Affiliation:
1. Hong Kong University of Science and Technology, Hong Kong
2. WeBank, China
3. WeBank and Hong Kong University of Science and Technology, Hong Kong
Abstract
Federated learning (FL)
enables participating parties to collaboratively build a global model with boosted utility without disclosing private data information. Appropriate protection mechanisms have to be adopted to fulfill the opposing requirements in preserving
privacy
and maintaining high model
utility
. In addition, it is a mandate for a federated learning system to achieve high
efficiency
in order to enable large-scale model training and deployment. We propose a unified federated learning framework that reconciles horizontal and vertical federated learning. Based on this framework, we formulate and quantify the trade-offs between privacy leakage, utility loss, and efficiency reduction, which leads us to the
No-Free-Lunch (NFL)
theorem for the federated learning system. NFL indicates that it is unrealistic to expect an FL algorithm to simultaneously provide excellent privacy, utility, and efficiency in certain scenarios. We then analyze the lower bounds for the privacy leakage, utility loss, and efficiency reduction for several widely-adopted protection mechanisms, including
Randomization
,
Homomorphic Encryption
,
Secret Sharing,
and
Compression
. Our analysis could serve as a guide for selecting protection parameters to meet particular requirements.
Funder
National Key Research and Development Program of China
Hong Kong RGC TRS
Publisher
Association for Computing Machinery (ACM)
Subject
Artificial Intelligence,Theoretical Computer Science
Reference53 articles.
1. Deep Learning with Differential Privacy
2. Federated Learning for Healthcare: Systematic Review and Architecture Proposal
3. Privacy-preserving deep learning via additively homomorphic encryption;Aono Yoshinori;IEEE Transactions on Information Forensics and Security,2017
4. Kyohei Atarashi and Masakazu Ishihata. 2021. Vertical federated learning for higher-order factorization machines. In Advances in Knowledge Discovery and Data Mining, Kamal Karlapalem, Hong Cheng, Naren Ramakrishnan, R. K. Agrawal, P. Krishna Reddy, Jaideep Srivastava, and Tanmoy Chakraborty (Eds.). Springer International Publishing, Cham, 346–357.
5. Safeguarding cryptographic keys
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献