Skip to main content
Log in

FedMEC: Improving Efficiency of Differentially Private Federated Learning via Mobile Edge Computing

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Federated learning is a recently proposed paradigm that presents significant advantages in privacy-preserving machine learning services. It enables the deep learning applications on mobile devices, where a deep neural network (DNN) is trained in a decentralized manner among thousands of edge clients. However, directly apply the federated learning algorithm to the mobile edge computing environment will incur unacceptable computation costs in mobile edge devices. Moreover, among the training process, frequent model parameters exchanging between participants and the central server will increase the leakage possibility of the users’ sensitive training data. Aiming at reducing the heavy computation cost of DNN training on edge devices while providing strong privacy guarantees, we propose a mobile edge computing enabled federated learning framework, called FedMEC, which integrating model partition technique and differential privacy simultaneously. In FedMEC, the most complex computations can be outsourced to the edge servers by splitting a DNN model into two parts. Furthermore, we apply the differentially private data perturbation method to prevent the privacy leakage from the local model parameters, in which the updates from an edge device to the edge server is perturbed by the Laplace noise. To validate the proposed FedMEC, we conduct a series of experiments on an image classification task under the settings of federated learning. The results demonstrate the effectiveness and practicality of our FedMEC scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

References

  1. Hesamifard E, Takabi H, Ghasemi M, Wright RN (2018) Privacy-preserving machine learning as a service. In: Proc. of 19th Privacy enhancing technologies symposium (PETS), pp 123–142

  2. Cao B, Zheng L, Zhang C, Yu PS, Piscitello A, Zulueta J, Ajilore O, Ryan K, Leow AD (2017) DeepMood: Modeling mobile phone typing dynamics for mood detection. In: Proc. of 23rd ACM International conference on knowledge discovery and data mining (SIGKDD), pp 747–755

  3. Schroff F, Kalenichenko D, Philbin J (2015) Facenet: A Unified Embedding for Face Recognition and Clustering. In: Proc. of 28th IEEE Conference on computer vision and pattern recognition (CVPR), pp 815–823

  4. Zhai X, Guan X, Zhu C, Shu L, Yuan J (2018) Optimization algorithms for Multi-access green communications in internet of things. IEEE Internet of Things J 5(3):1739–1748

    Article  Google Scholar 

  5. Zhang J, Chen B, Zhao Y, Cheng X, Hu F (2018) Data security and Privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6:18209–18237

    Article  Google Scholar 

  6. Mach P, Becvar Z (2017) Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun Surv & Tut 19(3):1628–1656

    Article  Google Scholar 

  7. Zhai XB, Liu X, Zhu C, Zhu K, Chen B (2019) Fast admission control and power optimization with adaptive rates for communication fairness in wireless networks. IEEE Transactions on Mobile Computing, to appear, 2019

  8. Li Y, Qi X, Keally M, Ren Z, Zhou G, Xiao D, Deng S (2017) Communication energy modeling and optimization through joint packet size analysis of bsn and wifi networks. IEEE Trans Parall Distr Syst 24(9):1741–1751

    Article  Google Scholar 

  9. Konečnỳ J., McMahan HB, Yu FX, Richtárik P., Suresh AT, Bacon D (2016) Federated Learning: Strategies for Improving Communication Efficiency. [Online]. Available: arXiv:1610.05492

  10. Smith V, Chiang C.-K., Sanjabi M, Talwalkar AS (2017) Federated Multi-task learning. In: Proc. of 32nd Annual conference on neural information processing systems (NIPS), pp 4427–4437

  11. Shokri R, Shmatikov V (2015) Privacy-preserving deep learning. In: Proc. of 22nd ACM Conference on computer and communications security (CCS), pp 1310–1321

  12. Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. ACM Trans Intell Syst Technol 10(2):1–19

    Article  Google Scholar 

  13. McMahan HB, Moore E, Ramage D, Hampson S, y Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Proc. of 20th International conference on artificial intelligence and statistics (AISTATS), pp 1–10

  14. Wang J, Zhang J, Bao W, Zhu X, Cao B, Yu PS (2018) Not Just Privacy: Improving Performance of Private Deep Learning in Mobile Cloud. In: Proc. of 24th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pp 2407–2416

  15. Mao Y, Yi S, Li Q, Feng J, Xu F, Zhong S (2018) Learning from differentially private neural activations with edge computing. In: Proc. of 3rd IEEE/ACM Symposium on edge computing (SEC), pp 90–102

  16. Han S, Pool J, Tran J, Dally W (2015) Learning both weights and connections for efficient neural networks. In: Proc. of 30th Annual conference on neural information processing systems (NIPS), pp 1135–1143

