2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID) 2020
DOI: 10.1109/ccgrid49817.2020.00-52
|View full text |Cite
|
Sign up to set email alerts
|

Two-Phase Multi-Party Computation Enabled Privacy-Preserving Federated Learning

Abstract: Countries across the globe have been pushing strict regulations on the protection of personal or private data collected. The traditional centralized machine learning method, where data is collected from end-users or IoT devices, so that it can discover insights behind real-world data, may not be feasible for many data-driven industry applications in light of such regulations. A new machine learning method, coined by Google as Federated Learning (FL) enables multiple participants to train a machine learning mod… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
23
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 50 publications
(23 citation statements)
references
References 17 publications
0
23
0
Order By: Relevance
“…In the context of PdM, the data-sets generated by two digital twins are statistically homogeneous if they contain similar failure patterns of the corresponding assets working under the same operational conditions. While existing approaches are few and limited to the application of FL [19] [20] [21] [22] without considering the computational challenges in manufacturing environment, it has been observed that these solutions are able to tackle the data privacy issue in collaborative prognosis. The collaborative prognosis mechanism proposed in [19] deploys a digital twin based FL solution that predicts the RUL of an aircraft engine.…”
Section: B Privacy Preserving Collaborative Pdmmentioning
confidence: 99%
See 1 more Smart Citation
“…In the context of PdM, the data-sets generated by two digital twins are statistically homogeneous if they contain similar failure patterns of the corresponding assets working under the same operational conditions. While existing approaches are few and limited to the application of FL [19] [20] [21] [22] without considering the computational challenges in manufacturing environment, it has been observed that these solutions are able to tackle the data privacy issue in collaborative prognosis. The collaborative prognosis mechanism proposed in [19] deploys a digital twin based FL solution that predicts the RUL of an aircraft engine.…”
Section: B Privacy Preserving Collaborative Pdmmentioning
confidence: 99%
“…The above discussed approaches do not address the challenges of applying conventional FL within a cross-device setting for collaborative PdM. The approach proposed in [22] is designed for cross-silo FL setting. Whereas the one proposed in [19] utilises LSTM as the global learning model which is not suitable for cross-device FL setting.…”
Section: B Privacy Preserving Collaborative Pdmmentioning
confidence: 99%
“…Many governments around the globe have imposed restrictions on centralized data collection processes. Hence, traditional deep learning applications that rely on a central, powerful cloud machine that accumulates a vast amount of IoHT data, and on training a model accurately are encountering regulatory restrictions [4] . In addition to regulatory restrictions, cloud-based central machine learning applications might not be suitable for training a massive amount of IoHT data [5] .…”
Section: Introductionmentioning
confidence: 99%
“…Before the start of the FL aggregation process, non-benign training results can be filtered out, and only those malicious edge nodes can be blacklisted [41] . In another study [4] , a two-phase FL process was proposed in which Phase 1 allowed voting for some trusted committee member from the federation, and in Phase 2 the actual FL takes place under the guardianship and privacy-protecting watchful eye of the committee members.…”
Section: Introductionmentioning
confidence: 99%
“…Zhu et al [97] analyzed the relationship between FL and SMC, and Bonawitz et al [98] designed a secure communication protocol that could specify a constant number of iterations and tolerate a number of clients exiting the FL. Kanagavelu et al [99] proposed a two-phase MPC-enabled FL framework, wherein participants elected a committee to offer SMC services to reduce the overhead of SMC and maintain the scalability of FL. In [100], Sotthiwat et al suggested encrypting the key parameters of multi-dimensional gradients to take advantage of SMC encryption while limiting communication cost.…”
mentioning
confidence: 99%