• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhou Wei, Wang Chao, Xu Jian, Hu Keyong, Wang Jinlong. Privacy-Preserving and Decentralized Federated Learning Model Based on the Blockchain[J]. Journal of Computer Research and Development, 2022, 59(11): 2423-2436. DOI: 10.7544/issn1000-1239.20220470
Citation: Zhou Wei, Wang Chao, Xu Jian, Hu Keyong, Wang Jinlong. Privacy-Preserving and Decentralized Federated Learning Model Based on the Blockchain[J]. Journal of Computer Research and Development, 2022, 59(11): 2423-2436. DOI: 10.7544/issn1000-1239.20220470

Privacy-Preserving and Decentralized Federated Learning Model Based on the Blockchain

Funds: This work was supported by the National Natural Science Foundation of China (61502262, 61872069, 61902205).
More Information
  • Published Date: October 31, 2022
  • Traditional federated learning relies on a central server, and the training process is vulnerable to single point of failure and malicious attacks from nodes, and intermediate parameters passed in plaintext may be exploited to infer the private information in data. A decentralized, secure, and fair federated learning model based on the blockchain is proposed, using homomorphic encryption technology to protect the privacy of the intermediate parameters of the collaborative training parties. Model aggregation and collaborative decryption are carried out through the elected federated learning committee. The decryption process achieves secure key management through a secret sharing scheme, using bilinear-map accumulator to provide verification of correctness for the secret share. The model also introduces reputation as an indicator to evaluate the reliability of the participants, and uses the subjective logic model to realize disbelief enhanced reputation calculation as the basis for the election of the federated learning committee. The reputation value can be used as a reference for the incentive mechanism to ensure fairness. Model information and the reputation value realize data tamper-proof and non-repudiation through the blockchain. Experiments show that in the condition of the training, accuracy is slightly lower than that of the centralized learning model, and model can guarantee that it can be trained in a decentralized manner in multi-party collaborative environment, and implement data privacy protection for all participants.
  • Related Articles

    [1]Li Yuxi, Chen Jingjing, Zhuo Fucai, Xu Jian, Ji Dong. Verifiable Boolean Searchable Encryption Based on Blockchain Index[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440501
    [2]Zhu Longlong, Chen Xiang, Chen Haodong, Niu Jitang, Liu Wenjing, Lin Shengrui, Zhang Dong, Wu Chunming. An Accurate Blockchain Anomaly Detection Mechanism Built on Approximate Sketch Algorithms[J]. Journal of Computer Research and Development, 2024, 61(10): 2526-2539. DOI: 10.7544/issn1000-1239.202440477
    [3]Ke Yuhong, Lin Chao, Huang Xinyi, Wu Wei, Chen Yujie. An Efficient Passwordless Authentication Scheme Based on Blockchain[J]. Journal of Computer Research and Development, 2024, 61(10): 2514-2525. DOI: 10.7544/issn1000-1239.202440468
    [4]Chen Xiao, Huang Muhong, Tian Yifan, Wang Yan, Cao Sheng, Zhang Xiaosong. Internet of Vehicles Data Sharing Scheme via Blockchain Sharding[J]. Journal of Computer Research and Development, 2024, 61(9): 2246-2260. DOI: 10.7544/issn1000-1239.202330899
    [5]He Yunhua, Luo Mingshun, Hu Qing, Wu Bin, Wang Chao, Xiao Ke. Research Progress on Security Technology for Cross-Chain Service of Energy Blockchain[J]. Journal of Computer Research and Development, 2024, 61(4): 1018-1037. DOI: 10.7544/issn1000-1239.202220892
    [6]Liu Wei, Tang Congke, Ma Jie, Tian Zhao, Wang Qi, She Wei. A Federated Learning Model for Privacy Protection Based on Blockchain and Dynamic Evaluation[J]. Journal of Computer Research and Development, 2023, 60(11): 2583-2593. DOI: 10.7544/issn1000-1239.202330269
    [7]Zhang Zelin, Wang Huaqun. Dynamic Key Management of Industrial Internet Based on Blockchain[J]. Journal of Computer Research and Development, 2023, 60(2): 386-397. DOI: 10.7544/issn1000-1239.202111095
    [8]Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
    [9]Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang. Cyber Security Threat Intelligence Sharing Model Based on Blockchain[J]. Journal of Computer Research and Development, 2020, 57(4): 836-846. DOI: 10.7544/issn1000-1239.2020.20190404
    [10]Liu Yining, Zhou Yuanjian, Lan Rushi, Tang Chunming. Blockchain-Based Verification Scheme for Deletion Operation in Cloud[J]. Journal of Computer Research and Development, 2018, 55(10): 2199-2207. DOI: 10.7544/issn1000-1239.2018.20180436
  • Cited by

    Periodical cited type(0)

    Other cited types(2)

Catalog

    Article views (378) PDF downloads (258) Cited by(2)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return