YANG Ruizhe(杨睿哲)*,ZHAO Xuehui*,ZHANG Yanhua*,SI Pengbo*,TENG Yinglei**.[J].高技术通讯(英文),2022,28(4):337~344 |
|
The adaptive distributed learning based on homomorphic encryption and blockchain |
|
DOI:10.3772/j.issn.1006-6748.2022.04.001 |
中文关键词: |
英文关键词: blockchain, distributed machine learning (DML), privacy, security |
基金项目: |
Author Name | Affiliation | YANG Ruizhe(杨睿哲)* | (*Faculty of Information Technology, Beijing University of Technology, Beijing 100124, P.R.China)
(**School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) | ZHAO Xuehui* | (*Faculty of Information Technology, Beijing University of Technology, Beijing 100124, P.R.China)
(**School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) | ZHANG Yanhua* | (*Faculty of Information Technology, Beijing University of Technology, Beijing 100124, P.R.China)
(**School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) | SI Pengbo* | (*Faculty of Information Technology, Beijing University of Technology, Beijing 100124, P.R.China)
(**School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) | TENG Yinglei** | (*Faculty of Information Technology, Beijing University of Technology, Beijing 100124, P.R.China)
(**School of Electronic Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, P.R.China) |
|
Hits: 1266 |
Download times: 951 |
中文摘要: |
|
英文摘要: |
The privacy and security of data are recently research hotspots and challenges.For this issue, an adaptive scheme of distributed learning based on homomorphic encryption and blockchain is proposed. Specifically, in the form of homomorphic encryption, the computing party iteratively aggregates the learning models from distributed participants, so that the privacy of both the data and model is ensured. Moreover, the aggregations are recorded and verified by blockchain, which prevents attacks from malicious nodes and guarantees the reliability of learning. For these sophisticated privacy and security technologies, the computation cost and energy consumption in both the encrypted learning and consensus reaching are analyzed, based on which a joint optimization of computation resources allocation and adaptive aggregation to minimize loss function is established with the realistic solution followed. Finally, the simulations and analysis evaluate the performance of the proposed scheme. |
View Full Text
View/Add Comment Download reader |
Close |
|
|
|