A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy

Lihua Yin , Sixin Lin , Zhe Sun , Ran Li , Yuanyuan He , Zhiqiang Hao

›› 2024, Vol. 10 ›› Issue (2) : 389 -403.

PDF
›› 2024, Vol. 10 ›› Issue (2) :389 -403. DOI: 10.1016/j.dcan.2022.12.024
Research article
research-article

A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy

Author information +
History +
PDF

Abstract

Benefiting from the development of Federated Learning (FL) and distributed communication systems, large-scale intelligent applications become possible. Distributed devices not only provide adequate training data, but also cause privacy leakage and energy consumption. How to optimize the energy consumption in distributed communication systems, while ensuring the privacy of users and model accuracy, has become an urgent challenge. In this paper, we define the FL as a 3-layer architecture including users, agents and server. In order to find a balance among model training accuracy, privacy-preserving effect, and energy consumption, we design the training process of FL as game models. We use an extensive game tree to analyze the key elements that influence the players’ decisions in the single game, and then find the incentive mechanism that meet the social norms through the repeated game. The experimental results show that the Nash equilibrium we obtained satisfies the laws of reality, and the proposed incentive mechanism can also promote users to submit high-quality data in FL. Following the multiple rounds of play, the incentive mechanism can help all players find the optimal strategies for energy, privacy, and accuracy of FL in distributed communication systems.

Keywords

Federated learning / Privacy preservation / Energy optimization / Game theory / Distributed communication systems

Cite this article

Download citation ▾
Lihua Yin, Sixin Lin, Zhe Sun, Ran Li, Yuanyuan He, Zhiqiang Hao. A game-theoretic approach for federated learning: A trade-off among privacy, accuracy and energy. , 2024, 10(2): 389-403 DOI:10.1016/j.dcan.2022.12.024

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

J. Zhang, Y. Zhang, X. Xu,Pyramid u-net for retinal vessel segmentation, in: ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, 2021, pp. 1125-1129.

[2]

B. Shickel, P.J. Tighe, A. Bihorac, P. Rashidi, Deep ehr: a survey of recent advances in deep learning techniques for electronic health record (ehr) analysis, IEEE J. Biomed. Health Inform. 22 (5) (2017) 1589-1604.

[3]

J. Xiong, J. Ren, L. Chen, Z. Yao, M. Lin, D. Wu, B. Niu, Enhancing privacy and availability for data clustering in intelligent electrical service of iot, IEEE Internet Things J. 6 (2) (2019) 1530-1540.

[4]

L. Yin, J. Feng, H. Xun, Z. Sun, X. Cheng, A privacy-preserving federated learning for multiparty data sharing in social iots, IEEE Trans. Netw. Sci. Eng. 8 (3) (2021) 2706-2718.

[5]

Z. Tian, X. Gao, S. Su, J. Qiu, X. Du, M. Guizani, Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory, IEEE Trans. Veh. Technol. 68 (6) (2019) 5971-5980.

[6]

Y. Liu, H. Yu, S. Xie, Y. Zhang, Deep reinforcement learning for offloading and resource allocation in vehicle edge computing and networks, IEEE Trans. Veh. Technol. 68 (11) (2019) 11158-11168.

[7]

GSMA,Iot connections forecast: the impact of covid-19. https://data.gsmaintelligence.com/research/research/research-2020/iot-connections-forecast-the-impact-of-covid-19.

[8]

M. Li, Y. Sun, H. Lu, S. Maharjan, Z. Tian, Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems, IEEE Internet Things J. 7 (7) (2019) 6266-6278.

[9]

H. Dong, S. Yu, C. Wu, Y. Guo,Semantic image synthesis via adversarial learning, in:Proceedings of the IEEE International Conference on Computer Vision, 2017, pp. 5706-5714.

[10]

S. Murugesan, Harnessing green it: principles and practices, IT professional 10 (1)(2008) 24-33.

[11]

A.P. Bianzino, L. Chiaraviglio, M. Mellia, J.-L. Rougier, Grida: green distributed algorithm for energy-efficient ip backbone networks, Comput. Network. 56 (14)(2012) 3219-3232.

[12]

Z. Lian, W. Wang, C. Su, Cofel: communication-efficient and optimized federated learning with local differential privacy, in: ICC 2021-IEEE International Conference on Communications, IEEE, 2021, pp. 1-6.

[13]

Y. Liu, H. Wang, M. Peng, J. Guan, Y. Wang, An incentive mechanism for privacy-preserving crowdsensing via deep reinforcement learning, IEEE Internet Things J. 8 (10) (2020) 8616-8631.