  17. Li Y, Hu H, Zhou G (2018) Using data augmentation in continuous authentication on smartphones. IEEE Internet of Things J 6(1):628–640

    Article  Google Scholar 

  18. Hayes J, Ohrimenko O (2018) Contamination Attacks and Mitigation in Multi-Party Machine Learning. In: Proc. of 33th annual conference on neural information processing systems (NIPS), pp 6604–6616

  19. Li Y, Hu H, Zhou G, Deng S (2018) Sensor-based continuous authentication using cost-effective kernel ridge regression. IEEE Access 6:32554–32565

    Article  Google Scholar 

  20. Fredrikson F, Jha S, Ristenpart T (2015) Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures. In: Proc. of 22th ACM Conference on computer and communications security (CCS), pp 1322–1333

  21. Phong LT, Aono Y, Wang T, Hayashi L, Moriai S (2018) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inf Forensics Secur 13(5):1333–1345

    Article  Google Scholar 

  22. Osia SA, Shamsabadi AS, Taheri A, Katevas K, Sajadmanesh S, Rabiee HR, Lane ND, Haddadi H (2018) A hybrid deep learning architecture for Privacy-preserving mobile analytics. ACM Trans Knowl Discov Data 1(1):1–21

    Google Scholar 

  23. Dean J, Corrado G, Monga R, Chen K, Devin M, Mao M, Ranzato M, Senior A, Tucker P, Yang K, Le QV, Ng AY (2012) Large scale distributed deep networks. In: Proc. of 27th Annual conference on neural information processing systems (NIPS), pp 1223–1231

  24. Zhang J, Wang J, Zhao Y, Chen B (2019) An Efficient Federated Learning Scheme with differential privacy in mobile edge computing. In: Proc. of 4th EAI International conference on machine learning and intelligent communications (MLICOM), pp 538–550

  25. Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L (2016) Deep Learning with Differential Privacy. In: Proc. of 23th ACM Conference on computer and communications security (CCS), pp 308–318

  26. Dwork C, Roth A (2014) The algorithmic foundations of differential privacy. Found Trends Theor Comput Sci 9(3):211–407

    MathSciNet  MATH  Google Scholar 

  27. Geyer RC, Klein T, Nabi M (2017) Differentially private federated learning: A client level perspective. In: Proc. of 32nd annual conference on neural information processing systems (NIPS), pp 1–7

  28. Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: Proc. of 24th ACM conference on computer and communications security (CCS), pp 1175–1191

  29. Beimel A, Brenner H, Kasiviswanathan SP, Nissim K (2014) Bounds on the sample complexity for private learning and private data release. Machine Learning 94(3):401–437

    Article  MathSciNet  MATH  Google Scholar 

  30. Li H, Ota K, Dong M (2018) Learning IoT in edge: Deep learning for the internet of things with edge computing. IEEE Network 32(1):96–101

    Article  Google Scholar 

  31. Chang S, Li C (2018) Privacy in neural network learning: threats and countermeasures. IEEE Network 32 (4):61–67

    Article  Google Scholar 

  32. Lane ND, Georgiev P (2015) Can Deep Learning Revolutionize Mobile Sensing?. In: Proc. of 16th International workshop on mobile computing systems and applications (HotMobile), pp 117–122

  33. Friedman A, Schuster A (2010) Data mining with differential privacy. In: Proc. of 16th ACM International conference on knowledge discovery and data mining (SIGKDD), pp 25–28

  34. Schmidhuber J (2015) Deep learning in neural networks: an overview. Neural networks 61:85–117

    Article  Google Scholar 

  35. Dong C, Loy CC, He K, Tang X (2016) Image Super-resolutio using deep convolutional networks. IEEE Trans Pattern Anal Machine Intell 38(2):295–307

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported in part by the National Key Research and Development Program of China under Grant 2017YFB0802303, in part by the National Natural Science Foundation of China under Grant 61672283 and Grant 61602238, and in part by the Postgraduate Research & Practice Innovation Program of Jiangsu Province under Grant KYCX18_0308.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bing Chen.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

The material in this paper was presented partially at “An Efficient Federated Learning Scheme with Differential Privacy in Mobile Edge Computing”, EAI MLICOM 2019 [24]

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, J., Zhao, Y., Wang, J. et al. FedMEC: Improving Efficiency of Differentially Private Federated Learning via Mobile Edge Computing. Mobile Netw Appl 25, 2421–2433 (2020). https://doi.org/10.1007/s11036-020-01586-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-020-01586-4

Keywords

Navigation