A Review on Federated Learning and Machine Learning Approaches: Categorization, Application Areas, and Blockchain Technology
Abstract
:1. Introduction
- Review the appliable ML approach for FL.
- Review the categorization of federated learning.
- Discuss the FL application areas.
- Presents the relationship between FL and BT.
- Discussed some existing literature that has used FL and ML approaches.
2. Related Works
3. Method
3.1. Study Selected and Data Gathering Procedures
3.2. Search Strategy
3.3. Eligibility Criteria
3.4. Information Source and Search
3.5. Selection Execution
4. Results and Discussion
4.1. Data Extraction and Analysis
- i.
- Linear methods
- ii.
- Tree models
- iii.
- Neural network (NN) models
- i.
- Horizontal FL
- ii.
- Vertical FL
- iii.
- Federated Transfer Learning (FTL)
- i.
- Application for mobile devices
- ii.
- Application in industrial engineering
- iii.
- Application in HealthCare
4.2. Summary of the Review
4.3. Search Strategy Yield
4.4. Comparative Analysis
4.5. Limitation
5. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Awotunde, J.B.; Jimoh, R.G.; Ogundokun, R.O.; Misra, S.; Abikoye, O.C. Big Data Analytics of IoT-Based Cloud System Framework: Smart Healthcare Monitoring Systems. In Artificial Intelligence for Cloud and Edge Computing; Misra, S., Kumar Tyagi, A., Piuri, V., Garg, L., Eds.; Springer: Cham, Switzerland, 2022; pp. 181–208. [Google Scholar] [CrossRef]
- Zhang, C.; Hu, X.; Xie, Y.; Gong, M.; Yu, B. A privacy-preserving multi-task learning framework for face de-tection, landmark localization, pose estimation, and gender recognition. Front. Neurorobotics 2020, 13, 112. [Google Scholar] [CrossRef] [PubMed]
- Gong, M.; Xie, Y.; Pan, K.; Feng, K.; Qin, A. A Survey on Differentially Private Machine Learning. IEEE Comput. Intell. Mag. 2020, 15, 49–64. [Google Scholar] [CrossRef]
- Xie, Y.; Wang, H.; Yu, B.; Zhang, C. Secure collaborative few-shot learning. Knowl.-Based Syst. 2020, 203, 106157. [Google Scholar] [CrossRef]
- Albrecht, J.P. How the GDPR Will Change the World. Eur. Data Prot. Law Rev. 2016, 2, 287–289. [Google Scholar] [CrossRef]
- Parasol, M. The impact of China’s 2016 Cyber Security Law on foreign technology firms, and on China’s big data and Smart City dreams. Comput. Law Secur. Rev. 2018, 34, 67–98. [Google Scholar] [CrossRef]
- Gray, W.; Zheng, H.R. General principles of civil law of the People’s Republic of China. Am. J. Comp. Law 1986, 34, 715–743. [Google Scholar] [CrossRef]
- Bonawitz, K.; Ivanov, V.; Kreuter, B.; Marcedone, A.; McMahan, H.B.; Patel, S.; Ramage, D.; Segal, A.; Seth, K. Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 1175–1191. [Google Scholar]
- Liu, Y.; Kang, Y.; Xing, C.; Chen, T.; Yang, Q. A Secure Federated Transfer Learning Framework. IEEE Intell. Syst. 2020, 35, 70–82. [Google Scholar] [CrossRef]
- Yang, Q.; Liu, Y.; Chen, T.; Tong, Y. Federated machine learning: Concept and applications. ACM Trans. Intell. Syst. Technol. 2019, 10, 1–19. [Google Scholar] [CrossRef]
- Kairouz, P.; McMahan, H.B.; Avent, B.; Bellet, A.; Bennis, M.; Bhagoji, A.N.; Bonawitz, K.; Charles, Z.; Cormode, G.; Cummings, R.; et al. Advances and Open Problems in Federated Learning. arXiv 2021, arXiv:1912.04977. [Google Scholar]
- Li, Q.; Wen, Z.; Wu, Z.; Hu, S.; Wang, N.; Li, Y.; Liu, X.; He, B. A survey on federated learning systems: Vision, hype and reality for data privacy and protection. IEEE Trans. Knowl. Data Eng. 2021, 1–20. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Ding, M.; Pham, Q.-V.; Pathirana, P.N.; Le, L.B.; Seneviratne, A.; Li, J.; Niyato, D.; Poor, H.V. Federated Learning Meets Blockchain in Edge Computing: Opportunities and Challenges. IEEE Internet Things J. 2021, 8, 12806–12825. [Google Scholar] [CrossRef]
- Mothukuri, V.; Parizi, R.M.; Pouriyeh, S.; Huang, Y.; Dehghantanha, A.; Srivastava, G. A survey on security and privacy of federated learning. Futur. Gener. Comput. Syst. 2020, 115, 619–640. [Google Scholar] [CrossRef]
- Ali, M.; Karimipour, H.; Tariq, M. Integration of blockchain and federated learning for Internet of Things: Re-cent advances and future challenges. Comput. Secur. 2021, 108, 102355. [Google Scholar] [CrossRef]
- Antunes, R.S.; da Costa, C.A.; Küderle, A.; Yari, I.A.; Eskofier, B. Federated Learning for Healthcare: Systematic Review and Architecture Proposal. ACM Trans. Intell. Syst. Technol. 2022, 13, 1–23. [Google Scholar] [CrossRef]
- Lee, H.; Kim, J. Trends in blockchain and federated learning for data sharing in distributed platforms. In Proceedings of the 2021 Twelfth International Conference on Ubiquitous and Future Networks (ICUFN), Barcelona, Spain, 17–20 August 2021; pp. 430–433. [Google Scholar]
- Khan, L.U.; Saad, W.; Han, Z.; Hossain, E.; Hong, C.S. Federated learning for internet of things: Recent advances, taxonomy, and open challenges. IEEE Commun. Surv. Tutor. 2021, 23, 1759–1799. [Google Scholar] [CrossRef]
- Li, L.; Fan, Y.; Lin, K.Y. A survey on federated learning. In Proceedings of the 2020 IEEE 16th International Conference on Control & Automation (ICCA), Hokkaido, Japan, 6–9 October 2020; pp. 791–796. [Google Scholar]
