Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT

被引:834
作者
Lu, Yunlong [1 ]
Huang, Xiaohong [1 ]
Dai, Yueyue [2 ]
Maharjan, Sabita [3 ,4 ]
Zhang, Yan [4 ]
机构
[1] Beijing Univ Posts & Telecommun, Inst Network Technol, Beijing 100876, Peoples R China
[2] Univ Elect Sci & Technol China, Commun & Informat Engn, Chengdu 611731, Sichuan, Peoples R China
[3] Simula Metropolitan Ctr Digital Engn, Oslo, Norway
[4] Univ Oslo, Dept Informat, N-1325 Oslo, Norway
基金
中国国家自然科学基金;
关键词
Distributed databases; Blockchain; Data models; Data privacy; Machine learning; Collaboration; Security; Data sharing; federated learning; industrial Internet of Things (IIoT); permissioned blockchain; privacy-preserved; DIFFERENTIAL PRIVACY;
D O I
10.1109/TII.2019.2942190
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid increase in the volume of data generated from connected devices in industrial Internet of Things paradigm, opens up new possibilities for enhancing the quality of service for the emerging applications through data sharing. However, security and privacy concerns (e.g., data leakage) are major obstacles for data providers to share their data in wireless networks. The leakage of private data can lead to serious issues beyond financial loss for the providers. In this article, we first design a blockchain empowered secure data sharing architecture for distributed multiple parties. Then, we formulate the data sharing problem into a machine-learning problem by incorporating privacy-preserved federated learning. The privacy of data is well-maintained by sharing the data model instead of revealing the actual data. Finally, we integrate federated learning in the consensus process of permissioned blockchain, so that the computing work for consensus can also be used for federated training. Numerical results derived from real-world datasets show that the proposed data sharing scheme achieves good accuracy, high efficiency, and enhanced security.
引用
收藏
页码:4177 / 4186
页数:10
相关论文
共 29 条
[1]  
Alcaraz Cristina, 2015, Risks and Security of Internet and Systems. 9th International Conference, CRiSIS 2014. Revised Selected Papers: LNCS 8924, P17, DOI 10.1007/978-3-319-17127-2
[2]   Analysis of requirements for critical control systems [J].
Alcaraz, Cristina ;
Lopez, Javier .
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2012, 5 (3-4) :137-145
[3]  
[Anonymous], 2017, DIFFERENTIALLY PRIVA
[4]  
[Anonymous], 2019, 20NEWSGROUPS
[5]  
[Anonymous], 2019, REUTERS DATASET
[6]  
Cazorla L., 2018, IEEE SYSTEMS J, V12, P1778, DOI 10.1109/JSYST.2015.2487684
[7]   A Firm Foundation for Private Data Analysis [J].
Dwork, Cynthia .
COMMUNICATIONS OF THE ACM, 2011, 54 (01) :86-95
[8]  
Dwork C, 2010, PROC APPL MATH, V135, P174
[9]   m-Privacy for Collaborative Data Publishing [J].
Goryczka, Slawomir ;
Xiong, Li ;
Fung, Benjamin C. M. .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2014, 26 (10) :2520-2533
[10]  
Konecn Jakub, 2016, NIPS WORKSHOP PRIVAT