scispace - formally typeset
Open AccessJournal ArticleDOI

No Free Lunch Theorem for Security and Utility in Federated Learning

TLDR
A general framework is illustrated that formulates the trade-off between privacy loss and utility loss from a unified information-theoretic point of view, and delineates quantitative bounds of privacy-utility trade-offs when different protection mechanisms including Randomization, Sparsity, and Homomorphic Encryption are used.
Abstract
In a federated learning scenario where multiple parties jointly learn a model from their respective data, there exist two conflicting goals for the choice of appropriate algorithms. On one hand, private and sensitive training data must be kept secure as much as possible in the presence of semi-honest partners; on the other hand, a certain amount of information has to be exchanged among different parties for the sake of learning utility. Such a challenge calls for the privacy-preserving federated learning solution, which maximizes the utility of the learned model and maintains a provable privacy guarantee of participating parties’ private data. This article illustrates a general framework that (1) formulates the trade-off between privacy loss and utility loss from a unified information-theoretic point of view, and (2) delineates quantitative bounds of the privacy-utility trade-off when different protection mechanisms including randomization, sparsity, and homomorphic encryption are used. It was shown that in general there is no free lunch for the privacy-utility trade-off, and one has to trade the preserving of privacy with a certain degree of degraded utility. The quantitative analysis illustrated in this article may serve as the guidance for the design of practical federated learning algorithms.

read more

Citations
More filters
Journal ArticleDOI

A Full Dive Into Realizing the Edge-Enabled Metaverse: Visions, Enabling Technologies, and Challenges

TL;DR: This survey focuses on the edge-enabled Metaverse to realize its ultimate vision and explores how blockchain technologies can aid in the interoperable development of the Metaverse, not just in terms of empowering the economic circulation of virtual user-generated content but also to manage physical edge resources in a decentralized, transparent, and immutable manner.
Journal ArticleDOI

Trading Off Privacy, Utility and Efficiency in Federated Learning

TL;DR: It is indicated that it is unrealistic to expect an FL algorithm to simultaneously provide excellent privacy, utility, and efficiency in certain scenarios, and a framework is proposed that reconciles horizontal and vertical federated learning.
Journal ArticleDOI

A Survey on Heterogeneous Federated Learning

Dashan Gao, +2 more
- 10 Oct 2022 - 
TL;DR: The domain of heterogeneous FL is comprehensively investigated in terms of data space, statistical, system, and model heterogeneity, and a precise taxonomy of het- erogeneous FL settings for each type of heterogeneity according to the problem setting and learning objective is proposed.
Journal ArticleDOI

Differentially Private Diffusion Models Generate Useful Synthetic Images

TL;DR: In this article , Wang et al. used differential privacy to fine-tune ImageNet pre-trained diffusion models with more than 80M parameters and obtained SOTA results on CIFAR-10 and Camelyon17 in terms of both FID and the accuracy of downstream classifiers trained on synthetic data.
Journal ArticleDOI

Federated Learning with Privacy-preserving and Model IP-right-protection

TL;DR: Secure federated learning (SFL) as mentioned in this paper is an approach for solving data silos and data privacy problems based on secure distributed AI, which emphasizes data security throughout the lifecycle, which includes data preprocessing, training, evaluation, and deployments.
References
More filters
Posted Content

BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding

TL;DR: A new language representation model, BERT, designed to pre-train deep bidirectional representations from unlabeled text by jointly conditioning on both left and right context in all layers, which can be fine-tuned with just one additional output layer to create state-of-the-art models for a wide range of tasks.
Journal ArticleDOI

Stochastic Relaxation, Gibbs Distributions, and the Bayesian Restoration of Images

TL;DR: The analogy between images and statistical mechanics systems is made and the analogous operation under the posterior distribution yields the maximum a posteriori (MAP) estimate of the image given the degraded observations, creating a highly parallel ``relaxation'' algorithm for MAP estimation.
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Journal ArticleDOI

No free lunch theorems for optimization

TL;DR: A framework is developed to explore the connection between effective optimization algorithms and the problems they are solving and a number of "no free lunch" (NFL) theorems are presented which establish that for any algorithm, any elevated performance over one class of problems is offset by performance over another class.
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Related Papers (5)
Trending Questions (1)
What Is the No Free Lunch Theorem?

The paper does not explicitly mention the "No Free Lunch Theorem."