- Yu, S.; Chen, X.; Zhou, Z.; Gong, X.; Wu, D. When deep reinforcement learning meets federated learning: Intelligent multitimescale resource management for multiaccess edge computing in 5G ultradense network. IEEE Internet Things J. 2020, 8, 2238–2251. [Google Scholar] [CrossRef]
- Chen, M.; Mathews, R.; Ouyang, T.; Beaufays, F. Federated learning of out-of-vocabulary words. arXiv 2019, arXiv:1903.10635. [Google Scholar]
- Leroy, D.; Coucke, A.; Lavril, T.; Gisselbrecht, T.; Dureau, J. Federated learning for keyword spotting. In Proceedings of the ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Brighton, UK, 12–17 May 2019; pp. 6341–6345. [Google Scholar]
- Hard, A.; Rao, K.; Mathews, R.; Ramaswamy, S.; Beaufays, F.; Augenstein, S.; Eichner, H.; Kiddon, C.; Ramage, D. Federated learn-ing for mobile keyboard prediction. arXiv 2018, arXiv:1811.03604. [Google Scholar]
- Yang, T.; Andrew, G.; Eichner, H.; Sun, H.; Li, W.; Kong, N.; Ramage, D.; Beaufays, F. Applied federated learning: Improving google keyboard query suggestions. arXiv 2018, arXiv:1812.02903. [Google Scholar]
- Ramaswamy, S.; Mathews, R.; Rao, K.; Beaufays, F. Federated learning for emoji prediction in a mobile key-board. arXiv 2019, arXiv:1906.04329. [Google Scholar]
- Wang, X.; Han, Y.; Wang, C.; Zhao, Q.; Chen, X.; Chen, M. In-Edge AI: Intelligentizing Mobile Edge Computing, Caching and Communication by Federated Learning. IEEE Netw. 2019, 33, 156–165. [Google Scholar] [CrossRef] [Green Version]
- Qian, Y.; Hu, L.; Chen, J.; Guan, X.; Hassan, M.M.; Alelaiwi, A. Privacy-aware service placement for mobile edge computing via federated learning. Inf. Sci. 2019, 505, 562–570. [Google Scholar] [CrossRef]
- Feng, J.; Rong, C.; Sun, F.; Guo, D.; Li, Y. PMF: A privacy-preserving human mobility prediction framework via federated learning. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2020, 4, 1–21. [Google Scholar] [CrossRef] [Green Version]
- Sozinov, K.; Vlassov, V.; Girdzijauskas, S. Human activity recognition using federated learning. In Proceedings of the 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom), Melbourne, VIC, Australia, 11–13 December 2018; pp. 1103–1111. [Google Scholar]
- Aïvodji, U.M.; Gambs, S.; Martin, A. IOTFLA: A secured and privacy-preserving smart home architec-ture implementing federated learning. In Proceedings of the 2019 IEEE Security and Privacy Workshops (SPW), San Francisco, CA, USA, 19–23 May 2019; pp. 175–180. [Google Scholar]
- Yu, T.; Li, T.; Sun, Y.; Nanda, S.; Smith, V.; Sekar, V.; Seshan, S. Learning context-aware policies from multiple smart homes via federated multi-task learning. In Proceedings of the 2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI), Sydney, Australia, 21–24 April 2020; pp. 104–115. [Google Scholar]
- Liu, B.; Wang, L.; Liu, M.; Xu, C.-Z. Federated Imitation Learning: A Novel Framework for Cloud Robotic Systems With Heterogeneous Sensor Data. IEEE Robot. Autom. Lett. 2020, 5, 3509–3516. [Google Scholar] [CrossRef] [Green Version]
- Hu, B.; Gao, Y.; Liu, L.; Ma, H. Federated Region-Learning: An Edge Computing Based Framework for Urban Environment Sensing. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi, United Arab Emirates, 9–13 December 2018; pp. 1–7. [Google Scholar] [CrossRef]
- Han, X.; Yu, H.; Gu, H. Visual Inspection with Federated Learning. In International Conference on Image Analysis and Recognition; Springer: Cham, Switzerland, 2019; pp. 52–64. [Google Scholar]
- Mowla, N.I.; Tran, N.H.; Doh, I.; Chae, K. Federated Learning-Based Cognitive Detection of Jamming Attack in Flying Ad-Hoc Network. IEEE Access 2019, 8, 4338–4350. [Google Scholar] [CrossRef]
- Saputra, Y.M.; Hoang, D.T.; Nguyen, D.N.; Dutkiewicz, E.; Mueck, M.D.; Srikanteswara, S. Energy demand prediction with federated learning for electric vehicle networks. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, HI, USA, 9–13 December 2019; pp. 1–6. [Google Scholar]
- Yang, W.; Zhang, Y.; Ye, K.; Li, L.; Xu, C.Z. FFD: A Federated Learning Based Method for Credit Card Fraud Detection. In Big Data–BigData 2019; Lecture Notes in Computer Science; Chen, K., Seshadri, S., Zhang, L.J., Eds.; Springer: Cham, Switzerland, 2019; Volume 11514, pp. 18–32. [Google Scholar] [CrossRef]
- Wang, H.; Yurochkin, M.; Sun, Y.; Papailiopoulos, D.; Khazaeni, Y. Federated learning with matched averaging. In Proceedings of the International Conference on Learning Representations (ICLR), Addis Ababa, Ethiopia, 26–30 April 2020. [Google Scholar]
- Brisimi, T.S.; Chen, R.; Mela, T.; Olshevsky, A.; Paschalidis, I.C.; Shi, W. Federated learning of predictive models from federated Electronic Health Records. Int. J. Med. Inform. 2018, 112, 59–67. [Google Scholar] [CrossRef]
- Silva, S.; Gutman, B.A.; Romero, E.; Thompson, P.M.; Altmann, A.; Lorenzi, M. Federated Learning in Distributed Medical Databases: Meta-Analysis of Large-Scale Subcortical Brain Data. In Proceedings of the 2019 IEEE 16th International Symposium on Biomedical Imaging (ISBI 2019), Venice, Italy, 8–11 April 2019; pp. 270–274. [Google Scholar] [CrossRef] [Green Version]
- Liu, D.; Dligach, D.; Miller, T. Two-stage Federated Phenotyping and Patient Representation Learning. Proc. Conf. Assoc. Comput. Linguist. Meet. 2019, 2019, 283–291. [Google Scholar] [CrossRef] [Green Version]
