Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2022, Vol. 16 Issue (5) : 165817    https://doi.org/10.1007/s11704-021-0598-z
REVIEW ARTICLE
Challenges and future directions of secure federated learning: a survey
Kaiyue ZHANG1,2, Xuan SONG3,4(), Chenhan ZHANG2, Shui YU2()
1. Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen 518055, China
2. Faculty of Engineering and Information Technology, University of Technology Sydney, Sydney 2007, Australia
3. SUSTech-UTokyo Joint Research Center on Super Smart City, Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen 518055, China
4. Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation, Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen 518055, China
 Download: PDF(10553 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Federated learning came into being with the increasing concern of privacy security, as people’s sensitive information is being exposed under the era of big data. It is an algorithm that does not collect users’ raw data, but aggregates model parameters from each client and therefore protects user’s privacy. Nonetheless, due to the inherent distributed nature of federated learning, it is more vulnerable under attacks since users may upload malicious data to break down the federated learning server. In addition, some recent studies have shown that attackers can recover information merely from parameters. Hence, there is still lots of room to improve the current federated learning frameworks. In this survey, we give a brief review of the state-of-the-art federated learning techniques and detailedly discuss the improvement of federated learning. Several open issues and existing solutions in federated learning are discussed. We also point out the future research directions of federated learning.

Keywords federated learning      privacy protection      security     
Corresponding Author(s): Xuan SONG,Shui YU   
Just Accepted Date: 12 April 2021   Issue Date: 07 December 2021
 Cite this article:   
Kaiyue ZHANG,Xuan SONG,Chenhan ZHANG, et al. Challenges and future directions of secure federated learning: a survey[J]. Front. Comput. Sci., 2022, 16(5): 165817.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-021-0598-z
https://academic.hep.com.cn/fcs/EN/Y2022/V16/I5/165817
Fig.1  Traditional deep learning versus federated learning. (a) Traditional deep learning. Step A: server collects data from users. Step B: server uses the whole dataset to train the model. Step C: server sends back the complete model to all the users; (b) Federated learning. Step I: server sends the global model to all the users. Step II: each user uses own data to train local model. Step III: each user sends their model to the server. Step IV: server aggregates models as a global model
Fig.2  Five challenges that we mainly discussed in this paper
1 Shen S, Zhu T, Wu D, Wang W, Zhou W. From distributed machine learning to federated learning: in the view of data privacy and security. Concurrency and Computation: Practice and Experience, 2020, DOI:
2 M Abadi, A Chu, I Goodfellow, H B McMahan, I Mironov, K Talwar, L Zhang. Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016, 308– 318
3 P Li , J Li , Z Huang , T Li , C Z Gao , S M Yiu , K Chen . Multi-key privacy-preserving deep learning in cloud computing. Future Generation Computer Systems, 2017, 74 : 76– 85
4 B McMahan, E Moore, D Ramage, S Hampson, B A Arcas y. Communication-efficient learning of deep networks from decentralized data. In: Proceedings of Artificial Intelligence and Statistics. 2017, 1273−1282
5 T Yang, G Andrew, H Eichner, H Sun, W Li, N Kong, D Ramage, F Beaufays. Applied federated learning: Improving google keyboard query suggestions. 2018, arXiv preprint arXiv: 1812.02903
