Essays about: "Distributed Security Scheme"

Showing result 1 - 5 of 10 essays containing the words Distributed Security Scheme.

  1. 1. Confidential Federated Learning with Homomorphic Encryption

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Zekun Wang; [2023]
    Keywords : Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE

  2. 2. A Game-theoretical Framework for Byzantine-Robust Federated Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Wanyun Xie; [2022]
    Keywords : Game theory; distributed robust learning; training-time attacks; exploration-exploitation tradeoff; Spelteori; distribuerad robust inlärning; attacker på träningstiden; kompromiss mellan utforskning och exploatering;

    Abstract : The distributed nature of Federated Learning (FL) creates security-related vulnerabilities including training-time attacks. Recently, it has been shown that well-known Byzantine-resilient aggregation schemes are indeed vulnerable to an informed adversary who has access to the aggregation scheme and updates sent by clients. READ MORE

  3. 3. Hardened Model Aggregation for Federated Learning backed by Distributed Trust Towards decentralizing Federated Learning using a Blockchain

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Morsbach Felix Johannes; [2020]
    Keywords : ;

    Abstract : Federated learning enables the training of machine learning models on isolated data islands but also introduces new security challenges. Besides training-data-poisoning and model-update-poisoning, centralized federated learning systems are subject to a third type of poisoning attack: model-aggregation-poisoning. READ MORE

  4. 4. Consistent authentication in disitrbuted networks

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Niklas Lindskog; [2016]
    Keywords : Authentication; Distributed Hash Table; Kademlia; Distributed Networking; Network Security; Calvin; Cryptography; Technology and Engineering;

    Abstract : In a time where peer-to-peer networks, often with previously unconnected devices, are increasing in relevance, new storage solutions are needed. Storage can no longer rely on a single central entity but rather needs to depend on the resources of the entire network. READ MORE

  5. 5. Securing Safebook : Secure Data Access Control and Key Management for Safebook

    University essay from KTH/Radio Systems Laboratory (RS Lab)

    Author : Waqas Liaqat Ali; [2013]
    Keywords : User Privacy; Access Control; Distributed Social Networks; Key Management; Användarnas Privatliv; Atkomstkontroll; Distribuerade Sociala Nätverk; Nyckelhantering;

    Abstract : Online social networks have become a fast and efficient way of sharing information and experiences. Over the past few years the trend of using social networks has drastically increased with an enormous amount of users’ private contents injected into the providers’ data centers. READ MORE