- Gao, D.; Ju, C.; Wei, X.; Liu, Y.; Chen, T.; Yang, Q. Hhhfl: Hierarchical heterogeneous horizontal federated learning for electroencephalography. arXiv 2019, arXiv:1909.05784. [Google Scholar]
- Li, X.; Huang, K.; Yang, W.; Wang, S.; Zhang, Z. On the convergence of fedavg on non-iid data. arXiv 2019, arXiv:1907.02189. [Google Scholar]
- Pfohl, S.R.; Dai, A.M.; Heller, K. Federated and differentially private learning for electronic health records. arXiv 2019, arXiv:1911.05861. [Google Scholar]
- Huang, L.; Yin, Y.; Fu, Z.; Zhang, S.; Deng, H.; Liu, D. LoAdaBoost: Loss-based AdaBoost federated machine learning with reduced computational complexity on IID and non-IID intensive care data. PLoS ONE 2020, 15, e0230706. [Google Scholar] [CrossRef] [Green Version]
- Kim, Y.; Sun, J.; Yu, H.; Jiang, X. Federated tensor factorization for computational phenotyping. In Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, 13–17 August 2017; pp. 887–895. [Google Scholar]
- Lee, J.; Sun, J.; Wang, F.; Wang, S.; Jun, C.H.; Jiang, X. Privacy-preserving patient similarity learning in a federated environment: Development and analysis. JMIR Med. Inform. 2018, 6, e7744. [Google Scholar] [CrossRef] [PubMed]
- Salah, K.; Rehman, M.H.U.; Nizamuddin, N.; Al-Fuqaha, A. Blockchain for AI: Review and Open Research Challenges. IEEE Access 2019, 7, 10127–10149. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.; Chen, X.; Wang, H. An overview of blockchain technology: Architecture, consensus, and future trends. In Proceedings of the 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, HI, USA, 25–30 June 2017; pp. 557–564. [Google Scholar]
- Li, Y.; Chen, C.; Liu, N.; Huang, H.; Zheng, Z.; Yan, Q. A Blockchain-Based Decentralized Federated Learning Framework with Committee Consensus. IEEE Netw. 2020, 35, 234–241. [Google Scholar] [CrossRef]
- Lu, Y.; Huang, X.; Dai, Y.; Maharjan, S.; Zhang, Y. Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT. IEEE Trans. Ind. Inform. 2019, 16, 4177–4186. [Google Scholar] [CrossRef]
- Kang, J.; Yu, R.; Huang, X.; Wu, M.; Maharjan, S.; Xie, S.; Zhang, Y. Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks. IEEE Internet Things J. 2018, 6, 4660–4670. [Google Scholar] [CrossRef]
- Rahman, M.A.; Hossain, M.S.; Islam, M.S.; Alrajeh, N.A.; Muhammad, G. Secure and Provenance Enhanced Internet of Health Things Framework: A Blockchain Managed Federated Learning Approach. IEEE Access 2020, 8, 205071–205087. [Google Scholar] [CrossRef]
- Du, W.; Han, Y.S.; Chen, S. Privacy-Preserving Multivariate Statistical Analysis: Linear Regression and Classification. In Proceedings of the 2004 SIAM International Conference on Data Mining (SDM), Lake Buena Vista, FL, USA, 22–24 April 2004. [Google Scholar] [CrossRef] [Green Version]
- Nikolaenko, V.; Weinsberg, U.; Ioannidis, S.; Joye, M.; Boneh, D.; Taft, N. Privacy-preserving ridge re-gression on hundreds of millions of records. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 19–22 May 2013; pp. 334–348. [Google Scholar]
- Lindell, Y.; Pinkas, B. A Proof of Security of Yao’s Protocol for Two-Party Computation. J. Cryptol. 2008, 22, 161–188. [Google Scholar] [CrossRef]
- Zhao, L.; Ni, L.; Hu, S.; Chen, Y.; Zhou, P.; Xiao, F.; Wu, L. Inprivate digging: Enabling tree-based dis-tributed data mining with differential privacy. In Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications, Honolulu, HI, USA, 16–19 April 2018; pp. 2087–2095. [Google Scholar]
- Cheng, K.; Fan, T.; Jin, Y.; Liu, Y.; Chen, T.; Papadopoulos, D.; Yang, Q. SecureBoost: A Lossless Federated Learning Framework. IEEE Intell. Syst. 2021, 36, 87–98. [Google Scholar] [CrossRef]
- Zeng, T.; Semiari, O.; Mozaffari, M.; Chen, M.; Saad, W.; Bennis, M. Federated Learning in the Sky: Joint Power Allocation and Scheduling with UAV Swarms. In Proceedings of the ICC 2020-2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Bonawitz, K.; Eichner, H.; Grieskamp, W.; Huba, D.; Ingerman, A.; Ivanov, V.; Kiddon, C.; Konečný, J.; Mazzocchi, S.; McMahan, B.; et al. Towards federated learning at scale: System design. arXiv 2019, arXiv:1902.01046. [Google Scholar]
- Liu, Y.; James, J.Q.; Kang, J.; Niyato, D.; Zhang, S. Privacy-preserving traffic flow prediction: A federated learning approach. IEEE Internet Things J. 2020, 7, 7751–7763. [Google Scholar] [CrossRef]
- McMahan, B.; Moore, E.; Ramage, D.; Hampson, S.; Arcas, B.A.Y. Communication-efficient learning of deep networks from decentralized data. In Artificial Intelligence and Statistics, Fort Lauderale; JMLR: Wesley Chapel, FL, USA, 2017; pp. 1273–1282. [Google Scholar]
- Lee, G.H.; Shin, S.-Y. Federated Learning on Clinical Benchmark Data: Performance Assessment. J. Med. Internet Res. 2020, 22, e20891. [Google Scholar] [CrossRef] [PubMed]
- Nock, R.; Hardy, S.; Henecka, W.; Ivey-Law, H.; Patrini, G.; Smith, G.; Thorne, B. Entity resolution and federated learning get a federated resolution. arXiv 2018, arXiv:1803.04035. [Google Scholar]
- Hardy, S.; Henecka, W.; Ivey-Law, H.; Nock, R.; Patrini, G.; Smith, G.; Thorne, B. Private federated learning on vertically partitioned data via entity resolution and additively homomorphic encryption. arXiv 2017, arXiv:1711.10677. [Google Scholar]
