AIセキュリティポータル K Program
Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems
Share
Abstract
Due to the rising awareness of privacy and security in machine learning applications, federated learning (FL) has received widespread attention and applied to several areas, e.g., intelligence healthcare systems, IoT-based industries, and smart cities. FL enables clients to train a global model collaboratively without accessing their local training data. However, the current FL schemes are vulnerable to adversarial attacks. Its architecture makes detecting and defending against malicious model updates difficult. In addition, most recent studies to detect FL from malicious updates while maintaining the model's privacy have not been sufficiently explored. This paper proposed blockchain-based federated learning with SMPC model verification against poisoning attacks for healthcare systems. First, we check the machine learning model from the FL participants through an encrypted inference process and remove the compromised model. Once the participants' local models have been verified, the models are sent to the blockchain node to be securely aggregated. We conducted several experiments with different medical datasets to evaluate our proposed framework.
Edge-cloud computing and artificial intelligence in internet of medical things: Architecture, technology and application
L. Sun, X. Jiang, H. Ren, Y. Guo
Published: 2020
Research on disease prediction based on improved deepfm and iomt
Z. Yu, S. U. Amin, M. Alhussein, Z. Lv
Published: 2021
A framework for evaluating client privacy leakages in federated learning
W. Wei, L. Liu, M. Loper, K.-H. Chow, M. E. Gursoy, S. Truex, Y. Wu
Published: 2020
A survey on security and privacy of federated learning
V. Mothukuri, R. M. Parizi, S. Pouriyeh, Y. Huang, A. Dehghantanha, G. Srivastava
Published: 2021
Local Differential Privacy based Federated Learning for Internet of Things
Yang Zhao, Jun Zhao, Mengmeng Yang, Teng Wang, Ning Wang, Lingjuan Lyu, Dusit Niyato, Kwok-Yan Lam
Published: 4.19.2020
Anonymous and privacy-preserving federated learning with industrial big data
B. Zhao, K. Fan, K. Yang, Z. Wang, H. Li, Y. Yang
Published: 2021
Toward accurate anomaly detection in industrial internet of things using hierarchical federated learning
X. Wang, S. Garg, H. Lin, J. Hu, G. Kaddoum, M. Jalil Piran, M. S. Hossain
Published: 2022
Federated-learning-based anomaly detection for iot security attacks
Viraaji Mothukuri, Prachi Khare, Reza M Parizi, Seyedamin Pouriyeh, Ali Dehghantanha, Gautam Srivastava
Published: 2021
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning
Milad Nasr, Reza Shokri, Amir Houmansadr
Published: 12.4.2018
Batchcrypt: Efficient homomorphic encryption for cross-silo federated learning
C. Zhang, S. Li, J. Xia, W. Wang, F. Yan, Y. Liu
Published: 2020
Poisongan: Generative poisoning attacks against federated learning in edge computing systems
J. Zhang, B. Chen, X. Cheng, H. T. T. Binh, S. Yu
Published: 2020
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong
Published: 11.27.2019
How to backdoor federated learning
E. Bagdasaryan, A. Veit, Y. Hua, D. Estrin, V. Shmatikov
Published: 2020
Privacy-enhanced federated learning against poisoning adversaries
X. Liu, H. Li, G. Xu, Z. Chen, X. Huang, R. Lu
Published: 2021
Verifl: Communication-efficient and fast verifiable aggregation for federated learning
X. Guo, Z. Liu, J. Li, J. Gao, B. Hou, C. Dong, T. Baker
Published: 2021
Decentralized privacy using blockchain-enabled federated learning in fog computing
Y. Qu, L. Gao, T. H. Luan, Y. Xiang, S. Yu, B. Li, G. Zheng
Published: 2020
Vfchain: Enabling verifiable and auditable federated learning via blockchain systems
Z. Peng, J. Xu, X. Chu, S. Gao, Y. Yao, R. Gu, Y. Tang
Published: 2022
Blockchain-federated-learning and deep learning models for covid-19 detection using CT imaging
R. Kumar, A. A. Khan, J. Kumar, A. Zakria, N. A. Golilarz, S. Zhang, Y. Ting, C. Zheng, W. Wang
Published: 2021
Deep residual learning for image recognition
Kaiming He, Xiangyu Zhang, Shaoqing Ren, Jian Sun
Published: 2016
Distributed privacy preserving k-means clustering with additive secret sharing
M. C. Doganay, T. B. Pedersen, Y. Saygin, E. Savas¸, A. Levi
Published: 2008
Pysyft: A library for easy federated learning
A. Ziller, A. Trask, A. Lopardo, B. Szymkow, B. Wagner, E. Bluemke, J.M. Nounahon, J. Passerat-Palmbach, K. Prakash, N. Rose, et al.
Published: 2021
Python programming language.
G. Van Rossum
Published: 2007
Medmnist classification decathlon: A lightweight automl benchmark for medical image analysis
J. Yang, R. Shi, B. Ni
Published: 2020
Model inversion attacks that exploit confidence information and basic countermeasures
Matt Fredrikson, Somesh Jha, Thomas Ristenpart
Published: 2015
Share