Privacy Preservation for Federated Learning with Robust Aggregation in Edge Computing

Liu, Wentao and Xu, Xiaolong and Li, Dejuan and Qi, Lianyong and Dai, Fei and Dou, Wanchun and Ni, Qiang (2023) Privacy Preservation for Federated Learning with Robust Aggregation in Edge Computing. IEEE Internet of Things Journal, 10 (8). pp. 7343-7355. ISSN 2327-4662

[thumbnail of Privacy Preservation for Federated Learning with Robust Aggregation in Edge Computing]
Text (Privacy Preservation for Federated Learning with Robust Aggregation in Edge Computing)
Privacy_Preservation_for_Federated_Learning_with_Robust_Aggregation_in_Edge_Computing.pdf - Accepted Version
Available under License Creative Commons Attribution-NonCommercial.

Download (659kB)


Benefiting from the powerful data analysis and prediction capabilities of artificial intelligence (AI), the data on the edge is often transferred to the cloud center for centralized training to obtain an accurate model. To resist the risk of privacy leakage due to frequent data transmission between the edge and the cloud, federated learning (FL) is engaged in the edge paradigm, uploading the model updated on the edge server (ES) to the central server for aggregation, instead of transferring data directly. However, the adversarial ES can infer the update of other ESs from the aggregated model and the update may still expose some characteristics of data of other ESs. Besides, there is a certain probability that the entire aggregation is disrupted by the adversarial ESs through uploading a malicious update. In this paper, a privacy-preserving FL scheme with robust aggregation in edge computing is proposed, named FL-RAEC. First, the hybrid privacy-preserving mechanism is constructed to preserve the integrity and privacy of the data uploaded by the ESs. For the robust model aggregation, a phased aggregation strategy is proposed. Specifically, anomaly detection based on autoencoder is performed while some ESs are selected for anonymous trust verification at the beginning. In the next stage, via multiple rounds of random verification, the trust score of each ES is assessed to identify the malicious participants. Eventually, FL-RAEC is evaluated in detail, depicting that FL-RAEC has strong robustness and high accuracy under different attacks.

Item Type:
Journal Article
Journal or Publication Title:
IEEE Internet of Things Journal
Additional Information:
©2022 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
Uncontrolled Keywords:
?? computer networks and communicationscomputer science applicationshardware and architectureinformation systemssignal processingsignal processinginformation systemsinformation systems and managementcomputer science applicationshardware and architecturecompu ??
ID Code:
Deposited By:
Deposited On:
06 Jan 2023 15:10
Last Modified:
15 Jul 2024 23:24