- Pan, S.J.; Ni, X.; Sun, J.T.; Yang, Q.; Chen, Z. Cross-domain sentiment classification via spectral feature alignment. In Proceedings of the 19th International Conference on World Wide Web, Raleigh, CA, USA, 26–30 April 2010; pp. 751–760. [Google Scholar]
- Sharma, S.; Xing, C.; Liu, Y.; Kang, Y. Secure and efficient federated transfer learning. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; pp. 2569–2576. [Google Scholar]
- Szegedi, G.; Kiss, P.; Horváth, T. Evolutionary Federated Learning on EEG-data. ITAT. 2019, pp. 71–78. Available online: http://ceur-ws.org/Vol-2473/paper14.pdf (accessed on 17 May 2022).
- Ryznar, M. The Future of Bitcoin Futures. Hous. L Rev. 2018, 56, 539. [Google Scholar] [CrossRef]
- Awotunde, J.B.; Ogundokun, R.O.; Misra, S.; Adeniyi, E.A.; Sharma, M.M. Blockchain-Based Framework for Se-cure Transaction in Mobile Banking Platform. In International Conference on Hybrid Intelligent Systems; Springer: Cham, Switzerland, 2021; pp. 525–534. [Google Scholar]
- Nofer, M.; Gomber, P.; Hinz, O.; Schiereck, D. Blockchain. Bus. Inf. Syst. Eng. 2017, 59, 183–187. [Google Scholar] [CrossRef]
- Yaga, D.; Mell, P.; Roby, N.; Scarfone, K. Blockchain technology overview. arXiv 2019, arXiv:1906.11078. [Google Scholar]
- Awotunde, J.B.; Adeniyi, E.A.; Ogundokun, R.O.; Ayo, F.E. Application of Big Data with Fintech in Financial Ser-vices. In Fintech with Artificial Intelligence, Big Data, and Blockchain; Springer: Singapore, 2021; Volume 107, pp. 107–132. [Google Scholar]
- Kennedy, Z.C.; Stephenson, D.E.; Christ, J.F.; Pope, T.R.; Arey, B.W.; Barrett, C.A.; Warner, M.G. En-hanced anti-counterfeiting measures for additive manufacturing: Coupling lanthanide nanomaterial chemical signatures with blockchain technology. J. Mater. Chem. C 2017, 5, 9570–9578. [Google Scholar] [CrossRef]
- Aitzhan, N.Z.; Svetinovic, D. Security and Privacy in Decentralized Energy Trading Through Multi-Signatures, Blockchain and Anonymous Messaging Streams. IEEE Trans. Dependable Secur. Comput. 2016, 15, 840–852. [Google Scholar] [CrossRef]
- Hasavari, S.; Song, Y.T. A Secure and Scalable Data Source for Emergency Medical Care using Blockchain Technology. In Proceedings of the 2019 IEEE 17th International Conference on Software Engineering Research, Management and Applications (SERA), Honolulu, HI, USA, 29–31 May 2019; pp. 71–75. [Google Scholar] [CrossRef]
- Gill, S.S.; Tuli, S.; Xu, M.; Singh, I.; Singh, K.V.; Lindsay, D.; Tuli, S.; Smirnova, D.; Singh, M.; Jain, U.; et al. Transformative effects of IoT, Blockchain and Artificial Intelligence on cloud computing: Evolution, vision, trends and open challenges. Internet Things 2019, 8, 100118. [Google Scholar] [CrossRef] [Green Version]
- Majeed, U.; Hong, C.S. FLchain: Federated learning via MEC-enabled blockchain network. In Proceedings of the 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), Matsue, Japan, 18–20 September 2019; pp. 1–4. [Google Scholar]
- Ilias, C.; Georgios, S. Machine Learning for All: A More Robust Federated Learning Framework. In Proceedings of the 5th International Conference on Information Systems Security and Privacy-ICISSP, Prague, Czech Republic, 23–25 February 2019; pp. 544–551. [Google Scholar] [CrossRef]
- Awan, S.; Li, F.; Luo, B.; Liu, M. Poster: A reliable and accountable privacy-preserving federated learning framework using the blockchain. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15 November 2019; pp. 2561–2563. [Google Scholar]
- Kim, Y.J.; Hong, C.S. Blockchain-based Node-aware Dynamic Weighting Methods for Improving Federated Learning Performance. In Proceedings of the 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), Matsue, Japan, 18–20 September 2019. [Google Scholar] [CrossRef]
- Luo, J.; Wu, X.; Luo, Y.; Huang, A.; Huang, Y.; Liu, Y.; Yang, Q. Real-world image datasets for federated learning. arXiv 2019, arXiv:1910.11089. [Google Scholar]
- Hamer, J.; Mohri, M.; Suresh, A.T. Fedboost: A communication-efficient algorithm for federated learning. In Proceedings of the 37th International Conference on Machine Learning, online, 13–18 July 2020; pp. 3973–3983. [Google Scholar]
- Yang, H.H.; Arafa, A.; Quek, T.Q.S.; Poor, H.V. Age-Based Scheduling Policy for Federated Learning in Mobile Edge Networks. In Proceedings of the ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Barcelona, Spain, 4–8 May 2020; pp. 8743–8747. [Google Scholar] [CrossRef] [Green Version]
- Sheller, M.J.; Edwards, B.; Reina, G.A.; Martin, J.; Pati, S.; Kotrotsou, A.; Milchenko, M.; Xu, W.; Marcus, D.; Colen, R.R.; et al. Federated learning in medicine: Facilitating multi-institutional collaborations without sharing patient data. Sci. Rep. 2020, 10, 12598. [Google Scholar] [CrossRef] [PubMed]
- Ahmadi, M.; Taghavirashidizadeh, A.; Javaheri, D.; Masoumian, A.; Ghoushchi, S.J.; Pourasad, Y. DQRE-SCnet: A novel hybrid approach for selecting users in Federated Learning with Deep-Q-Reinforcement Learning based on Spectral Clustering. J. King Saud Univ. Comput. Inf. Sci. 2021. [Google Scholar] [CrossRef]
- Elbir, A.M.; Coleri, S. Federated Learning for Hybrid Beamforming in mm-Wave Massive MIMO. IEEE Commun. Lett. 2020, 24, 2795–2799. [Google Scholar] [CrossRef]
- Elbir, A.M.; Coleri, S. Federated Learning for Channel Estimation in Conventional and RIS-Assisted Massive MIMO. IEEE Trans. Wirel. Commun. 2021. [Google Scholar] [CrossRef]
