{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:58:41Z","timestamp":1774367921459,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T00:00:00Z","timestamp":1690761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100013296","name":"EIT Digital","doi-asserted-by":"publisher","award":["2021-1.2.1-EIT-KIC"],"award-info":[{"award-number":["2021-1.2.1-EIT-KIC"]}],"id":[{"id":"10.13039\/100013296","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005156","name":"Alexander von Humboldt-Stiftung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005156","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Federated learning (FL) draws attention in academia and industry due to its privacy-preserving capability in training machine learning models. However, there are still some critical security attacks and vulnerabilities, including gradients leakage and interference attacks. Meanwhile, communication is another bottleneck in basic FL schemes since large-scale FL parameter transmission leads to inefficient communication, latency, and slower learning processes. To overcome these shortcomings, different communication efficiency strategies and privacy-preserving cryptographic techniques have been proposed. However, a single method can only partially resist privacy attacks. This paper presents a practical, privacy-preserving scheme combining cryptographic techniques and communication networking solutions. We implement Kafka for message distribution, the Diffie\u2013Hellman scheme for secure server aggregation, and gradient differential privacy for interference attack prevention. The proposed approach maintains training efficiency while being able to addressing gradients leakage problems and interference attacks. Meanwhile, the implementation of Kafka and Zookeeper provides asynchronous communication and anonymous authenticated computation with role-based access controls. Finally, we prove the privacy-preserving properties of the proposed solution via security analysis and empirically demonstrate its efficiency and practicality.<\/jats:p>","DOI":"10.1007\/s40747-023-01184-3","type":"journal-article","created":{"date-parts":[[2023,7,31]],"date-time":"2023-07-31T09:01:56Z","timestamp":1690794116000},"page":"677-690","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Fedlabx: a practical and privacy-preserving framework for federated learning"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9966-8286","authenticated-orcid":false,"given":"Yuping","family":"Yan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1619-2927","authenticated-orcid":false,"given":"Mohammed B.","family":"Alshawki","sequence":"additional","affiliation":[]},{"given":"Marcell","family":"Zoltay","sequence":"additional","affiliation":[]},{"given":"Marcell","family":"G\u00e1l","sequence":"additional","affiliation":[]},{"given":"Roland","family":"Holl\u00f3s","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1100-0631","authenticated-orcid":false,"given":"Yaochu","family":"Jin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3998-0515","authenticated-orcid":false,"given":"Ligeti","family":"P\u00e9ter","sequence":"additional","affiliation":[]},{"given":"\u00c1kos","family":"T\u00e9nyi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,31]]},"reference":[{"key":"1184_CR1","unstructured":"Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, Devin M, Ghemawat S, Irving G, Isard M, et\u00a0al (2016) $$\\{$$TensorFlow$$\\}$$: a system for $$\\{$$Large-Scale$$\\}$$ machine learning. In: 12th USENIX symposium on operating systems design and implementation (OSDI 16). pp. 265\u2013283"},{"key":"1184_CR2","doi-asserted-by":"crossref","unstructured":"Abadi M, Chu A, Goodfellow I, McMahan HB, Mironov I, Talwar K, Zhang L (2016) Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, pp 308\u2013318","DOI":"10.1145\/2976749.2978318"},{"key":"1184_CR3","doi-asserted-by":"crossref","unstructured":"Alshawki MB, George LE (2016) Secure model for SMS exchange over GSM. Int J Comput Netw Inf Secur 8(1):1","DOI":"10.5815\/ijcnis.2016.01.01"},{"key":"1184_CR4","doi-asserted-by":"crossref","unstructured":"Alshawki MB, Yan Y, Ligeti P, Reich C (2022) Attribute verifier in internet of things. In: 2022 32nd international telecommunication networks and applications conference (ITNAC). IEEE, pp\u00a01\u20133","DOI":"10.1109\/ITNAC55475.2022.9998348"},{"key":"1184_CR5","doi-asserted-by":"crossref","unstructured":"Alshawki MB, Ligeti P, Reich C (2022) Odabe: outsourced decentralized cp-abe in internet of things. In: Applied cryptography and network security workshops: ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S &P, SCI, SecMT, SiMLA, Rome, Italy, June 20\u201323, 2022, Proceedings. Springer, pp 611\u2013615","DOI":"10.1007\/978-3-031-16815-4_35"},{"key":"1184_CR6","doi-asserted-by":"crossref","unstructured":"Alshawki MB, Ligeti P, Reich C (2022) Sdabe: efficient encryption in decentralized cp-abe using secret sharing. In: 2022 International conference on electrical, computer and energy technologies (ICECET). IEEE, pp\u00a01\u20136","DOI":"10.1109\/ICECET55527.2022.9872711"},{"key":"1184_CR7","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1056\/NEJMlim035027","volume":"348","author":"GJ Annas","year":"2003","unstructured":"Annas GJ (2003) Hipaa regulations: a new era of medical-record privacy? N Engl J Med 348:1486","journal-title":"N Engl J Med"},{"issue":"7","key":"1184_CR8","doi-asserted-by":"publisher","first-page":"5827","DOI":"10.1109\/JIOT.2019.2952146","volume":"7","author":"PCM Arachchige","year":"2019","unstructured":"Arachchige PCM, Bertok P, Khalil I, Liu D, Camtepe S, Atiquzzaman