Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3302505.3310070acmconferencesArticle/Chapter ViewAbstractPublication PagesiotdiConference Proceedingsconference-collections
research-article

On lightweight privacy-preserving collaborative learning for internet-of-things objects

Published: 15 April 2019 Publication History

Abstract

The Internet of Things (IoT) will be a main data generation infrastructure for achieving better system intelligence. This paper considers the design and implementation of a practical privacy-preserving collaborative learning scheme, in which a curious learning coordinator trains a better machine learning model based on the data samples contributed by a number of IoT objects, while the confidentiality of the raw forms of the training data is protected against the coordinator. Existing distributed machine learning and data encryption approaches incur significant computation and communication overhead, rendering them ill-suited for resource-constrained IoT objects. We study an approach that applies independent Gaussian random projection at each IoT object to obfuscate data and trains a deep neural network at the coordinator based on the projected data from the IoT objects. This approach introduces light computation overhead to the IoT objects and moves most workload to the coordinator that can have sufficient computing resources. Although the independent projections performed by the IoT objects address the potential collusion between the curious coordinator and some compromised IoT objects, they significantly increase the complexity of the projected data. In this paper, we leverage the superior learning capability of deep learning in capturing sophisticated patterns to maintain good learning performance. Extensive comparative evaluation shows that this approach outperforms other lightweight approaches that apply additive noisification for differential privacy and/or support vector machines for learning in the applications with light data pattern complexities.

