RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning

📅 2025-02-13
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
To address practical challenges in federated learning—including privacy leakage, malicious server attacks (e.g., model inconsistency attacks), and dynamic client disconnections—this paper proposes a robust and secure aggregation framework. The framework leverages lightweight cryptographic primitives to realize, for the first time, a single-initialization, interaction-free, and dynamically disconnect-resilient secure aggregation protocol, with formal security proofs under both semi-honest and malicious adversary models. Key technical components include lightweight masking encryption, a middleware proxy architecture, an efficient key-agreement protocol, and a model-parameter consistency verification mechanism. Experimental evaluations demonstrate that the framework significantly reduces communication and computational overhead compared to state-of-the-art approaches, while achieving superior performance in security guarantees, functional completeness, and practical deployability.

Technology Category

Application Category

📝 Abstract
Federated Learning (FL) allows users to collaboratively train a global machine learning model by sharing local model only, without exposing their private data to a central server. This distributed learning is particularly appealing in scenarios where data privacy is crucial, and it has garnered substantial attention from both industry and academia. However, studies have revealed privacy vulnerabilities in FL, where adversaries can potentially infer sensitive information from the shared model parameters. In this paper, we present an efficient masking-based secure aggregation scheme utilizing lightweight cryptographic primitives to mitigate privacy risks. Our scheme offers several advantages over existing methods. First, it requires only a single setup phase for the entire FL training session, significantly reducing communication overhead. Second, it minimizes user-side overhead by eliminating the need for user-to-user interactions, utilizing an intermediate server layer and a lightweight key negotiation method. Third, the scheme is highly resilient to user dropouts, and the users can join at any FL round. Fourth, it can detect and defend against malicious server activities, including recently discovered model inconsistency attacks. Finally, our scheme ensures security in both semi-honest and malicious settings. We provide security analysis to formally prove the robustness of our approach. Furthermore, we implemented an end-to-end prototype of our scheme. We conducted comprehensive experiments and comparisons, which show that it outperforms existing solutions in terms of communication and computation overhead, functionality, and security.
Problem

Research questions and friction points this paper is trying to address.

Mitigate privacy risks in Federated Learning
Detect and defend against model inconsistency attacks
Reduce communication and computation overhead
Innovation

Methods, ideas, or system contributions that make the work stand out.

Lightweight cryptographic primitives for secure aggregation
Single setup phase reducing communication overhead
Detects and defends against model inconsistency attacks
🔎 Similar Papers
No similar papers found.
N
Nazatul H. Sultan
CSIRO’s Data61, Australia
Y
Yan Bo
CSIRO’s Data61, Australia
Y
Yansong Gao
CSIRO’s Data61, Australia
S
S. Çamtepe
CSIRO’s Data61, Australia
Arash Mahboubi
Arash Mahboubi
Charles Sturt University
CybersecurityRansomwareMalware and attack analysisSpread modellingThreat Hunting
H
Hang Thanh Bui
CSU, Australia
A
Aufeef Chauhan
The University of Adelaide, Australia
H
Hamed Aboutorab
CSU, Australia
Michael Bewong
Michael Bewong
Senior Lecturer, Charles Sturt University
Data ScienceApplied Machine LearningCyber Security
Praveen Gauravaram
Praveen Gauravaram
Principal Scientist, Tata Consultancy Services; Adjunct Professor (Deakin and SCU)/ A. Prof(UNSW))
CryptologyInformation SecurityCyber Physical Systems and Intelligent Infrastructures
R
Rafiqul Islam
CSU, Australia
S
Sharif Abuadbba
CSIRO’s Data61, Australia