Privacy-Preserving Machine Learning Training in IoT Aggregation Scenarios

Liehuang Zhu, Xiangyun Tang, Meng Shen*, Feng Gao, Jie Zhang, Xiaojiang Du

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

24 Citations (Scopus)

Abstract

In developing smart city, the growing popularity of machine learning (ML) that appreciates high-quality training data sets generated from diverse Internet-of-Things (IoT) devices raises natural questions about the privacy guarantees that can be provided in such settings. Privacy-preserving ML training in an aggregation scenario enables a model demander to securely train ML models with the sensitive IoT data gathered from IoT devices. The existing solutions are generally server aided, cannot deal with the collusion threat between the servers or between the servers and data owners, and do not match the delicate environments of IoT. We propose a privacy-preserving ML training framework named Heda that consists of a library of building blocks based on partial homomorphic encryption, which enables constructing multiple privacy-preserving ML training protocols for the aggregation scenario without the assistance of untrusted servers, and defending the security under collusion situations. Rigorous security analysis demonstrates the proposed protocols can protect the privacy of each participant in the honest-but-curious model and guarantee the security under most collusion situations. Extensive experiments validate the efficiency of Heda, which achieves privacy-preserving ML training without losing the model accuracy.

Original languageEnglish
Article number9359659
Pages (from-to)12106-12118
Number of pages13
JournalIEEE Internet of Things Journal
Volume8
Issue number15
DOIs
Publication statusPublished - 1 Aug 2021

Keywords

  • Homomorphic encryption
  • Internet-of-Things (IoT) data
  • machine learning (ML)
  • modular sequential composition
  • secure two-party computation

Fingerprint

Dive into the research topics of 'Privacy-Preserving Machine Learning Training in IoT Aggregation Scenarios'. Together they form a unique fingerprint.

Cite this