[14]

P. Panda, A. Sengupta, K. Roy, Energy-efficient and improved image recognition with conditional deep learning, ACM J. Emerg. Technol. Comput. Syst. 13 (3) (2017) 1-21.

[15]

Y. Zou, S. Feng, D. Niyato, Y. Jiao, S. Gong, W. Cheng, Mobile device training strategies in federated learning: an evolutionary game approach, in: 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE, 2019, pp. 874-879.

[16]

M. Hao, H. Li, X. Luo, G. Xu, H. Yang, S. Liu, Efficient and privacy-enhanced federated learning for industrial artificial intelligence, IEEE Trans. Ind. Inf. 16 (10)(2019) 6532-6542.

[17]

S. Truex, N. Baracaldo, A. Anwar, T. Steinke, H. Ludwig, R. Zhang, Y. Zhou,A hybrid approach to privacy-preserving federated learning, in:Proceedings of the 12th ACM Workshop on Artificial Intelligence and Security, 2019, pp. 1-11.

[18]

K. Wei, J. Li, M. Ding, C. Ma, H.H. Yang, F. Farokhi, S. Jin, T.Q. Quek, H.V. Poor, Federated learning with differential privacy: algorithms and performance analysis, IEEE Trans. Inf. Forensics Secur. 15 (2020) 3454-3469.

[19]

Y. Lu, X. Huang, Y. Dai, S. Maharjan, Y. Zhang, Blockchain and federated learning for privacy-preserved data sharing in industrial iot, IEEE Trans. Ind. Inf. 16 (6) (2019) 4177-4186.

[20]

M. Duan, D. Liu, X. Chen, Y. Tan, J. Ren, L. Qiao, L. Liang, Astraea: self-balancing federated learning for improving classification accuracy of mobile deep learning applications, in: 2019 IEEE 37th International Conference on Computer Design (ICCD), IEEE, 2019, pp. 246-254.

[21]

W. Luping, W. Wei, L. Bo, Cmfl: mitigating communication overhead for federated learning, in: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS), IEEE, 2019, pp. 954-964.

[22]

L. Nagalapatti, R. Narayanam,Game of Gradients: Mitigating Irrelevant Clients in Federated Learning, arXiv:2110.12257.

[23]

J. Du, C. Jiang, K.-C. Chen, Y. Ren, H.V. Poor, Community-structured evolutionary game for privacy protection in social networks, IEEE Trans. Inf. Forensics Secur. 13 (3) (2017) 574-589.

[24]

X. Wu, T. Wu, M. Khan, Q. Ni, W. Dou, Game theory based correlated privacy preserving analysis in big data, IEEE Trans. Big Data 7 (4) (2017) 643-656.

[25]

L. Xiao, Y. Li, G. Han, H. Dai, H.V. Poor, A secure mobile crowdsensing game with deep reinforcement learning, IEEE Trans. Inf. Forensics Secur. 13 (1) (2017) 35-47.

[26]

A.R. Sfar, Y. Challal, P. Moyal, E. Natalizio, A game theoretic approach for privacy preserving model in iot-based transportation, IEEE Trans. Intell. Transport. Syst. 20 (12) (2019) 4405-4414.

[27]

L. Xu, C. Jiang, Y. Qian, J. Li, Y. Zhao, Y. Ren, Privacy-accuracy trade-off in differentially-private distributed classification: a game theoretical approach, IEEE Trans. Big Data 7 (4) (2021) 770-783.

[28]

R. Hu, Y. Gong,Trading data for learning: incentive mechanism for on-device federated learning, in: GLOBECOM 2020-2020 IEEE Global Communications Conference, IEEE, 2020, pp. 1-6.

[29]

Z. Sun, L. Yin, C. Li, W. Zhang, A. Li, Z. Tian, The qos and privacy trade-off of adversarial deep learning: an evolutionary game approach, Comput. Secur. 96 (2020) 101876.

[30]

R. Jin, X. He, H. Dai,On the tradeoff between privacy and utility in collaborative intrusion detection systems-a game theoretical approach, in:Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, 2017, pp. 45-51.

[31]

Z. Zhou, S. Yang, L. Pu, S. Yu, Cefl: online admission control, data scheduling, and accuracy tuning for cost-efficient federated learning across edge nodes, IEEE Internet Things J. 7 (10) (2020) 9341-9356.

