Loading…

AI at the Edge: Blockchain-Empowered Secure Multiparty Learning With Heterogeneous Models

Edge computing, an emerging computing paradigm pushing data computing and storing to network edges, enables many applications that require high computing complexity, scalability, and security. In the big data era, one of the most critical applications is multiparty learning or federated learning, wh...

Full description

Saved in:
Bibliographic Details
Published in:IEEE internet of things journal 2020-10, Vol.7 (10), p.9600-9610
Main Authors: Wang, Qianlong, Guo, Yifan, Wang, Xufei, Ji, Tianxi, Yu, Lixing, Li, Pan
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Edge computing, an emerging computing paradigm pushing data computing and storing to network edges, enables many applications that require high computing complexity, scalability, and security. In the big data era, one of the most critical applications is multiparty learning or federated learning, which allows different parties to collaborate with each other to obtain better learning models without sharing their own data. However, there are several main concerns about the current multiparty learning systems. First, most existing systems are distributed and need a central server to coordinate the learning process. However, such a central server can easily become a single point of failure and may not be trustworthy. Second, although quite a few schemes have been proposed to study Byzantine attacks, a very common and challenging kind of attack in distributed systems, they generally consider the scenario of learning a global model. However, in fact, all parties in multiparty learning usually have their own local models. The learning methods and security issues, in this case, are not fully explored. In this article, we propose a novel blockchain-empowered decentralized secure multiparty learning system with heterogeneous local models called BEMA. Particularly, we consider two types of Byzantine attacks, and carefully design "off-chain sample mining" and "on-chain mining " schemes to protect the security of the proposed system. We theoretically prove the system performance bound and resilience under Byzantine attacks. The simulation results show that the proposed system obtains comparable performance with that of conventional distributed systems, and bounded performance in the case of Byzantine attacks.
ISSN:2327-4662
2327-4662
DOI:10.1109/JIOT.2020.2987843