References

[1]
2018. Crowd-ML. https://github.com/jihunhamm/Crowd-ML.
[2]
2018. PyTorch. https://pytorch.org/.
[3]
2018. Raspberry Pi 2 Model B. https://bit.ly/1b75SRj.
[4]
2018. Spambase data set. https://archive.ics.uci.edu/ml/datasets/spambase.
[5]
M. Abadi, A. Chu, I. Goodfellow, H. McMahan, I. Mironov, K. Talwar, and L. Zhang. 2016. Deep learning with differential privacy. In Proc. CCS. ACM, 308--318.
[6]
Nir Ailon and Bernard Chazelle. 2009. The fast Johnson-Lindenstrauss transform and approximate nearest neighbors. SIAM Journal on computing 39, 1 (2009), 302--322.
[7]
Jonathan Berr. 2018. Equifax breach exposed data for 143 million consumers. https://cbsn.ws/2Qc8VOg.
[8]
Michel Bierlaire, Ph L Toint, and Daniel Tuyttens. 1991. On iterative algorithms for linear least squares problems with bound constraints. Linear Algebra Appl. 143 (1991), 111--143.
[9]
Keith Bonawitz, Vladimir Ivanov, Ben Kreuter, Antonio Marcedone, H. Brendan McMahan, Sarvar Patel, Daniel Ramage, Aaron Segal, and Karn Seth. 2017. Practical secure aggregation for privacy preserving machine learning. In Proc. CCS. ACM, 1175--1191.
[10]
Avishek Joey Bose and Parham Aarabi. 2018. Adversarial Attacks on Face Detectors using Neural Net based Constrained Optimization. In Proc. Intl. Workshop Multimedia Signal Process.
[11]
Emmanuel J Candès and Michael B Wakin. 2008. An introduction to compressive sampling. IEEE Signal Process. Mag. 25, 2 (2008), 21--30.
[12]
Hervé Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, and Emmanuel Prouff. 2017. Privacy-Preserving Classification on Deep Neural Network. IACR Cryptology ePrint Archive 2017 (2017), 35.
[13]
Chih-Chung Chang and Chih-Jen Lin. 2018. LIBSVM - a library for support vector machines. https://www.csie.ntu.edu.tw/~cjlin/libsvm/.
[14]
Kamalika Chaudhuri and Claire Monteleoni. 2009. Privacy-preserving logistic regression. In Proc. NIPS. 289--296.
[15]
Zizhong Chen and Jack J Dongarra. 2005. Condition numbers of Gaussian random matrices. SIAM J. Matrix Anal. Appl. 27, 3 (2005), 603--620.
[16]
George Danezis and Claudia Diaz. 2008. A survey of anonymous communication channels. Technical Report. Microsoft Research. MSR-TR-2008-35.
[17]
C. Dwork. 2006. Differential privacy. In Proc. ICALP.
[18]
C. Dwork, F. McSherry, K. Nissim, and A. Smith. 2006. Calibrating noise to sensitivity in private data analysis. Conf. Theory of Cryptography (2006), 265--284.
[19]
Ran Gilad-Bachrach, Nathan Dowlin, Kim Laine, Kristin Lauter, Michael Naehrig, and John Wernsing. 2016. Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy. In Proc. ICML. 201--210.
[20]
Ian J. Goodfellow, Jonathon Shlens, and Christian Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In Proc. ICLR.
[21]
Google Cloud. 2018. Edge TPU. https://cloud.google.com/edge-tpu/.
[22]
Thore Graepel, Kristin Lauter, and Michael Naehrig. 2012. ML confidential: Machine learning on encrypted data. In Proc. Intl. Conf. Inf. Security & Cryptology. Springer, 1--21.
[23]
J. Hamm, A. Champion, G. Chen, M. Belkin, and D. Xuan. 2015. Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices. In Proc. ICDCS. IEEE, 11--20.
[24]
B. Hitaj, G. Ateniese, and F. Perez-Cruz. 2017. Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning. In Proc. CCS. ACM, 603--618.
[25]
Loc N Huynh, Youngki Lee, and Rajesh Krishna Balan. 2017. Deepmon: Mobile gpu-based deep learning framework for continuous vision applications. In Proc. MobiSys. ACM, 82--95.
[26]
Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. 2015. Deep learning. Nature 521, 7553 (2015), 436--444.
[27]
Yann LeCun, Corinna Corts, and Christopher J.C. Burges. 2018. The MNIST Database of Handwritten Digits. http://yann.lecun.com/exdb/mnist/.
[28]
Shancang Li, Li Da Xu, and Xinheng Wang. 2013. Compressed sensing signal and data acquisition in wireless sensor networks and internet of things. IEEE Trans. Ind. Informat. 9, 4 (2013), 2177--2186.
[29]
Bin Liu, Yurong Jiang, Fei Sha, and Ramesh Govindan. 2012. Cloud-enabled privacy-preserving collaborative learning for mobile sensing. In Proc. SenSys. ACM, 57--70.
[30]
Kun Liu, Hillol Kargupta, and Jessica Ryan. 2006. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. knowl. Data Eng. 18, 1 (2006), 92--106.
[31]
H Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Agüera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In AISTATS.
[32]
H Brendan McMahan, Daniel Ramage, Kunal Talwar, and Li Zhang. 2018. Learning Differentially Private Recurrent Language Models. In Proc. ICLR.
[33]
Arvind Narayanan and Vitaly Shmatikov. 2006. How to break anonymity of the netflix prize dataset. arXiv preprint cs/0610105 (2006).
[34]
Lindsey O'Donnell. 2018. Zero-Day Flash Exploit Targeting Middle East. https://threatpost.com/zero-day-flash-exploit-targeting-middle-east/132659/.
[35]
Christopher C Paige and Michael A Saunders. 1982. LSQR: An algorithm for sparse linear equations and sparse least squares. ACM Trans. Math. Software 8, 1 (1982), 43--71.
[36]
L. Phong, Y. Aono, T. Hayashi, L. Wang, and S. Moriai. 2018. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. IEEE Trans. Inf. Forensics Security 13, 5 (2018).
[37]
Yaron Rachlin and Dror Baron. 2008. The secrecy of compressed sensing measurements. In Proc. Allerton. IEEE, 813--817.
[38]
Reuters. 2018. Facebook critics want regulation, investigation after data misuse. https://reut.rs/2GwKF8p.
[39]
Yiran Shen, Chengwen Luo, Dan Yin, Hongkai Wen, Rus Daniela, and Wen Hu. 2018. Privacy-preserving sparse representation classification in cloud-enabled mobile applications. Comput. Netw. 133 (2018), 59--72.
[40]
R. Shokri and V. Shmatikov. 2015. Privacy-preserving deep learning. In Proc. CCS. ACM, 1310--1321.
[41]
Shuang Song, Kamalika Chaudhuri, and Anand D Sarwate. 2013. Stochastic gradient descent with differentially private updates. In Proc. GlobalSIP. IEEE, 245--248.
[42]
Johan AK Suykens. 2003. Advances in learning theory: methods, models, and applications. Vol. 190. IOS Press.
[43]
Rui Tan, Sheng-Yuan Chiu, Hoang Hai Nguyen, David KY Yau, and Deokwoo Jung. 2017. A Joint Data Compression and Encryption Approach for Wireless Energy Auditing Networks. ACM Trans. Sensor Networks 13, 2 (2017), 9.
[44]
Cong Wang, Bingsheng Zhang, Kui Ren, and Janet M Roveda. 2013. Privacy-assured outsourcing of image reconstruction service in cloud. IEEE Trans. Emerg. Topics Comput. 1, 1 (2013), 166--177.
[45]
Piotr Iwo Wójcik and Marcin Kurdziel. 2018. Training neural networks on high-dimensional data using random projection. Pattern Anal. Appl. (2018), 1--11.
[46]
Wanli Xue, Chenwen Luo, Guohao Lan, Rajib Rana, Wen Hu, and Aruna Seneviratne. 2017. Kryptein: a compressive-sensing-based encryption scheme for the internet of things. In Proc. IPSN. IEEE, 169--180.
[47]
Shuochao Yao, Yiran Zhao, Aston Zhang, Lu Su, and Tarek Abdelzaher. 2017. DeepIoT: Compressing deep neural network structures for sensing systems with a compressor-critic framework. In Proc. SenSys. ACM, 4:1--4:14.
[48]
Stephan Zheng, Yang Song, Thomas Leung, and Ian Goodfellow. 2016. Improving the robustness of deep neural networks via stability training. In Proc. CVPR. IEEE, 4480--4488.