6 A Hard, K Rao, R Mathews, S Ramaswamy, F Beaufays, S Augenstein, H Eichner, C Kiddon, D Ramage. Federated learning for mobile keyboard prediction. 2018, arXiv preprint arXiv: 1811.03604
7 R Shokri, V Shmatikov. Privacy-preserving deep learning. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015, 1310−1321
8 D Leroy, A Coucke, T Lavril, T Gisselbrecht, J Dureau. Federated learning for keyword spotting. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing. 2019, 6341−6345
9 S Ramaswamy, R Mathews, K Rao, F Beaufays. Federated learning for emoji prediction in a mobile keyboard. 2019, arXiv preprint arXiv: 1906.04329
10 A Fallah , A Mokhtari , A Ozdaglar . Personalized federated learning with theoretical guarantees: a modelagnostic meta-learning approach. Advances in Neural Information Processing Systems, 2020, 33–
11 D Ye , R Yu , M Pan , Z Han . Federated learning in vehicular edge computing: a selective model aggregation approach. IEEE Access, 2020, 8 : 23920– 23935
12 Y Lu , X Huang , Y Dai , S Maharjan , Y Zhang . Federated learning for data privacy preservation in vehicular cyber-physical systems. IEEE Network, 2020, 34( 3): 50– 56
13 C Zhou , A Fu , S Yu , W Yang , H Wang , Y Zhang . Privacy-preserving federated learning in fog computing. IEEE Internet of Things Journal, 2020, 7( 11): 10782– 10793
14 W Y B Lim , N C Luong , D T Hoang , Y Jiao , Y C Liang , Q Yang , D Niyato , C Miao . Federated learning in mobile edge networks: a comprehensive survey. IEEE Communications Surveys & Tutorials, 2020, 22( 3): 2031– 2063
15 V Mothukuri , R M Parizi , S Pouriyeh , Y Huang , A Dehghantanha , G Srivastava . A survey on security and privacy of federated learning. Future Generation Computer Systems, 2021, 115 : 619– 640
16 C Fung, C J Yoon, I Beschastnikh. Mitigating sybils in federated learning poisoning. 2018, arXiv preprint arXiv: 1808.04866
17 K Bonawitz, V Ivanov, B Kreuter, A Marcedone, H B McMahan, S Patel, D Ramage, A Segal, K Seth. Practical secure aggregation for privacy-preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017, 1175−1191
18 Y Zhao, M Li, L Lai, N Suda, D Civin, V Chandra. Federated learning with non-iid data. 2018, arXiv preprint arXiv: 1806.00582
19 T Li , A K Sahu , A Talwalkar , V Smith . Federated learning: challenges, methods, and future directions. IEEE Signal Processing Magazine, 2020, 37( 3): 50– 60
20 Q Yang , Y Liu , T Chen , Y Tong . Federated machine learning: concept and applications. ACM Transactions on Intelligent Systems and Technology, 2019, 10( 2): 1– 19
21 A Nilsson, S Smith, G Ulm, E Gustavsson, M Jirstrand. A performance evaluation of federated learning algorithms. In: Proceedings of the 2nd Workshop on Distributed Infrastructures for Deep Learning. 2018, 1– 8
22 Y Aono , T Hayashi , L Wang , S Moriai . Privacypreserving deep learning via additively homomorphic encryption. IEEE Transactions on Information Forensics and Security, 2017, 13( 5): 1333– 1345
23 Y Chen , X Qin , J Wang , C Yu , W Gao . Fedhealth: a federated transfer learning framework for wearable healthcare. IEEE Intelligent Systems, 2020, 35( 4): 83– 93
24 X Wang , Y Han , C Wang , Q Zhao , X Chen , M Chen . In-edge ai: Intelligentizing mobile edge computing, caching and communication by federated learning. IEEE Network, 2019, 33( 5): 156– 165
25 F X Yu, A S Rawat, A K Menon, S Kumar. Federated learning with only positive labels. 2020, arXiv preprint arXiv: 2004.10342
26 Kairouz P, McMahan H B, Avent B, Bellet A, Bennis M, Bhagoji A N, Bonawitz K, Charles Z, Cormode G, Cummings R, et al. Advances and open problems in federated learning. 2019, arXiv preprint arXiv: 1912.04977
27 A N Bhagoji, S Chakraborty, P Mittal, S Calo. Analyzing federated learning through an adversarial lens. In: Proceedings of International Conference on Machine Learning. 2019, 634– 643