[32]

Z. Yang, M. Chen, W. Saad, C.S. Hong, M. Shikh-Bahaei, Energy efficient federated learning over wireless communication networks, IEEE Trans. Wireless Commun. 20 (3) (2020) 1935-1949.

[33]

B. Luo, X. Li, S. Wang, J. Huang, L. Tassiulas, Cost-effective federated learning in mobile edge networks, IEEE J. Sel. Area. Commun. 39 (12) (2021) 3606-3621.

[34]

J. Hamer, M. Mohri, A.T. Suresh, Fedboost: a communication-efficient algorithm for federated learning,in:International Conference on Machine Learning, PMLR, 2020, pp. 3973-3983.

[35]

A. Elgabli, J. Park, C.B. Issaid, M. Bennis, Harnessing wireless channels for scalable and privacy-preserving federated learning, IEEE Trans. Commun. 69 (8) (2021) 5194-5208.

[36]

L. Li, D. Shi, R. Hou, H. Li, M. Pan, Z. Han, To talk or to work: flexible communication compression for energy efficient federated learning over heterogeneous mobile edge devices, in: IEEE INFOCOM 2021-IEEE Conference on Computer Communications, IEEE, 2021, pp. 1-10.

[37]

K. Wei, J. Li, M. Ding, C. Ma, H. Su, B. Zhang, H.V. Poor, User-level privacy-preserving federated learning: analysis and performance optimization, IEEE Trans. Mobile Comput. 21 (9) (2022) 3388-3401.

[38]

X. Tu, K. Zhu, N.C. Luong, D. Niyato, Y. Zhang, J. Li, Incentive mechanisms for federated learning: from economic and game theoretic perspective, IEEE Trans. Cogn. Commun. Netw. 8 (3) (2022) 1566-1593.

[39]

W. Wang, Q. Zhang, A stochastic game for privacy preserving context sensing on mobile phone, in: IEEE INFOCOM 2014-IEEE Conference on Computer Communications, IEEE, 2014, pp. 2328-2336.

[40]

S.R. Pandey, N.H. Tran, M. Bennis, Y.K. Tun, A. Manzoor, C.S. Hong, A crowdsourcing framework for on-device federated learning, IEEE Trans. Wireless Commun. 19 (5) (2020) 3241-3256.

[41]

K.L. Ng, Z. Chen, Z. Liu, H. Yu, Y. Liu, Q. Yang,A multi-player game for studying federated learning incentive schemes, in:Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence, 2021, pp. 5279-5281.

[42]

S. Wang, L. Li, W. Sun, J. Guo, R. Bie, K. Lin, Context sensing system analysis for privacy preservation based on game theory, Sensors 17 (2) (2017) 339.

[43]

Y. Mao, J. Zhang, K.B. Letaief, Dynamic computation offloading for mobile-edge computing with energy harvesting devices, IEEE J. Sel. Area. Commun. 34 (12)(2016) 3590-3605.

[44]

Y. LeCun, L. Bottou, Y. Bengio, P. Haffner, Gradient-based learning applied to document recognition, Proc. IEEE 86 (11) (1998) 2278-2324.

[45]

A. Krizhevsky, G. Hinton, Learning Multiple Layers of Features from Tiny Images, Department of Computer Science, University of Toronto, 2009.

[46]

A. Krizhevsky, I. Sutskever, G.E. Hinton,Imagenet classification with deep convolutional neural networks, in:Advances in Neural Information Processing Systems 25: 26 th Annual Conference on Neural Information Processing Systems 2012. Proceedings of a Meeting Held December 3-6, 2012, Lake Tahoe, Nevada, United States, 2012, pp. 1106-1114.

[47]

C. Busso, M. Bulut, C.-C. Lee, A. Kazemzadeh, E. Mower, S. Kim, J.N. Chang, S. Lee, S.S. Narayanan, Iemocap: interactive emotional dyadic motion capture database, Comput. Humanit. 42 (4) (2008) 335-359.

[48]

K. He, X. Zhang, S. Ren, J. Sun,Deep residual learning for image recognition, in:Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 770-778.

[49]

M. Wu, D. Ye, J. Ding, Y. Guo, R. Yu, M. Pan, Incentivizing differentially private federated learning: a multidimensional contract approach, IEEE Internet Things J. 8 (13) (2021) 10639-10651.

[50]

B. McMahan, E. Moore, D. Ramage, S. Hampson, B.A. y Arcas, Communication-efficient learning of deep networks from decentralized data, in: Artificial Intelligence and Statistics, PMLR, 2017, pp. 1273-1282.

AI Summary AI Mindmap
PDF

94

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/