Publication:
Fault tolerant and malicious secure federated learning

dc.contributor.coauthorKarakoc, Ferhat
dc.contributor.coauthorOnen, Melek
dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.kuauthorKüpçü, Alptekin
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.date.accessioned2025-03-06T20:57:52Z
dc.date.issued2025
dc.description.abstractFederated learning (FL) is one of the promising collaborative machine learning methods finding many usage application scenarios in different domains such as healthcare [19] and/or telecommunication (5G, 5G beyond and 6G [25]). It also enhances privacy by allowing users to contribute to the global model training without sharing their training data. However, the local model updates exposed by users can still leak sensitive information. To prevent such leakage, secure aggregation protocols are utilized to hide the individual local model updates from the aggregator. Enhancing privacy in this way creates an open door for security attacks because the server is no longer able to analyze received updates for detection of poisoning type of attacks. Although there are considerable number of studies that address the privacy and security aspects individually, solutions against the combination of these attacks have started to appear recently in a few studies. When we add some additional requirements such as aggregation unforgeability and robustness against user drop-outs, the number of solutions becomes very limited. Most of the proposals addressing all these aspects at the same time require two or more non-colluding aggregators, which may not be a realistic assumption in most of the use cases. To address this gap, we introduce new secure aggregation protocols involving one aggregator only. Each proposed protocol addresses a subset of the requirements where as the final one, FULLSA3, is secure against malicious clients and robust against user drop-outs. As a side contribution, we design a new batch oblivious range verification protocol.
dc.description.indexedbyWOS
dc.description.indexedbyScopus
dc.description.publisherscopeInternational
dc.description.sponsoredbyTubitakEuEU - TÜBİTAK
dc.description.sponsorshipThis work was partially supported by the Scientific and Technological Research Council of Turkey (TUBITAK) through 119E088, and the 1515 Frontier Research and Development Laboratories Support Program under Project 5169902, and has been partly funded by the Hexa-X II project which has received funding from the Smart Networks and Services Joint Undertaking (SNS JU) under the European Union's Horizon Europe research and innovation program and Grant Agreement No 101095759. The work was also supported by the 3IA Cote d'Azur programme reference number ANR-19-P3IA-0002.
dc.identifier.doi10.1007/978-981-97-8016-7_4
dc.identifier.eissn1611-3349
dc.identifier.grantnoScientific and Technological Research Council of Turkey (TUBITAK) [119E088, 5169902];1515 Frontier Research and Development Laboratories Support Program [5169902];Hexa-X II project from the Smart Networks and Services Joint Undertaking (SNS JU) under the European Union's Horizon Europe research and innovation program [101095759];3IA Cote d'Azur programme [ANR-19-P3IA-0002]
dc.identifier.isbn9789819780150
dc.identifier.isbn9789819780167
dc.identifier.issn0302-9743
dc.identifier.quartileQ4
dc.identifier.scopus2-s2.0-85206127489
dc.identifier.urihttps://doi.org/10.1007/978-981-97-8016-7_4
dc.identifier.urihttps://hdl.handle.net/20.500.14288/27336
dc.identifier.volume14906
dc.identifier.wos1344497600004
dc.keywordsFederated learning
dc.keywordsSecure aggregation
dc.keywordsPrivacy
dc.keywordsPoisoning attacks
dc.keywordsOblivious range verification
dc.language.isoeng
dc.publisherSpringer-Verlag Singapore Pte Ltd
dc.relation.ispartofCRYPTOLOGY AND NETWORK SECURITY, PT II, CANS 2024
dc.subjectComputer science
dc.titleFault tolerant and malicious secure federated learning
dc.typeConference Proceeding
dspace.entity.typePublication
local.contributor.kuauthorKüpçü, Alptekin
local.publication.orgunit1College of Engineering
local.publication.orgunit2Department of Computer Engineering
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isParentOrgUnitOfPublication8e756b23-2d4a-4ce8-b1b3-62c794a8c164
relation.isParentOrgUnitOfPublication.latestForDiscovery8e756b23-2d4a-4ce8-b1b3-62c794a8c164

Files