28 L Zhu, Z Liu, S Han. Deep leakage from gradients. Advances in Neural Information Processing Systems, 2019, 32: 1477 4– 14784
29 J Konečnỳ, H B McMahan, F X Yu, P Richtárik, A T Suresh, D Bacon. Federated learning: strategies for improving communication efficiency. 2016, arXiv preprint arXiv: 1610.05492
30 J Konečnỳ, H B McMahan, F X Yu, P Richtarik, A T Suresh, D Bacon. Federated learning: strategies for improving communication efficiency. In: Proceedings of NIPS Workshop on Private Multi-Party Machine Learning. 2016
31 T Li, A K Sahu, M Zaheer, M Sanjabi, A Talwalkar, V Smith. Federated optimization in heterogeneous networks. 2018, arXiv preprint arXiv: 1812.06127
32 Bonawitz K, Eichner H, Grieskamp W, Huba D, Ingerman A, Ivanov V, Kiddon C, Konecny J, Mazzocchi S, McMahan H B, Van Overveldt T, Petrou D, Ramage D, Roselander J. Towards federated learning at scale: system design, 2019, arXiv preprint arXiv: 1902.01046
33 J Kang , Z Xiong , D Niyato , Y Zou , Y Zhang , M Guizani . Reliable federated learning for mobile networks. IEEE Wireless Communications, 2020, 27( 2): 72– 80
34 A Rakhlin, O Shamir, K Sridharan. Making gradient descent optimal for strongly convex stochastic optimization. In: Proceedings of the 29th International Coference on International Conference on Machine Learning. 2012, 1571−1578
35 F Sattler , S Wiedemann , K R Müller , W Samek . Robust and communication-efficient federated learning from non-iid data. IEEE Transactions on Neural Networks and Learning Systems, 2019, 31( 9): 3400– 3413
36 X Li, K Huang, W Yang, S Wang, Z Zhang. On the convergence of fedavg on non-iid data. 2019, arXiv preprint arXiv: 1907.02189
37 T Ha , T K Dang , H Le , T A Truong . Security and privacy issues in deep learning: a brief review. SN Computer Science, 2020, 1( 5): 253–
38 S Truex, N Baracaldo, A Anwar, T Steinke, H Ludwig, R Zhang, Y Zhou. A hybrid approach to privacypreserving federated learning. In: Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security. 2019, 1– 11
39 M Fredrikson, S Jha, T Ristenpart. Model inversion attacks that exploit confidence information and basic countermeasures. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015, 1322−1333
40 Geiping J, Bauermeister H, Dröge H, Moeller M. Inverting gradients–how easy is it to break privacy in federated learning? 2020, arXiv preprint arXiv: 2003.14053
41 R C Geyer, T Klein, M Nabi. Differentially private federated learning: a client level perspective. 2017, arXiv preprint arXiv: 1712.07557
42 K Wei , J Li , M Ding , C Ma , H H Yang , F Farokhi , S Jin , T Q Quek , H V Poor . Federated learning with differential privacy: algorithms and performance analysis. IEEE Transactions on Information Forensics and Security, 2020, 15 : 3454– 3469
43 Biggio B, Nelson B, Laskov P. Poisoning attacks against support vector machines. In: Proceedings of the 29th International Coference on International Conference on Machine Learning. 2012, 1467−1474
44 E Bagdasaryan, A Veit, Y Hua, D Estrin, V Shmatikov. How to backdoor federated learning. In: Proceedings of International Conference on Artificial Intelligence. 2020, 2938−2948
45 Sun Z, Kairouz P, Suresh A T, McMahan H B. Can you really backdoor federated learning? 2019, arXiv preprint arXiv: 1911.07963
46 A Bittau, Ú Erlingsson, P Maniatis, I Mironov, A Raghunathan, D Lie, M Rudominer, U Kode, J Tinnes, B Seefeld. Prochlo: strong privacy for analytics in the crowd. In: Proceedings of the 26th Symposium on Operating Systems Principles. 2017, 441– 459
47 R Liu, Y Cao, H Chen, R Guo, M Yoshikawa. Flame: differentially private federated learning in the shuffle model. 2020, arXiv preprint arXiv: 2009.08063
48 T Wang , B Ding , M Xu , Z Huang , C Hong , J Zhou , N Li , S Jha . Improving utility and security of the shuffler-based differential privacy. Proceedings of the VLDB Endowment, 2020, 13( 13): 3545– 3558
