Overview of Federal Learning and Privacy Protection

Authors

  • Ziyue Tian

DOI:

https://doi.org/10.62051/m8pzzr79

Keywords:

federated learning; privacy protection; secure multi-party computing; homorphic encryption; differential privacy.

Abstract

In recent years, federated learning technology has developed rapidly and been widely used in the field of data processing. This paper makes a comprehensive discussion on the privacy protection methods in federated learning,and makes a detailed analysis of three basic methods:data encryption,data perturbation and trusted hardware-based,introduces the principle of each method,and objectively analyzes their performance in practical applications. This paper gives a visual example to compare the principle of secure multi-party computing, which is easy for readers to understand.Aiming at homorphic, this paper first introduces the background of this method and explains the algorith with block diagram,and then compares and analyzes the advantages and disadvantages of somewhat homorphic encryption and fully homorphic encryption. The specific denoising mechanisms are divided into three types:Laplace mechanism,Gauss mechanism and exponential mechanism.This paper summarizes these three mechanisms according to the types of data that need to be denoised.Finally,the paper systematically expounds the privacy protection methods based on trusted hardware ,lists two typical schemes,TrustZone and SGX,and analyzes how they work. In this paper,the hot spots and development prospects are prospected.

Downloads

Download data is not yet available.

References

H. Wang, Y. Liang, L. Li, R. Li. Survey on privacy-Preserving Mechanism in Federated learning. Modern Computer, vol. 28(14), pp. 1-12, 2022.

S. Xiong, D. He, Z. Wang, R. Du. A Review of Federated Learning and its Security and Privacy Protection. Computer Engineering, pp. 1-17, 2024.

G. Wu. Secure multi-party computing privacy protection and data security in communication networks. Modern Transmission, vol. 2023(04), pp. 51-54.

X. Xiao, Z. Tang, B. Xiao, K.-L. Li. A Survey on Privacy and Security Issues in Federated Learning. vol. 46(5), pp. 1019-1044, 2023.

X. Liu, F. Xu, Z. Ma, M. Yuan, H. Qian. Research on Privacy Protection Technology in Federated Learning. Journal of Information Security Research, vol. 10(03), pp. 194-201, 2024.

Y. Xie. Federal Learning Privacy Protection Method based on Local Differential Privacy. Information Technology and Informatization, vol. 08, pp. 160-163, 2023.

R. Xu, L. Dai, D. Xia, et al. Research on Centralized Differential Privacy Algorithm for Federated Learning. Netinfo Security, vol. 24(1), pp. 69-79, 2024.

G. Fan, P. Dong. Research on Trusted Execution Environment Building Technology Based on TrustZone. Netinfo Security, vol. 2016 (3), pp. 21-27.

J. Cui, Z. Cai, K. Liu. A survey on SGX isolation technology. J. Huazhong Univ. of Sci. & Tech. (Natural Science Edition), vol. 52(2), pp. 1-15, 2024.

Downloads

Published

12-08-2024

How to Cite

Tian, Z. (2024) “Overview of Federal Learning and Privacy Protection”, Transactions on Computer Science and Intelligent Systems Research, 5, pp. 968–975. doi:10.62051/m8pzzr79.