- Pokhrel, S.R.; Choi, J. Improving TCP Performance over WiFi for Internet of Vehicles: A Federated Learning Approach. IEEE Trans. Veh. Technol. 2020, 69, 6798–6802. [Google Scholar] [CrossRef]
- Bhagoji, A.N.; Chakraborty, S.; Mittal, P.; Calo, S. Analyzing federated learning through an adversarial lens. In International Conference on Machine Learning; PMLR: Long Beach, CA, USA, 2019; pp. 634–643. [Google Scholar]
- Lalitha, A.; Shekhar, S.; Javidi, T.; Koushanfar, F. Fully decentralized federated learning. In Proceedings of the Third workshop on Bayesian Deep Learning (NeurIPS), Montreal, QC, Canada, 7 December 2018. [Google Scholar]
- Chen, M.; Mozaffari, M.; Saad, W.; Yin, C.; Debbah, M.; Hong, C.S. Caching in the Sky: Proactive Deployment of Cache-Enabled Unmanned Aerial Vehicles for Optimized Quality-of-Experience. IEEE J. Sel. Areas Commun. 2017, 35, 1046–1061. [Google Scholar] [CrossRef]
- Passerat-Palmbach, J.; Farnan, T.; McCoy, M.; Harris, J.D.; Manion, S.T.; Flannery, H.L.; Gleim, B. Blockchain-orchestrated machine learning for privacy preserving federated learning in electronic health data. In Proceedings of the 2020 IEEE International Conference on Blockchain (Blockchain), Rhodes, Greece, 2–6 November 2020; pp. 550–555. [Google Scholar] [CrossRef]
- Zeng, R.; Zeng, C.; Wang, X.; Li, B.; Chu, X. A Comprehensive Survey of Incentive Mechanism for Federated Learning. arXiv 2021, arXiv:2106.15406. [Google Scholar]
- Hou, D.; Zhang, J.; Man, K.L.; Ma, J.; Peng, Z. A Systematic Literature Review of Blockchain-based Fed-erated Learning: Architectures, Applications and Issues. In Proceedings of the 2021 2nd Information Communication Technologies Confer-ence (ICTC), Nanjing, China, 7–9 May 2021; pp. 302–307. [Google Scholar]
- Preuveneers, D.; Rimmer, V.; Tsingenopoulos, I.; Spooren, J.; Joosen, W.; Ilie-Zudor, E. Chained anomaly de-tection models for federated learning: An intrusion detection case study. Appl. Sci. 2018, 8, 2663. [Google Scholar] [CrossRef] [Green Version]
Authors | Topic | Objective |
---|---|---|
Yang et al. [10] | Federated ML: Concept and Application | The authors proposed secure federated learning by introducing a comprehensive secured FL-framework |
Kairouz et al. [11] | Advances and Open problems in FL | The authors discussed the recent advances and extensive collection of open problems and challenges |
Li et al. [12] | A survey on FL systems: Vision, Hype, and Reality for Data Privacy and Protection | They conducted a comprehensive review of FL systems. They analyzed the FL system components in terms of privacy and protection. |
Nguyen et al. [13] | FL meets BT in edge computing: Opportunities and Challenges | The authors presented an overview of the fundamental concepts and explore the opportunities for FL chain in MEC |
Mothukuri et al. [14] | A survey on security and privacy of federated learning | The authors provided a comprehensive study on FL security and privacy that can assist to bridge the gap between the present state of FAI. |
Ali, Karinmipour & Tariq [15] | Integration of BT and FL for IoT: Recent advances and future challenges | The authors presented the notion of BT and its application in IoT systems. They discussed the privacy issues and preservation techniques in FL |
Antunes et al. [16] | FL for Healthcare: Systematic review and architecture proposal | The authors presented a systematic literature review on the recent study about FL in the context of electronic health records for healthcare applications. |
Lee & Kim [17] | Trends in BT and FL for data sharing in distributed platforms | They reviewed FL and BT mechanisms and then described a survey on the integration of BT and FL for data sharing in industrial vehicles and healthcare applications. |
Khan et al. [18] | FL for IoT: Recent advances, taxonomy, and open challenges. | The authors presented the recent advances of FL towards enabling FL-powered IoT applications. |
Li, Yan & Lin [19] | A survey on FL | The authors reviewed related studies of FL based on the baseline of a universal definition to give guidance for future works. |
Database | Search Keywords |
---|---|
IEEE Xplore | Federated learning AND Distributed environment AND Machine learning Model OR Blockchain |
SpringerLink | ‘Federated learning AND Distributed environment AND Machine learning Model OR Blockchain’ within Computer Science Remove this filter Article Remove this filter 2017–2021 |
Talyor and Francis | [All: federated] AND [All: learning] AND [All: distributed] AND [All: environment] AND [All: machine] AND [All: learning] AND [[All: model] OR [All: blockchain]] AND [Publication Date: (01/01/2017 TO 12/31/2021)] |
Sage | [All federated] AND [All learning] AND [All distributed] AND [All environment] AND [All machine] AND [All learning] AND [[All model] OR [All blockchain]]within2017–2021 |
Web of Science | Federated learning AND Distributed environment AND Machine learning Model OR Blockchain |
Keywords | Search String |
---|---|