49 C Ma , J Li , M Ding , H H Yang , F Shu , T Q Quek , H V Poor . On safeguarding privacy and security in the framework of federated learning. IEEE Network, 2020, 34( 4): 242– 248
50 M Goddard . The eu general data protection regulation (GDPR): European regulation that has a global impact. International Journal of Market Research, 2017, 59( 6): 703– 705
51 Lim W Y B, Garg S, Xiong Z, Niyato D, Leung C, Miao C, Guizani M. Dynamic contract design for federated learning in smart healthcare applications. IEEE Internet of Things Journal, 2020, DOI:
52 T S Brisimi , R Chen , T Mela , A Olshevsky , I C Paschalidis , W Shi . Federated learning of predictive models from federated electronic health records. International Journal of Medical Informatics, 2018, 112 : 59– 67
53 Silva S, Gutman B A, Romero E, Thompson P M, Altmann A, Lorenzi M. Federated learning in distributed medical databases: meta-analysis of large-scale subcortical brain data. In: Proceedings of IEEE 16th International Symposium on Biomedical Imaging. 2019, 270–274
54 J Xu , B S Glicksberg , C Su , P Walker , J Bian , F Wang . Federated learning for healthcare informatics. Journal of Healthcare Informatics Research, 2020, 5( 1): 1– 19
55 R Kumar, A A Khan, S Zhang, W Wang, Y Abuidris, W Amin, J Kumar. Blockchain-federated-learning and deep learning models for covid-19 detection using ct imaging. 2020, arXiv preprint arXiv: 2007.06537
56 B Liu, B Yan, Y Zhou, Y Yang, Y Zhang. Experiments of federated learning for covid-19 chest x-ray images. 2020, arXiv preprint arXiv: 2007.05592
57 H Yu, Z Liu, Y Liu, T Chen, M Cong, X Weng, D Niyato, Q Yang. A fairness-aware incentive scheme for federated learning. In: Proceedings of the AAAI/ACM Conference on AI, Ethics, and Society. 2020, 393– 399
58 L U Khan , S R Pandey , N H Tran , W Saad , Z Han , M N Nguyen , C S Hong . Federated learning for edge networks: resource optimization and incentive mechanism. IEEE Communications Magazine, 2020, 58( 10): 88– 93
59 S R Pandey , N H Tran , M Bennis , Y K Tun , A Manzoor , C S Hong . A crowdsourcing framework for ondevice federated learning. IEEE Transactions on Wireless Communications, 2020, 19( 5): 3241– 3256
60 J Kang , Z Xiong , D Niyato , S Xie , J Zhang . Incentive mechanism for reliable federated learning: a joint optimization approach to combining reputation and contract theory. IEEE Internet of Things Journal, 2019, 6( 6): 10700– 10714
61 J Weng , J Weng , J Zhang , M Li , Y Zhang , W Luo . Deepchain: auditable and privacy-preserving deep learning with blockchain-based incentive. IEEE Transactions on Dependable and Secure Computing, 2019, 18( 5): 2438– 2455
62 Y Huang, L Chu, Z Zhou, L Wang, J Liu, J Pei, Y Zhang. Personalized federated learning: an attentive collaboration approach. 2020, arXiv preprint arXiv: 2007.03797
63 C T Dinh , N Tran , T D Nguyen . Personalized federated learning with moreau envelopes. Advances in Neural Information Processing Systems, 2020, 33–
64 Y Deng, M M Kamani, M Mahdavi. Adaptive personalized federated learning. 2020, arXiv preprint arXiv: 2003.13461
65 R Hu , Y Guo , H Li , Q Pei , Y Gong . Personalized federated learning with differential privacy. IEEE Internet of Things Journal, 2020, 7( 10): 9530– 9539
66 Y Mansour, M Mohri, J Ro, A T Suresh. Three approaches for personalization with applications to federated learning. 2020, arXiv preprint arXiv: 2002.10619
67 K Wang, R Mathews, C Kiddon, H Eichner, F Beaufays, D Ramage. Federated evaluation of on-device personalization. 2019, arXiv preprint arXiv: 1910.10252
[1] Muazzam MAQSOOD, Sadaf YASMIN, Saira GILLANI, Maryam BUKHARI, Seungmin RHO, Sang-Soo YEO. An efficient deep learning-assisted person re-identification solution for intelligent video surveillance in smart cities[J]. Front. Comput. Sci., 2023, 17(4): 174329-.
