Publication: Fault tolerant and malicious secure federated learning
dc.contributor.coauthor | Karakoc, Ferhat | |
dc.contributor.coauthor | Onen, Melek | |
dc.contributor.department | Department of Computer Engineering | |
dc.contributor.kuauthor | Küpçü, Alptekin | |
dc.contributor.schoolcollegeinstitute | College of Engineering | |
dc.date.accessioned | 2025-03-06T20:57:52Z | |
dc.date.issued | 2025 | |
dc.description.abstract | Federated learning (FL) is one of the promising collaborative machine learning methods finding many usage application scenarios in different domains such as healthcare [19] and/or telecommunication (5G, 5G beyond and 6G [25]). It also enhances privacy by allowing users to contribute to the global model training without sharing their training data. However, the local model updates exposed by users can still leak sensitive information. To prevent such leakage, secure aggregation protocols are utilized to hide the individual local model updates from the aggregator. Enhancing privacy in this way creates an open door for security attacks because the server is no longer able to analyze received updates for detection of poisoning type of attacks. Although there are considerable number of studies that address the privacy and security aspects individually, solutions against the combination of these attacks have started to appear recently in a few studies. When we add some additional requirements such as aggregation unforgeability and robustness against user drop-outs, the number of solutions becomes very limited. Most of the proposals addressing all these aspects at the same time require two or more non-colluding aggregators, which may not be a realistic assumption in most of the use cases. To address this gap, we introduce new secure aggregation protocols involving one aggregator only. Each proposed protocol addresses a subset of the requirements where as the final one, FULLSA3, is secure against malicious clients and robust against user drop-outs. As a side contribution, we design a new batch oblivious range verification protocol. | |
dc.description.indexedby | WOS | |
dc.description.indexedby | Scopus | |
dc.description.publisherscope | International | |
dc.description.sponsoredbyTubitakEu | EU - TÜBİTAK | |
dc.description.sponsorship | This work was partially supported by the Scientific and Technological Research Council of Turkey (TUBITAK) through 119E088, and the 1515 Frontier Research and Development Laboratories Support Program under Project 5169902, and has been partly funded by the Hexa-X II project which has received funding from the Smart Networks and Services Joint Undertaking (SNS JU) under the European Union's Horizon Europe research and innovation program and Grant Agreement No 101095759. The work was also supported by the 3IA Cote d'Azur programme reference number ANR-19-P3IA-0002. | |
dc.identifier.doi | 10.1007/978-981-97-8016-7_4 | |
dc.identifier.eissn | 1611-3349 | |
dc.identifier.grantno | Scientific and Technological Research Council of Turkey (TUBITAK) [119E088, 5169902];1515 Frontier Research and Development Laboratories Support Program [5169902];Hexa-X II project from the Smart Networks and Services Joint Undertaking (SNS JU) under the European Union's Horizon Europe research and innovation program [101095759];3IA Cote d'Azur programme [ANR-19-P3IA-0002] | |
dc.identifier.isbn | 9789819780150 | |
dc.identifier.isbn | 9789819780167 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.quartile | Q4 | |
dc.identifier.scopus | 2-s2.0-85206127489 | |
dc.identifier.uri | https://doi.org/10.1007/978-981-97-8016-7_4 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14288/27336 | |
dc.identifier.volume | 14906 | |
dc.identifier.wos | 1344497600004 | |
dc.keywords | Federated learning | |
dc.keywords | Secure aggregation | |
dc.keywords | Privacy | |
dc.keywords | Poisoning attacks | |
dc.keywords | Oblivious range verification | |
dc.language.iso | eng | |
dc.publisher | Springer-Verlag Singapore Pte Ltd | |
dc.relation.ispartof | CRYPTOLOGY AND NETWORK SECURITY, PT II, CANS 2024 | |
dc.subject | Computer science | |
dc.title | Fault tolerant and malicious secure federated learning | |
dc.type | Conference Proceeding | |
dspace.entity.type | Publication | |
local.contributor.kuauthor | Küpçü, Alptekin | |
local.publication.orgunit1 | College of Engineering | |
local.publication.orgunit2 | Department of Computer Engineering | |
relation.isOrgUnitOfPublication | 89352e43-bf09-4ef4-82f6-6f9d0174ebae | |
relation.isOrgUnitOfPublication.latestForDiscovery | 89352e43-bf09-4ef4-82f6-6f9d0174ebae | |
relation.isParentOrgUnitOfPublication | 8e756b23-2d4a-4ce8-b1b3-62c794a8c164 | |
relation.isParentOrgUnitOfPublication.latestForDiscovery | 8e756b23-2d4a-4ce8-b1b3-62c794a8c164 |