Advanced Search
Volume 45 Issue 3
Mar.  2023
Turn off MathJax
Article Contents
ZHANG Cui, YANG Hui, WANG Hanning, WANG Jiang, ZENG Chuangzhan, LI Rongkuan. Efficient Model Collaborative Training and Sharing Scheme of Blockchain Based on Hybrid Privacy[J]. Journal of Electronics & Information Technology, 2023, 45(3): 775-783. doi: 10.11999/JEIT221104
Citation: ZHANG Cui, YANG Hui, WANG Hanning, WANG Jiang, ZENG Chuangzhan, LI Rongkuan. Efficient Model Collaborative Training and Sharing Scheme of Blockchain Based on Hybrid Privacy[J]. Journal of Electronics & Information Technology, 2023, 45(3): 775-783. doi: 10.11999/JEIT221104

Efficient Model Collaborative Training and Sharing Scheme of Blockchain Based on Hybrid Privacy

doi: 10.11999/JEIT221104
Funds:  The National Natural Science Foundation of China (62122015)
  • Received Date: 2022-08-23
  • Rev Recd Date: 2022-12-30
  • Available Online: 2023-01-05
  • Publish Date: 2023-03-10
  • Considering the problems of inefficiency and privacy leakage faced by the blockchain-based federated learning data sharing platform under massive data, an efficient model collaborative training and sharing scheme of blockchain based on hybrid privacy is proposed. In this scheme, a similarity-based training member selection algorithm according to Euclidean distance is first designed to select training members, forming a federated community, that is, to improve the efficiency and effect of training by selecting a small number of high-matching training nodes. Then, combined with threshold homomorphic encryption and differential privacy, a model collaborative training and sharing scheme based on hybrid privacy technology is constructed to ensure the privacy in the training and sharing process. The experimental results and system implementation show that the proposed scheme can achieve efficient training and data sharing under privacy protection while ensuring the accuracy of the training results.
  • loading
  • [1]
    KASUBI J W, MANJAIAH D H, and DEMEWEZ G D. A review on the internet of things and big data analytics based on smart cities[C]. 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), Coimbatore, India, 2021: 1352–1358.
    [2]
    LV Zhihan, LOU Ranran, LI Jinhua, et al. Big data analytics for 6G-enabled massive internet of things[J]. IEEE Internet of Things Journal, 2021, 8(7): 5350–5359. doi: 10.1109/JIOT.2021.3056128
    [3]
    DINH T N, SHEN Yilin, and THAI M T. The walls have ears: Optimize sharing for visibility and privacy in online social networks[C]. The 21st ACM International Conference on Information and Knowledge Management, Hawaii, USA, 2012: 1452–1461.
    [4]
    LIU Chi, ZHU Tianqing, ZHANG Jun, et al. Privacy intelligence: A survey on image sharing on online social networks[J]. arXiv preprint arXiv: 2008.12199, 2020.
    [5]
    ALEDHARI M, RAZZAK R, PARIZI R M, et al. Federated learning: A survey on enabling technologies, protocols, and applications[J]. IEEE Access, 2020, 8: 140699–140725. doi: 10.1109/ACCESS.2020.3013541
    [6]
    YANG Hui, YUAN Jiaqi, LI Chao, et al. BrainIoT: Brain-like productive services provisioning with federated learning in industrial IoT[J]. IEEE Internet of Things Journal, 2022, 9(3): 2014–2024. doi: 10.1109/JIOT.2021.3089334
    [7]
    YANG Hui, LIANG Yongshen, YUAN Jiaqi, et al. Distributed blockchain-based trusted multidomain collaboration for mobile edge computing in 5G and beyond[J]. IEEE Transactions on Industrial Informatics, 2020, 16(11): 7094–7104. doi: 10.1109/TII.2020.2964563
    [8]
    YANG Hui, YUAN Jiaqi, YAO Haipeng, et al. Blockchain-based hierarchical trust networking for JointCloud[J]. IEEE Internet of Things Journal, 2020, 7(3): 1667–1677. doi: 10.1109/JIOT.2019.2961187
    [9]
    LI Chao, YANG Hui, BAO Bowen, et al. A secure device access based on Blockchain for IoT in smart city[C]. 2021 International Wireless Communications and Mobile Computing (IWCMC), Harbin City, China, 2021: 1172–1174.
    [10]
    YANG Hui, BAO Bowen, LI Chao, et al. Blockchain-enabled tripartite anonymous identification trusted service provisioning in industrial IoT[J]. IEEE Internet of Things Journal, 2022, 9(3): 2419–2431. doi: 10.1109/JIOT.2021.3097440
    [11]
    LI Chao, YANG Hui, SUN Zhengjie, et al. Federated hierarchical trust-based interaction scheme for cross-domain industrial IoT[J/OL]. IEEE Internet of Things Journal, 2022, https://ieeexplore.ieee.org/document/9865221, 2022.
    [12]
    ZHANG Xu and HOU Haibo. Application of federated learning in industrial internet with device identifier[C]. 2021 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), Chengdu, China, 2021: 1–5
    [13]
    陈乃月, 金一, 李浥东, 等. 基于区块链的公平性联邦学习模型[J]. 计算机工程, 2022, 48(6): 33–41. doi: 10.19678/j.issn.1000-3428.0064095