[2] Ping ZHANG. Universal tweakable Even-Mansour cipher and its applications[J]. Front. Comput. Sci., 2023, 17(4): 174807-.
[3] Xianfeng LIANG, Shuheng SHEN, Enhong CHEN, Jinchang LIU, Qi LIU, Yifei CHENG, Zhen PAN. Accelerating local SGD for non-IID data using variance reduction[J]. Front. Comput. Sci., 2023, 17(2): 172311-.
[4] Changbo KE, Fu XIAO, Zhiqiu HUANG, Fangxiong XIAO. A user requirements-oriented privacy policy self-adaption scheme in cloud computing[J]. Front. Comput. Sci., 2023, 17(2): 172203-.
[5] Pu SUN, Sen CHEN, Lingling FAN, Pengfei GAO, Fu SONG, Min YANG. VenomAttack: automated and adaptive activity hijacking in Android[J]. Front. Comput. Sci., 2023, 17(1): 171801-.
[6] Wei SHI, Dan TANG, Sijia ZHAN, Zheng QIN, Xiyin WANG. An approach for detecting LDoS attack based on cloud model[J]. Front. Comput. Sci., 2022, 16(6): 166821-.
[7] Xinghua LI, Ting CHEN, Qingfeng CHENG, Jianfeng MA. An efficient and authenticated key establishment scheme based on fog computing for healthcare system[J]. Front. Comput. Sci., 2022, 16(4): 164815-.
[8] Bin ZHANG, Jiaxi YE, Ruilin LI, Chao FENG, Yunfei SU, Chaojing TANG. Pusher: an augmented fuzzer based on the connection between input and comparison operand[J]. Front. Comput. Sci., 2022, 16(4): 164206-.
[9] Abhishek MAJUMDAR, Arpita BISWAS, Atanu MAJUMDER, Sandeep Kumar SOOD, Krishna Lal BAISHNAB. A novel DNA-inspired encryption strategy for concealing cloud storage[J]. Front. Comput. Sci., 2021, 15(3): 153807-.
[10] Bin GUO, Yasan DING, Yueheng SUN, Shuai MA, Ke LI, Zhiwen YU. The mass, fake news, and cognition security[J]. Front. Comput. Sci., 2021, 15(3): 153806-.
[11] Zeli WANG, Hai JIN, Weiqi DAI, Kim-Kwang Raymond CHOO, Deqing ZOU. Ethereum smart contract security research: survey and future research opportunities[J]. Front. Comput. Sci., 2021, 15(2): 152802-.
[12] Je Sen TEH, Weijian TENG, Azman SAMSUDIN, Jiageng CHEN. A post-processing method for true random number generators based on hyperchaos with applications in audio-based generators[J]. Front. Comput. Sci., 2020, 14(6): 146405-.
[13] Xiaochen LIU, Chunhe XIA, Tianbo WANG, Li ZHONG, Xiaojian LI. A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service[J]. Front. Comput. Sci., 2020, 14(6): 146808-.
[14] Yanwei ZHOU, Bo YANG. Practical continuous leakage-resilient CCA secure identity-based encryption[J]. Front. Comput. Sci., 2020, 14(4): 144804-.
[15] Yudi ZHANG, Debiao HE, Mingwu ZHANG, Kim-Kwang Raymond CHOO. A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm[J]. Front. Comput. Sci., 2020, 14(3): 143803-.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed