TY - CHAP
T1 - Enhancing Security and Efficiency
T2 - A Lightweight Federated Learning Approach
AU - Chen, Chunlu
AU - Wang, Kevin I.Kai
AU - Li, Peng
AU - Sakurai, Kouichi
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
PY - 2024
Y1 - 2024
N2 - Recently, as big data and AI technology advance, data privacy and security are increasingly critical. Federated Learning (FL) has become a key solution in machine learning to address these concerns. In this paper, we present a secure and lightweight FL scheme. It employs masking and Secret Sharing (SS) to securely aggregate data from distributed clients, thereby reducing the demands of model training on system resources. The scheme also computes data similarity among clients to evaluate each client’s contribution, defending against challenges posed by malicious clients. This approach safeguards privacy, facilitates accurate model updates, and addresses the challenges of limited resources in edge computing environments. We subjected our framework to rigorous validation using MNIST datasets. Experimental outcomes unequivocally substantiate the efficacy of our proposed methodology.
AB - Recently, as big data and AI technology advance, data privacy and security are increasingly critical. Federated Learning (FL) has become a key solution in machine learning to address these concerns. In this paper, we present a secure and lightweight FL scheme. It employs masking and Secret Sharing (SS) to securely aggregate data from distributed clients, thereby reducing the demands of model training on system resources. The scheme also computes data similarity among clients to evaluate each client’s contribution, defending against challenges posed by malicious clients. This approach safeguards privacy, facilitates accurate model updates, and addresses the challenges of limited resources in edge computing environments. We subjected our framework to rigorous validation using MNIST datasets. Experimental outcomes unequivocally substantiate the efficacy of our proposed methodology.
UR - http://www.scopus.com/inward/record.url?scp=85191346734&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85191346734&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-57916-5_30
DO - 10.1007/978-3-031-57916-5_30
M3 - Chapter
AN - SCOPUS:85191346734
T3 - Lecture Notes on Data Engineering and Communications Technologies
SP - 349
EP - 359
BT - Lecture Notes on Data Engineering and Communications Technologies
PB - Springer Science and Business Media Deutschland GmbH
ER -