Federated learning, Distributed environment, Machine learning Model, Blockchain technology | Federated learning AND Distributed environment AND Machine learning Model OR Blockchain OR ‘Federated learning AND Distributed environment AND Machine learning Model OR Blockchain’ within Computer Science Remove this filter Article Remove this filter 2017–2021 OR [All: federated] AND [All: learning] AND [All: distributed] AND [All: environment] AND [All: machine] AND [All: learning] AND [[All: model] OR [All: blockchain]] AND [Publication Date: (01/01/2017 TO 12/31/2021)] OR [All federated] AND [All learning] AND [All distributed] AND [All environment] AND [All machine] AND [All learning] AND [[All model] OR [All blockchain]]within2017–2021 |
Application Areas | Number of Articles |
---|---|
ML methods applicable for FL | 9 |
Categorization of FL | 12 |
FL application areas | 28 |
FL for Blockchain technology | 12 |
Implementation of ML algorithms for FL | 17 |
Distributed system in BC and FL | 6 |
Total | 84 |
ML Models | Advantages | Applications |
---|---|---|
Linear Models |
|
|
Tree Models |
|
|
Neural Network Model |
|
|
Categories of FL | Advantages | Applications |
---|---|---|
Horizontal FL |
|
|
Vertical FL |
|
|
FTL |
|
|
Authors | Applicable Domain | Objective | Contribution | Limitation |
---|---|---|---|---|
Chen et al. [21] | Smartphone keyboard (SPK) | Learn out-of-vocabulary words | Increasing a keyboard’s repertoire without exporting sensitive data | Has a strong reliance on a probabilistic model that has been taught. |
Leroy et al. [22] | Smartphone voice assistant | Learn how to use the built-in wake word detector. | Instead of employing a typical weighted model averaging technique, an adaptive averaging strategy was used. | Do not demonstrate resilience in the face of background noise. |
Hard et al. [23] | SPK | Prediction of the next word on a computer-generated keyboard | Improve recall by training an RNN model from scratch in the server and federation contexts. | Communication costs are still expensive. |
Yang et al. [24] | SPK | increase the quality of virtual keyboard search suggestions | Given the convexity of the error function, the LR model is readily trainable. | Model training with a high number of parameters is impracticable |
Ramaswamy et al. [25] | SPK | Emoji may be predicted from text written on a keyboard. | Yield better results than a model that has been trained on a server | Because client cache contents vary, measurements from multiple tests cannot be compared. |
Wang et al. [26] | Mobile edge computing (MEC) | MEC, caching, and communication all were optimized. | The possibility of combining Deep Reinforcement Learning and the FL framework with the mobile edge system was discussed. | The question of how to disperse the massive compute burden among heterogeneous situations remains unsolved. |
Qian et al. [27] | MEC | Placement of privacy-conscious services for mobile edge computing | To suit users’ service expectations, suggest a privacy-aware service placement (PSP) method. | It can’t be utilized for many edge clouds. |
Feng et al. [28] | Mobile devices’ motion sensors | Predicting Human Mobility While Maintaining Privacy | Reduce performance deterioration by using a group optimization technique. | Consider simply the fundamental mobility model for the sake of simplicity |
Sozinov et al. [29] | Smart devices’ motion sensors | Recognizing Human Motion | Erroneous customers are identified and rejected. | When compared to centralized models, producing models with somewhat lower accuracy. |
Aivodji et al. [30] | Smart home IoT | Create a secure federated smart home environment. | FL is combined with safe data aggregation in this system. | Implementing a pretty sophisticated architecture |
Yu et al. [31] | Smart home IoT | Discover the patterns of consumers’ activity | Identify physical dangers efficiently | For a variety of deployments, the mapping process isn’t flexible enough. |
Liu et al. [32] | Robot System | Consider learning from robots | Boosts the effectiveness of local robots’ simulated learning in cloud robotic schemes | There is much more work to be done on the fusion process’s convergence rationale. |
Authors | Applicable Domain | Objective | Contribution | Limitation |
---|---|---|---|---|
Hu et al. [33] | Environmental Preservation | Founded on federated region learning, an environmental monitoring framework was developed. | To increase inference accuracy incorporates geographical factors while distributing training data. | Rather than two-layer structures, multi-layer structures should be used. |
Han et al. [34] | Image recognition | Providing manufacturers with automated fault inspection services | Fix the issue of not having enough faulty samples to discover flaws | To service a variety of sectors, a rapid model deployment is required. |
Mowla et al. [35] | Aerial Vehicles that are unmanned | Detection of harmful attempts in UAV communication systems | Using the Dempster–Shafer theory, improve the model using a client group prioritizing strategy. | In this design, there is a need to increase the dependability of global updates. |
Saputra et al. [36] | Electronic vehicles | Energy demand forecasting in a federated manner | To further increase forecast accuracy, the clustering-based energy demand learning approach was used. | More stability and flexibility are required. |
