in practice. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
20952228
Volume :
18
Issue :
5
Database :
Complementary Index
Journal :
Frontiers of Computer Science
Publication Type :
Academic Journal
Accession number :
174454162
Full Text :
https://doi.org/10.1007/s11704-023-3142-5