Secure and Efficient Federated Learning Schemes for Healthcare Systems
Abstract
:1. Introduction
- Enhancing the security of federated learning while reducing the likelihood of malicious clients joining the training process. This paper proposes a secure and efficient federated learning scheme for smart healthcare systems. The scheme introduces homomorphic encryption to ensure the security of gradient updates at each node and to prevent the server from accessing the privacy of the model after aggregation. Combining with the Schnorr zero-knowledge proof (ZKP) identity authentication module ensures the authenticity and reliability of the clients participating in the training.
- Reducing communication overhead. This paper designs a gradient selection filtering algorithm to filter out parameters that are irrelevant to local convergence and uses computationally negligible compression operators to quantitatively update the parameters, which reduces the number of communications while lowering the communication overhead.
- The experimental results on commonly used datasets show that the algorithm in the paper achieves an effective balance between communication efficiency, privacy protection, and model accuracy.
2. Related Work
2.1. Differential Privacy
2.2. Secure Multiparty Computation
2.3. Homomorphic Encryption
2.4. Communication
3. Preliminary
3.1. Federated Learning
3.2. Paillier Homomorphic Encryption
3.3. Natural Compression
4. Problem Definition
4.1. System Model
4.2. Threat Model
4.3. Design Goal
5. Proposed Scheme
- (1)
- Client selection phase: The server sets the authenticated user as the client participating in the training.
- (2)
- Key distribution phase: The KGC broadcasts the public key pk and publishes the private key sk and the system parameters v to the client over a secure channel.
- (3)
- Client computing phase: The client runs the SGD (stochastic gradient descent) algorithm to train the local model and runs the gradient filtering compression algorithm to update the local model. The clients encrypt the local models before uploading them to the server.
- (4)
- Aggregation phase: The server computes the aggregation result after receiving encrypted updates from all clients, then performs the federated averaging process on the aggregation result to obtain the updated global model.
- (5)
- Global model update phase: The server broadcasts the global model to all clients.
5.1. Model Parameter Encryption
5.2. Schnorr Zero-Knowledge Proof Identity Authentication
- (1)
- Client C signature: First, C encrypts a message using , chooses a random number and computes ; second, hash operation is performed on (, ) to obtain the corresponding hash value ; then, is computed; and finally, the signature (, ) is generated and sent to the verifier S.
- (2)
- Server S verification: Calculate and verify . If equal, the authentication passes; otherwise, it fails.
5.3. Gradient Filtering Compression Algorithm
Algorithm 1 Gradient filtering compression algorithm |
Inputs: client index , update gradient , original gradient , correlation threshold |
Output: updated gradient after client filter compression |
1. Calculated according to Equation (3) |
2. If |
3. return null |
4. else |
5. Compute the local model update to be used in the next round of communication |
6. Quantize using the natural compression operator |
7. Return |
6. Experiments
6.1. Accuracy
6.2. Communication Overhead
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Rauniyar, A.; Hagos, D.H.; Jha, D.; Håkegård, J.E.; Bagci, U.; Rawat, D.B.; Vlassov, V. Federated Learning for Medical Applications: A Taxonomy, Current Trends, Challenges, and Future Research Directions. IEEE Internet Things J. 2024, 11, 7374–7398. [Google Scholar] [CrossRef]
- Aggarwal, M.; Khullar, V.; Rani, S.; Prola, T.A.; Bhattacharjee, S.B.; Shawon, S.M.; Goyal, N. Federated Learning on Internet of Things: Extensive and Systematic Review. Comput. Mater. Contin. 2024, 79, 1795–1834. [Google Scholar] [CrossRef]
- Mohammadi, M.; Al-Fuqaha, A. Enabling Cognitive Smart Cities Using Big Data and Machine Learning: Approaches and Challenges. IEEE Commun. Mag. 2018, 56, 94–101. [Google Scholar] [CrossRef]