Yang et al. [37] | Financial field | Credit card theft is detected | The test AUC is 10% higher on average than the previous approach. | To preserve the privacy of individuals, more accurate measures should be taken into consideration. |
Wang et al. [38] | Mining of text | Filtering spam and analyzing user sentiment | Using Random Response with Priori (RRP) assures both data privacy and model correctness theoretically. | The noise generated by our perturbing approach will have little impact on overall performance. |
Authors | Applicable Domain | Objective | Contribution | Limitation |
---|---|---|---|---|
Brisimi et al. [39] | Predict the number of times a patient will be admitted to the hospital in the future. | Algorithm for Cluster Primal-Dual Splitting | Yield classifiers with a small number of features | For convergence, additional iterations are required. |
Silva et al. [40] | MRI examination | Establish a federated analytic framework that is compatible with ENIGMA’s standard pipelines. | Effortlessly deal with a variety of high-dimensional features. | Only a small dataset was used for testing. |
Liu et al. [41] | Clinical notes are extracted. | Federated NLP approach with two stages. | To increase accuracy, a pre-processing step has been included. | Small, suspect instances are not suited. |
Gao et al. [42] | Classification of EEG | Make a horizontal FL framework that is hierarchical and diverse. | Over heterogeneous EEG data, the first EEG classifier was developed. | Work on just three separate datasets at a time. |
Li et al. [43] | Calculate the likelihood of death and the length of time spent in the hospital. | Introduce community-based FL and assess its effectiveness on non-iid icu EMRs. | In comparison to the baseline FL model, the model was able to achieve greater prediction accuracy in fewer communication cycles. | Extra communication overhead will result from community model settings. |
Pfohl et al. [44] | Medical Forecasting | Determine the effectiveness of FL in comparison to centralized and local learning. | Perform FL in a way that is both distinct and private. | The cost of privacy is undervalued. |
Huang et al. [45] | Predicting mortality based on drug use data | Method of adaptive boosting | Introduce data-sharing technologies to alleviate non-iid. | Using iid data for training iid data outperforms non-iid data |
Kim et al. [46] | Computer phenotypes are studied. | Computational phenotyping using federated tensor factorization for privacy. | The patient data is not revealed since the information is summarized. | Only accurate when the data is tiny or skewed distributed. |
Lee et al. [47] | Similar patient matching | Framework for patient hashing that is federated | Reverse engineering is a security threat that should be avoided. | Computed complexity is unavoidable. |
Authors | Applicable Domain | Objective | Contribution | Limitation |
---|---|---|---|---|
Salah, Rehman, Nizamuddin & Al-Fuqaha [48] | Blockchain and AI | Survey on blockchain applications for AI | The review pieces of literature on emerging blockchain applications, platforms, and protocol | Privacy, smart contract security, trusted oracles, scalability, consensus protocols, standardization, interoperability, quantum computing resiliency and governance were not considered in their study |
Zheng, Xie, Dai, Chen & Wang [49] | Blockchain Technology | A comprehensive review of BC | Over BC, BC architecture and core characteristics of BC were discussed in this study | In-depth investigations on blockchain-based applications were not conducted |
Li, Chen, Liu, Huang, Zheng & Yan [50] | BC-built decentralized FL framework | A BC-built FL context with committee consensus, i.e., a distributed FL architecture founded on BC (BFLC) | A novel committee consensus technique has been presented that may effectively minimize the amount of consensus computation while also reducing malicious assaults. | Time complexity was not considered |
Lu, Huang, Dai, Maharjan, & Zhang [51] | BC and FL for confidentiality-conserved data allocation in IoT industries | Create a safe data sharing architecture for dispersed multiple parties using blockchain technology. | FL was incorporated into the permissioned BC consensus process by the authors, allowing the consensus computing effort to be utilized for federated training as well. | The study used inadequate resources of devices. |
Kang, Yu, Huang, Wu, Maharjan, Xie & Zhang [52] | BC in vehicular edge computing | In-vehicle computing and systems, a safe peer-to-peer data exchange scheme was suggested. | The suggested TWSL method outperforms standard reputation schemes in terms of enhancing the detection rate of anomalous cars and ensuring data security during data exchange, according to numerical findings. | Dataset used in this study is limited |
Rahman, Hossain, Islam, Alrajeh & Muhammad [53] | A Blockchain-based Federated Learning Methodology | FL and discrepancy confidentiality (DC) were suggested to preserve the confidentiality and safety of IoHT data, allowing secluded IoHT data to be educated at the holder’s location. | The authors tackled the issue of incorporating lightweight security and privacy solution into the FL ecosystem. | The accuracy and loss metrics values are very low and this can be improved in the future |
