Essays about: "Distributed Security Scheme"
Showing result 1 - 5 of 10 essays containing the words Distributed Security Scheme.
-
1. Confidential Federated Learning with Homomorphic Encryption
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. READ MORE
-
2. A Game-theoretical Framework for Byzantine-Robust Federated Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The distributed nature of Federated Learning (FL) creates security-related vulnerabilities including training-time attacks. Recently, it has been shown that well-known Byzantine-resilient aggregation schemes are indeed vulnerable to an informed adversary who has access to the aggregation scheme and updates sent by clients. READ MORE
-
3. Hardened Model Aggregation for Federated Learning backed by Distributed Trust Towards decentralizing Federated Learning using a Blockchain
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Federated learning enables the training of machine learning models on isolated data islands but also introduces new security challenges. Besides training-data-poisoning and model-update-poisoning, centralized federated learning systems are subject to a third type of poisoning attack: model-aggregation-poisoning. READ MORE
-
4. Consistent authentication in disitrbuted networks
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In a time where peer-to-peer networks, often with previously unconnected devices, are increasing in relevance, new storage solutions are needed. Storage can no longer rely on a single central entity but rather needs to depend on the resources of the entire network. READ MORE
-
5. Securing Safebook : Secure Data Access Control and Key Management for Safebook
University essay from KTH/Radio Systems Laboratory (RS Lab)Abstract : Online social networks have become a fast and efficient way of sharing information and experiences. Over the past few years the trend of using social networks has drastically increased with an enormous amount of users’ private contents injected into the providers’ data centers. READ MORE