Cited By

View all
  • (2024)A Survey of Trustworthy Federated Learning: Issues, Solutions, and ChallengesACM Transactions on Intelligent Systems and Technology10.1145/3678181Online publication date: 23-Jul-2024
  • (2024)Heterogeneous Ensemble Federated Learning With GAN-Based Privacy PreservationIEEE Transactions on Sustainable Computing10.1109/TSUSC.2024.33500409:4(591-601)Online publication date: Jul-2024
  • (2024)Trustworthy Federated Learning: A Comprehensive Review, Architecture, Key Challenges, and Future Research ProspectsIEEE Open Journal of the Communications Society10.1109/OJCOMS.2024.34382645(4920-4998)Online publication date: 2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
IoTDI '19: Proceedings of the International Conference on Internet of Things Design and Implementation
April 2019
299 pages
ISBN:9781450362832
DOI:10.1145/3302505
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

In-Cooperation

  • IEEE CS

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 April 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. collaborative learning
  2. internet of things
  3. privacy

Qualifiers

  • Research-article

Funding Sources

  • Nanyang Technological University

Conference

IoTDI '19
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)1
Reflects downloads up to 18 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Survey of Trustworthy Federated Learning: Issues, Solutions, and ChallengesACM Transactions on Intelligent Systems and Technology10.1145/3678181Online publication date: 23-Jul-2024
  • (2024)Heterogeneous Ensemble Federated Learning With GAN-Based Privacy PreservationIEEE Transactions on Sustainable Computing10.1109/TSUSC.2024.33500409:4(591-601)Online publication date: Jul-2024
  • (2024)Trustworthy Federated Learning: A Comprehensive Review, Architecture, Key Challenges, and Future Research ProspectsIEEE Open Journal of the Communications Society10.1109/OJCOMS.2024.34382645(4920-4998)Online publication date: 2024
  • (2024)i-CardiAx: Wearable IoT-Driven System for Early Sepsis Detection Through Long-Term Vital Sign Monitoring2024 IEEE/ACM Ninth International Conference on Internet-of-Things Design and Implementation (IoTDI)10.1109/IoTDI61053.2024.00013(97-109)Online publication date: 13-May-2024
  • (2024)A comprehensive survey and taxonomy on privacy-preserving deep learningNeurocomputing10.1016/j.neucom.2024.127345576(127345)Online publication date: Apr-2024
  • (2024)Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of ThingsArabian Journal for Science and Engineering10.1007/s13369-024-08884-z49:9(12919-12934)Online publication date: 22-Mar-2024
  • (2024)Intersection of machine learning and mobile crowdsourcing: a systematic topic-driven reviewPersonal and Ubiquitous Computing10.1007/s00779-024-01820-wOnline publication date: 10-Jun-2024
  • (2024)Effective privacy preserving model based on adversarial CNN with IBOA in the social IoT systems for CECInternational Journal of Communication Systems10.1002/dac.5669Online publication date: 10-Jan-2024
  • (2023)A Survey on Collaborative Learning for Intelligent Autonomous SystemsACM Computing Surveys10.1145/362554456:4(1-37)Online publication date: 10-Nov-2023
  • (2023)A Survey of Trustworthy Federated Learning with Perspectives on Security, Robustness and PrivacyCompanion Proceedings of the ACM Web Conference 202310.1145/3543873.3587681(1167-1176)Online publication date: 30-Apr-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media