Overview of Federal Learning and Privacy Protection
DOI:
https://doi.org/10.62051/m8pzzr79Keywords:
federated learning; privacy protection; secure multi-party computing; homorphic encryption; differential privacy.Abstract
In recent years, federated learning technology has developed rapidly and been widely used in the field of data processing. This paper makes a comprehensive discussion on the privacy protection methods in federated learning,and makes a detailed analysis of three basic methods:data encryption,data perturbation and trusted hardware-based,introduces the principle of each method,and objectively analyzes their performance in practical applications. This paper gives a visual example to compare the principle of secure multi-party computing, which is easy for readers to understand.Aiming at homorphic, this paper first introduces the background of this method and explains the algorith with block diagram,and then compares and analyzes the advantages and disadvantages of somewhat homorphic encryption and fully homorphic encryption. The specific denoising mechanisms are divided into three types:Laplace mechanism,Gauss mechanism and exponential mechanism.This paper summarizes these three mechanisms according to the types of data that need to be denoised.Finally,the paper systematically expounds the privacy protection methods based on trusted hardware ,lists two typical schemes,TrustZone and SGX,and analyzes how they work. In this paper,the hot spots and development prospects are prospected.
Downloads
References
H. Wang, Y. Liang, L. Li, R. Li. Survey on privacy-Preserving Mechanism in Federated learning. Modern Computer, vol. 28(14), pp. 1-12, 2022.
S. Xiong, D. He, Z. Wang, R. Du. A Review of Federated Learning and its Security and Privacy Protection. Computer Engineering, pp. 1-17, 2024.
G. Wu. Secure multi-party computing privacy protection and data security in communication networks. Modern Transmission, vol. 2023(04), pp. 51-54.
X. Xiao, Z. Tang, B. Xiao, K.-L. Li. A Survey on Privacy and Security Issues in Federated Learning. vol. 46(5), pp. 1019-1044, 2023.
X. Liu, F. Xu, Z. Ma, M. Yuan, H. Qian. Research on Privacy Protection Technology in Federated Learning. Journal of Information Security Research, vol. 10(03), pp. 194-201, 2024.
Y. Xie. Federal Learning Privacy Protection Method based on Local Differential Privacy. Information Technology and Informatization, vol. 08, pp. 160-163, 2023.
R. Xu, L. Dai, D. Xia, et al. Research on Centralized Differential Privacy Algorithm for Federated Learning. Netinfo Security, vol. 24(1), pp. 69-79, 2024.
G. Fan, P. Dong. Research on Trusted Execution Environment Building Technology Based on TrustZone. Netinfo Security, vol. 2016 (3), pp. 21-27.
J. Cui, Z. Cai, K. Liu. A survey on SGX isolation technology. J. Huazhong Univ. of Sci. & Tech. (Natural Science Edition), vol. 52(2), pp. 1-15, 2024.
Downloads
Published
Conference Proceedings Volume
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.







