Practical Secure Aggregation for Privacy-Preserving Machine Learning

被引:1906
作者
Bonawitz, Keith [1 ]
Ivanov, Vladimir [1 ]
Kreuter, Ben [1 ]
Marcedone, Antonio [2 ]
McMahan, H. Brendan [1 ]
Patel, Sarvar [1 ]
Ramage, Daniel [1 ]
Segal, Aaron [1 ]
Seth, Karn [1 ]
机构
[1] Google, 1600 Amphitheatre Pkwy, Mountain View, CA 94043 USA
[2] Cornell Tech, 2 West Loop Rd, New York, NY 10044 USA
来源
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2017年
关键词
privacy-preserving protocols; secure aggregation; machine learning; federated learning;
D O I
10.1145/3133956.3133982
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We design a novel, communication-efficient, failure-robust protocol for secure aggregation of high-dimensional data. Our protocol allows a server to compute the sum of large, user-held data vectors from mobile devices in a secure manner (i.e. without learning each user's individual contribution), and can be used, for example, in a federated learning setting, to aggregate user-provided model updates for a deep neural network. We prove the security of our protocol in the honest-but-curious and active adversary settings, and show that security is maintained even if an arbitrarily chosen subset of users drop out at any time. We evaluate the efficiency of our protocol and show, by complexity analysis and a concrete implementation, that its runtime and communication overhead remain low even on large data sets and client pools. For 16-bit input values, our protocol offers 1.73x communication expansion for 210 users and 220-dimensional vectors, and 1.98x expansion for 214 users and 224-dimensional vectors over sending data in the clear.
引用
收藏
页码:1175 / 1191
页数:17
相关论文
共 54 条
[1]   Deep Learning with Differential Privacy [J].
Abadi, Martin ;
Chu, Andy ;
Goodfellow, Ian ;
McMahan, H. Brendan ;
Mironov, Ilya ;
Talwar, Kunal ;
Zhang, Li .
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, :308-318
[2]  
Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
[3]  
Acs Gergely, 2011, Information Hiding. 13th International Conference, IH 2011. Revised Selected Papers, P118, DOI 10.1007/978-3-642-24178-9_9
[4]  
Advokat Stephen., 1987, Chicago Tribune
[5]  
[Anonymous], ARXIV161005820
[6]  
[Anonymous], 2016, ICLR WORKSH TRACK
[7]  
[Anonymous], 2010, NETWORK
[8]  
[Anonymous], ARXIV160205629
[9]  
[Anonymous], 2015, IEEE T DEPENDABLE SE
[10]  
[Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]