Authors | Approaches | Dataset | Assessment Metrics | Limitations |
---|---|---|---|---|
Luo et al. [82] | YOLO, Faster R-CNN | 900 images engendered from 26 street cameras and 7 object | Interaction Over Union (IOU), Mean Average Precision (mAP) | Limited to just one benchmark on the datasets used in their study |
Li et al. [50] | LR, CNN, and RNN | FEMNIST, MNIST, Sentiment140 | F1-score | More advanced ML models were not used |
Gao et al. [42] | CNN | MindBigData dataset (Electroencephalography (EEG)) | Accuracy | protected multi-party computation and differential confidentiality was not used in this study |
Wang et al. [38] | FedMA (Deep CNN and LSTM) | Shakespeare dataset over | Accuracy, Epoch | Lesser deep learning building blocks were used in this study. FedMA fault tolerance and fewer datasets were not considered in this study. |
Lee & Shin [63] | FedAVG | MNIST dataset, MIMIC-III dataset | AUROC, F1-score, Precision recall | Real-life medical data with multiple institutions were not considered |
Hamer et al. [83] | FedBoost, AFLBoost | Synthetic dataset | - | The study proposed performance algorithm was not evaluated |
Yang et al. [84] | SVM | MNIST dataset | AoU | Only one ML algorithm was considered in this study. The proposed system has low complexity |
Sheller et al. [85] | U-net of DCNN | BraTS 2017 | Precision | Low datasets were used in this study |
Ahmadi et al. [86] | Deep-Q-Reinforcement Learning Ensemble based on Spectral Clustering called DQRE-SCnet | MNIST, Fashion MNIST, and CIFAR-10 | Accuracy, AUC, Recall, Kappa, Run time | The study had high computation time and high complexity for any dataset |
Elbir & Coleri [87] | CNN | channel data | Accuracy, complexity order | Compression techniques and scheduling time was not considered in the study |
Elbir & Coleri [88] | CNN | local datasets | RMSE, NMSE | Compression-centered approaches for both training data and the approach constraints to additionally decrease the communication overhead was not considered |
Pokhrel & Choi [89] | Local policy, global policy, learning idea | TCP CUBIC streams | Loss comparison, throughput, | Time complexity was not considered in this study |
Hard et al. [23] | FederatedAveraging (Federated CIFG) | 7.5 billion sentences | Recall | The time complexity and accuracy were not considered |
Bhagoji et al. [90] | CNN | Fashion MNIST | Accuracy, weight values, time | The system was not robust enough to prevention from attackers |
Lalitha et al. [91] | DNN | - | Mean square error (MSE) | An empirical study was not conducted to evaluate the proposed system |
Chen et al. [92] | Echo state networks (ESN) | Real pedestrian mobility patterns from BUPT and actual content transmission data | Time, Throughput, Number of UAV | The limited dataset used for the study implementation |
McMahan et al. [62] | CNN, LSTM | MNIST, Shakespeare | Accuracy | Hybridization of differential privacy and secure multi-party computation was not considered |
Authors | Year | Objectives |
---|---|---|
Ali, Karimipour & Tariq [15] | 2021 | The study discussed the present progress and incoming challenges in blockchain and federated learning for IoTs. |
Nguyen et al. [20] | 2021 | The authors presented the opportunities and challenges experienced in FL meeting BT in edge computing. |
Li et al. [19] | 2020 | The study discussed the application areas of federated learning alone. |
Passerat-Palmbach et al. [93] | 2020 | The authors presented a study on Blockchain-orchestrated ML for confidentiality preserving FL in automated medical data. |
Zeng et al. [94] | 2021 | The authors presented an all-inclusive review of the incentive mechanism for FL. |
Hou et al. [95] | 2021 | The architectures, applications, and issues encountered in blockchain-built FL were systematically reviewed in this research. |
Preuveneers et al. [96] | 2018 | The authors examined an intrusion detection case study that is a chained anomaly detection model for FL. |
Lee & Kim [17] | 2021 | The authors discussed the inclinations in BT and FL for data allocation in disseminated platforms. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ogundokun, R.O.; Misra, S.; Maskeliunas, R.; Damasevicius, R. A Review on Federated Learning and Machine Learning Approaches: Categorization, Application Areas, and Blockchain Technology. Information 2022, 13, 263. https://doi.org/10.3390/info13050263
Ogundokun RO, Misra S, Maskeliunas R, Damasevicius R. A Review on Federated Learning and Machine Learning Approaches: Categorization, Application Areas, and Blockchain Technology. Information. 2022; 13(5):263. https://doi.org/10.3390/info13050263
Chicago/Turabian StyleOgundokun, Roseline Oluwaseun, Sanjay Misra, Rytis Maskeliunas, and Robertas Damasevicius. 2022. "A Review on Federated Learning and Machine Learning Approaches: Categorization, Application Areas, and Blockchain Technology" Information 13, no. 5: 263. https://doi.org/10.3390/info13050263
APA StyleOgundokun, R. O., Misra, S., Maskeliunas, R., & Damasevicius, R. (2022). A Review on Federated Learning and Machine Learning Approaches: Categorization, Application Areas, and Blockchain Technology. Information, 13(5), 263. https://doi.org/10.3390/info13050263