- Thomas, R.N.; Gupta, R. A Survey on Machine Learning Approaches and Its Techniques. In Proceedings of the 2020 IEEE International Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, 22–23 February 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Klymash, M.; Kyryk, M.; Demydov, I.; Hordiichuk-Bublivska, O.; Kopets, H.; Pleskanka, N. Research on Distributed Machine Learning Methods in Databases. In Proceedings of the 2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT), Lviv, Ukraine, 21–25 September 2021; pp. 128–131. [Google Scholar] [CrossRef]
- Mcmahan, B.; Moore, E.; Ramage, D.; Hampson, S.; y Arcas, B.A. Communication-Efficient Learning of Deep Networks from Decentralized Data. In Artificial Intelligence and Statistics; PMLR: New York, NY, USA, 2017; pp. 1273–1282. [Google Scholar]
- Chen, Y.; Qin, X.; Wang, J.; Yu, C.; Gao, W. FedHealth: A Federated Transfer Learning Framework for Wearable Healthcare. IEEE Intell. Syst. 2020, 35, 83–93. [Google Scholar] [CrossRef]
- Wu, Q.; Chen, X.; Zhou, Z.; Zhang, J. FedHome: Cloud-Edge Based Personalized Federated Learning for In-Home Health Monitoring. IEEE Trans. Mob. Comput. 2022, 21, 2818–2832. [Google Scholar] [CrossRef]
- Kairouz, P.; Mcmahan, H.B.; Avent, B.; Bellet, A.; Bennis, M.; Bhagoji, A.N.; Bonawitz, K.; Charles, Z.; Cormode, G.; Cummings, R.; et al. Advances and Open Problems in Federated Learning. Found. Trends Mach. Learn. 2021, 14, 1–210. [Google Scholar] [CrossRef]
- Zhu, L.G.; Liu, Z.J.; Han, S. Deep Leakage from Gradients. Adv. Neural Inf. Process. Syst. 2019, 32, 14774–14784. [Google Scholar]
- Liu, Y.; Chen, H.; Liu, Y.; Li, C. Privacy-Preserving Techniques in Federated Learning. J. Softw. 2022, 33, 1057–1092. [Google Scholar]
- Niknam, S.; Dhillon, H.S.; Reed, J.H. Federated Learning for Wireless Communications: Motivation, Opportunities, and Challenges. IEEE Commun. Mag. 2020, 58, 46–51. [Google Scholar] [CrossRef]
- Zhang, Z.; Guo, B.; Sun, W.; Liu, Y.; Yu, Z. Cross-FCL: Toward a Cross-Edge Federated Continual Learning Framework in Mobile Edge Computing Systems. IEEE Trans. Mob. Comput. 2024, 23, 313–326. [Google Scholar] [CrossRef]
- Abadi, M.; Chu, A.; Goodfellow, I.; McMahan, H.B.; Mironov, I.; Talwar, K.; Zhang, L. Deep Learning with Differential Privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 308–318. [Google Scholar]
- Huang, X.X.; Ding, Y.; Jiang, Z.L.; Qi, S.; Wang, X.; Liao, Q. DP-FL: A Novel Differentially Private Federated Learning Framework for the Unbalanced Data. World Wide Web 2020, 23, 2529–2545. [Google Scholar] [CrossRef]
- Wei, K.; Li, J.; Ding, M.; Ma, C.; Yang, H.H.; Farokhi, F.; Jin, S.; Quek, T.Q.S.; Poor, H.V. Federated Learning with Differential Privacy: Algorithms and Performance Analysis. IEEE Trans. Inf. Forensics Secur. 2020, 15, 3454–3469. [Google Scholar] [CrossRef]
- Li, X.; Gu, Y.; Dvornek, N.; Staib, L.H.; Ventola, P.; Duncan, J.S. Multi-site fMRI analysis using privacy-preserving federated learning and domain adaptation: ABIDE results. Med. Image Anal. 2020, 65, 101765. [Google Scholar] [CrossRef] [PubMed]
- Choudhury, O.; Gkoulalas-Divanis, A.; Salonidis, T.; Sylla, I.; Park, Y.; Hsu, G.; Das, A. Differential privacy-enabled federated learning for sensitive health data. arXiv 2019, arXiv:1910.02578. [Google Scholar]
- Bonawitz, K.; Ivanov, V.; Kreuter, B.; Marcedone, A.; McMahan, H.B.; Patel, S.; Ramage, D.; Segal, A.; Seth, K. Practical Secure Aggregation for Privacy-Preserving Machine Learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 1175–1191. [Google Scholar]
- Fang, C.; Guo, Y.; Wang, N.; Ju, A. Highly efficient federated learning with strong privacy preservation in cloud computing. Comput. Secur. 2020, 96, 101889. [Google Scholar] [CrossRef]
- Che, X.L.; Zhou, H.N.; Yang, X.Y. Efficient Multi-Key Fully Homomorphic Encryption Scheme from RLWE. J. Xidian Univ. 2021, 48, 87–95. [Google Scholar]
- Phong, L.T.; Aono, Y.; Hayashi, T.; Wang, L.; Moriai, S. Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 2018, 13, 1333–1345. [Google Scholar] [CrossRef]
- Ren, W.; Tong, X.; Du, J.; Wang, N.; Li, S.C.; Min, G.; Zhao, Z.; Bashir, A.K. Privacy-Preserving using Homomorphic Encryption in Mobile IoT Systems. Comput. Commun. 2021, 165, 105–111. [Google Scholar] [CrossRef]
