volume 522 pages 69-79

A training-integrity privacy-preserving federated learning scheme with trusted execution environment

Publication typeJournal Article
Publication date2020-06-01
scimago Q1
wos Q1
SJR1.803
CiteScore14.4
Impact factor6.8
ISSN00200255, 18726291
Computer Science Applications
Artificial Intelligence
Software
Control and Systems Engineering
Theoretical Computer Science
Information Systems and Management
Abstract
Machine learning models trained on sensitive real-world data promise improvements to everything from medical screening to disease outbreak discovery. In many application domains, learning participants would benefit from pooling their private datasets, training precise machine learning models on the aggregate data, and sharing the profits of using these models. Considering privacy and security concerns often prevent participants from contributing sensitive data for training, researchers proposed several techniques to achieve data privacy in federated learning systems. However, such techniques are susceptible to causative attacks, whereby malicious participants can inject false training results with the aim of corrupting the well-learned model. To end this, in this paper, we propose a new privacy-preserving federated learning scheme that guarantees the integrity of deep learning processes. Based on the Trusted Execution Environment (TEE), we design a training-integrity protocol for this scheme, in which causative attacks can be detected. Thus, each participant is compelled to execute the privacy-preserving learning algorithm of the scheme correctly. We evaluate the performance of our scheme by prototype implementations. The experimental result shows that the scheme is training-integrity and practical.
Found 
Found 

Top-30

Journals

2
4
6
8
10
12
IEEE Access
11 publications, 6.88%
Information Sciences
7 publications, 4.38%
IEEE Internet of Things Journal
5 publications, 3.13%
Applied Sciences (Switzerland)
4 publications, 2.5%
Journal of Network and Computer Applications
4 publications, 2.5%
IEEE Transactions on Information Forensics and Security
4 publications, 2.5%
Lecture Notes in Computer Science
4 publications, 2.5%
ACM Transactions on Intelligent Systems and Technology
3 publications, 1.88%
Mathematics
3 publications, 1.88%
Artificial Intelligence Review
3 publications, 1.88%
Computers and Security
3 publications, 1.88%
Security and Communication Networks
3 publications, 1.88%
IEEE Communications Surveys and Tutorials
3 publications, 1.88%
Future Internet
2 publications, 1.25%
Knowledge and Information Systems
2 publications, 1.25%
Future Generation Computer Systems
2 publications, 1.25%
Knowledge-Based Systems
2 publications, 1.25%
Applied Soft Computing Journal
2 publications, 1.25%
International Journal of Intelligent Systems
2 publications, 1.25%
Adaptation, Learning, and Optimization
2 publications, 1.25%
Communications in Computer and Information Science
2 publications, 1.25%
Honeypot Frameworks and Their Applications: A New Framework
2 publications, 1.25%
ACM Computing Surveys
2 publications, 1.25%
IEEE Transactions on Dependable and Secure Computing
2 publications, 1.25%
Lecture Notes in Networks and Systems
2 publications, 1.25%
IEEE Transactions on Neural Networks and Learning Systems
2 publications, 1.25%
Scientific Reports
2 publications, 1.25%
IEEE Open Journal of Vehicular Technology
2 publications, 1.25%
Big Data
1 publication, 0.63%
2
4
6
8
10
12

Publishers

10
20
30
40
50
60
Institute of Electrical and Electronics Engineers (IEEE)
60 publications, 37.5%
Elsevier
33 publications, 20.63%
Springer Nature
29 publications, 18.13%
Association for Computing Machinery (ACM)
10 publications, 6.25%
MDPI
10 publications, 6.25%
Wiley
4 publications, 2.5%
Hindawi Limited
3 publications, 1.88%
Institution of Engineering and Technology (IET)
2 publications, 1.25%
Mary Ann Liebert
1 publication, 0.63%
King Saud University
1 publication, 0.63%
Walter de Gruyter
1 publication, 0.63%
SAGE
1 publication, 0.63%
Research Square Platform LLC
1 publication, 0.63%
Apex Publishing
1 publication, 0.63%
IOP Publishing
1 publication, 0.63%
10
20
30
40
50
60
  • We do not take into account publications without a DOI.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
160
Share
Cite this
GOST |
Cite this
GOST Copy
Chen Yu. et al. A training-integrity privacy-preserving federated learning scheme with trusted execution environment // Information Sciences. 2020. Vol. 522. pp. 69-79.
GOST all authors (up to 50) Copy
Chen Yu., Luo F., Li T., Xiang T., Liu Z., Li J. A training-integrity privacy-preserving federated learning scheme with trusted execution environment // Information Sciences. 2020. Vol. 522. pp. 69-79.
RIS |
Cite this
RIS Copy
TY - JOUR
DO - 10.1016/j.ins.2020.02.037
UR - https://doi.org/10.1016/j.ins.2020.02.037
TI - A training-integrity privacy-preserving federated learning scheme with trusted execution environment
T2 - Information Sciences
AU - Chen, Yu
AU - Luo, Fang
AU - Li, Tong
AU - Xiang, Tao
AU - Liu, Zhe-Li
AU - Li, Jin
PY - 2020
DA - 2020/06/01
PB - Elsevier
SP - 69-79
VL - 522
SN - 0020-0255
SN - 1872-6291
ER -
BibTex
Cite this
BibTex (up to 50 authors) Copy
@article{2020_Chen,
author = {Yu Chen and Fang Luo and Tong Li and Tao Xiang and Zhe-Li Liu and Jin Li},
title = {A training-integrity privacy-preserving federated learning scheme with trusted execution environment},
journal = {Information Sciences},
year = {2020},
volume = {522},
publisher = {Elsevier},
month = {jun},
url = {https://doi.org/10.1016/j.ins.2020.02.037},
pages = {69--79},
doi = {10.1016/j.ins.2020.02.037}
}