    CHEN Naiyue, JIN Yi, LI Yidong, et al. Federated learning model with fairness based on Blockchain[J]. Computer Engineering, 2022, 48(6): 33–41. doi: 10.19678/j.issn.1000-3428.0064095
    [14]
    WENG Jiasi, WENG Jian, ZHANG Jilian, et al. DeepChain: Auditable and privacy-preserving deep learning with Blockchain-based incentive[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18(5): 2438–2455. doi: 10.1109/TDSC.2019.2952332
    [15]
    QI Yuanhang, HOSSAIN M S, NIE Jiangtian, et al. Privacy-preserving blockchain-based federated learning for traffic flow prediction[J]. Future Generation Computer Systems, 2021, 117: 328–337. doi: 10.1016/j.future.2020.12.003
    [16]
    汤凌韬, 王迪, 张鲁飞, 等. 基于安全多方计算和差分隐私的联邦学习方案[J]. 计算机科学, 2022, 49(9): 297–305. doi: 10.11896/jsjkx.210800108

    TANG Lingtao, WANG Di, ZHANG Lufei, et al. Federated learning scheme based on secure multi-party computation and differential privacy[J]. Computer Science, 2022, 49(9): 297–305. doi: 10.11896/jsjkx.210800108
    [17]
    TRUEX S, BARACALDO N, ANWAR A, et al. A hybrid approach to privacy-preserving federated learning[C]. Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, London, UK, 2019: 1–11.
    [18]
    SHE Wei, LIU Qi, TIAN Zhao, et al. Blockchain trust model for malicious node detection in wireless sensor networks[J]. IEEE Access, 2019, 7: 38947–38956. doi: 10.1109/ACCESS.2019.2902811
    [19]
    柴迪. 阈值同态加密在隐私计算中的应用[J]. 信息通信技术与政策, 2021, 47(7): 82–86. doi: 10.12267/j.issn.2096-5931.2021.07.012

    CHAI Di. Application of threshold homomorphic encryption in privacy computing[J]. Information and Communications Technology and Policy, 2021, 47(7): 82–86. doi: 10.12267/j.issn.2096-5931.2021.07.012
    [20]
    GENG Ziye, HE Yunhua, WANG Chao, et al. A Blockchain based privacy-preserving reputation scheme for cloud service[C]. ICC 2021 - IEEE International Conference on Communications, Montreal, Canada, 2021: 1–6.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(9)  / Tables(1)

    Article Metrics

    Article views (583) PDF downloads(132) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return