- Lee, J.; Sun, J.; Wang, F.; Wang, S.; Jun, C.; Jiang, X. Privacy-Preserving Patient Similarity Learning in a Federated Environment: Development and Analysis. JMIR Med. Inf. 2018, 6, e20. [Google Scholar] [CrossRef]
- Nguyen, D.C.; Ding, M.; Pathirana, P.N.; Seneviratne, A.; Li, J.; Vincent, H. Poor Federated Learning for Internet of Things: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2021, 23, 1622–1658. [Google Scholar] [CrossRef]
- Caldas, S.; Konečny, J.; McMahan, H.B.; Talwalkar, A. Expanding the reach of federated learning by reducing client resource requirements. arXiv 2018, arXiv:1812.07210. [Google Scholar]
- Wang, L.; Wang, W.; Li, B. CMFL: Mitigating Communication Overhead for Federated Learning. In Proceedings of the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), Dallas, TX, USA, 7–10 July 2019; pp. 954–964. [Google Scholar] [CrossRef]
- Asad, M.; Moustafa, A.; Aslam, M. CEEP-FL: A Comprehensive Approach for Communication Efficiency and Enhanced Privacy in Federated Learning. Appl. Soft Comput. 2021, 104, 107235. [Google Scholar] [CrossRef]
- Asad, M.; Moustafa, A.; Ito, T. FedOpt: Towards Communication Efficiency and Privacy Preservation in Federated Learning. Appl. Sci. 2020, 10, 2864. [Google Scholar] [CrossRef]
- Horvóth, S.; Ho, C.Y.; Horvath, L.; Sahu, A.N.; Canini, M.; Richtárik, P. Natural compression for distributed deep learning. In Mathematical and Scientific Machine Learning; PMLR: New York, NY, USA, 2022; pp. 129–141. [Google Scholar]
- Dwivedi, A.D.; Singh, R.; Ghosh, U.; Mukkamala, R.R.; Tolba, A.; Said, O. Privacy preserving authentication system based on non-interactive zero knowledge proof suitable for Internet of Things. J. Ambient Intell. Hum. Comput. 2022, 13, 4639–4649. [Google Scholar] [CrossRef]
- Major, W.; Buchanan, W.J.; Ahmad, J. An authentication protocol based on chaos and zero knowledge proof. Nonlinear Dyn. 2020, 99, 3065–3087. [Google Scholar] [CrossRef]
- Mohammadi, S.; Sinaei, S.; Balador, A.; Flammini, F. Secure and efficient federated learning by combining homomorphic encryption and gradient pruning in speech emotion recognition. In Proceedings of the International Conference on Information Security Practice and Experience, Copenhagen, Denmark, 24–25 August 2023; Springer: Berlin, Heidelberg, 2023; pp. 1–16. [Google Scholar]
Network Layer | MNIST | Network Layer | CIFAR10 |
---|---|---|---|
Input | 28 × 28 × 1 | Input | 32 × 32 × 3 |
Convolution layer | 3 × 3 (16) | Convolution layer | 3 × 3 (32) |
MaxPool layer | 2 × 2 | Convolution layer | 3 × 3 (32) |
Convolution layer | 3 × 3 (32) | MaxPool layer | 2 × 2 |
MaxPool layer | 2 × 2 | Convolution layer | 3 × 3 (64) |
Fully connected layer | 7 × 7 × 32 | Convolution layer | 3 × 3 (64) |
Fully connected Layer | 32 | MaxPool layer | 2 × 2 |
Output | 10 | Fully connected layer | 8 × 8 × 64 |
/ | / | Fully connected layer | 128 |
/ | / | Output | 10 |
Symbol | Values | Definition |
---|---|---|
K | 100 | Clients |
C | 0.1 | Percentage of participating clients |
B | 64 | Batch size |
0.1 | Learning rate | |
E | 5 | Epochs |
H | 0.75 | Thresholds |
Scheme Name | MNIST | CIFAR10 | ||
---|---|---|---|---|
Target Accuracy | 90% | 95% | 50% | 60% |
PPDL | 172.8 | 276.48 | 1635.6 | 2519.5 |
CEEP-FL | 145.42 | 224.64 | 1248.15 | 2174.6 |
SEFL | 166.47 | 259.19 | 1358.3 | 2318.48 |
Our scheme | 116.312 | 172.84 | 768.46 | 1274.1 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Song, C.; Wang, Z.; Peng, W.; Yang, N. Secure and Efficient Federated Learning Schemes for Healthcare Systems. Electronics 2024, 13, 2620. https://doi.org/10.3390/electronics13132620
Song C, Wang Z, Peng W, Yang N. Secure and Efficient Federated Learning Schemes for Healthcare Systems. Electronics. 2024; 13(13):2620. https://doi.org/10.3390/electronics13132620
Chicago/Turabian StyleSong, Cheng, Zhichao Wang, Weiping Peng, and Nannan Yang. 2024. "Secure and Efficient Federated Learning Schemes for Healthcare Systems" Electronics 13, no. 13: 2620. https://doi.org/10.3390/electronics13132620
APA StyleSong, C., Wang, Z., Peng, W., & Yang, N. (2024). Secure and Efficient Federated Learning Schemes for Healthcare Systems. Electronics, 13(13), 2620. https://doi.org/10.3390/electronics13132620