M (2019) Local differential privacy for deep learning. IEEE Internet Things J 7(7):5827\u20135842","journal-title":"IEEE Internet Things J"},{"key":"1184_CR9","unstructured":"Beutel DJ, Topal T, Mathur A, Qiu X, Parcollet T, de\u00a0Gusm\u00e3o PP, Lane ND (2020) Flower: a friendly federated learning research framework. arXiv preprint arXiv:2007.14390"},{"key":"1184_CR10","doi-asserted-by":"crossref","unstructured":"Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Ramage D, Segal A, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: proceedings of the 2017 ACM SIGSAC conference on computer and communications security. pp 1175\u20131191","DOI":"10.1145\/3133956.3133982"},{"key":"1184_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40657-7","volume-title":"Introduction to public key infrastructures","author":"J Buchmann","year":"2013","unstructured":"Buchmann J, Karatsiolis E, Wiesmaier A, Karatsiolis E (2013) Introduction to public key infrastructures, vol 36. Springer, Berlin"},{"key":"1184_CR12","doi-asserted-by":"crossref","unstructured":"Chen J, Wang WH, Shi X (2020) Differential privacy protection against membership inference attack on machine learning for genomic data. In: BIOCOMPUTING 2021: proceedings of the pacific symposium. World Scientific, pp 26\u201337","DOI":"10.1142\/9789811232701_0003"},{"issue":"6","key":"1184_CR13","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644\u2013654","journal-title":"IEEE Trans Inf Theory"},{"key":"1184_CR14","doi-asserted-by":"crossref","unstructured":"Dwork C (2008) Differential privacy: a survey of results. In: International conference on theory and applications of models of computation. Springer, pp 1\u201319","DOI":"10.1007\/978-3-540-79228-4_1"},{"key":"1184_CR15","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/11681878_14","volume-title":"Theory of cryptography","author":"C Dwork","year":"2006","unstructured":"Dwork C, McSherry F, Nissim K, Smith A (2006) Calibrating noise to sensitivity in private data analysis. In: Halevi S, Rabin T (eds) Theory of cryptography. Springer, Berlin, pp 265\u2013284"},{"key":"1184_CR16","doi-asserted-by":"crossref","unstructured":"Dwork C, Roth A et\u00a0al (2014) The algorithmic foundations of differential privacy. Foundations and Trends\u00ae. Theor Comput Sci 9(3\u2014-4):211\u2013407","DOI":"10.1561\/0400000042"},{"key":"1184_CR17","doi-asserted-by":"crossref","unstructured":"Elkordy AR, Zhang J, Ezzeldin YH, Psounis K, Avestimehr S (2022) How much privacy does federated learning with secure aggregation guarantee? arXiv preprint arXiv:2208.02304","DOI":"10.56553\/popets-2023-0030"},{"issue":"5","key":"1184_CR18","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1109\/TDSC.2015.2484326","volume":"14","author":"S Goryczka","year":"2015","unstructured":"Goryczka S, Xiong L (2015) A comprehensive comparison of multiparty secure additions with differential privacy. IEEE Trans Dependable Secur Comput 14(5):463\u2013477","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"1184_CR19","unstructured":"He C, Li S, So J, Zeng X, Zhang M, Wang H, Wang X, Vepakomma P, Singh A, Qiu H et\u00a0al (2020) Fedml: a research library and benchmark for federated machine learning. arXiv preprint arXiv:2007.13518"},{"key":"1184_CR20","first-page":"994","volume":"34","author":"X Jin","year":"2021","unstructured":"Jin X, Chen PY, Hsu CY, Yu CM, Chen T (2021) Cafe: catastrophic data leakage in vertical federated learning. Adv Neural Inf Process Syst 34:994\u20131006","journal-title":"Adv Neural Inf Process Syst"},{"key":"1184_CR21","doi-asserted-by":"crossref","unstructured":"Kerkouche R (2021) Differentially private federated learning for bandwidth and energy constrained environments. Ph.D. thesis, Universit\u00e9 Grenoble Alpes [2020-....]","DOI":"10.1109\/EuroSP51992.2021.00029"},{"key":"1184_CR22","unstructured":"Kreps J, Narkhede N, Rao J et al (2011) Kafka: a distributed messaging system for log processing. In: Proceedings of the NetDB. Athens, Greece vol.\u00a011. pp\u00a01\u20137"},{"key":"1184_CR23","volume-title":"Learning multiple layers of features from tiny images","author":"A Krizhevsky","year":"2009","unstructured":"Krizhevsky A, Hinton G et al (2009) Learning multiple layers of features from tiny images. ON, Canada, Toronto"},{"key":"1184_CR24","doi-asserted-by":"crossref","unstructured":"Lacharit\u00e9 MS, Minaud B, Paterson KG (2018) Improved reconstruction attacks on encrypted data using range query leakage. In: 2018 IEEE symposium on security and privacy (SP). IEEE, pp 297\u2013314","DOI":"10.1109\/SP.2018.00002"},{"issue":"11","key":"1184_CR25","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun Y, Bottou L, Bengio Y, Haffner P (1998) Gradient-based learning applied to document recognition. Proc IEEE 86(11):2278\u20132324","journal-title":"Proc IEEE"},{"key":"1184_CR26","unstructured":"McMahan HB, Moore E, Ramage D, Arcas BA (2016) Federated learning of deep networks using model averaging. arXiv preprint arXiv:1602.056292"},{"key":"1184_CR27","doi-asserted-by":"crossref","unstructured":"Rahimian S, Orekondy T, Fritz M (2021) Differential privacy defenses and sampling attacks for membership inference. In: Proceedings of the 14th ACM workshop on artificial intelligence and security. pp 193\u2013202","DOI":"10.1145\/3474369.3486876"},{"issue":"1","key":"1184_CR28","first-page":"61","volume":"11","author":"MA Rahman","year":"2018","unstructured":"Rahman MA, Rahman T, Lagani\u00e8re R, Mohammed N, Wang Y (2018) Membership inference attack against differentially private deep learning model. Trans Data Priv 11(1):61\u201379","journal-title":"Trans Data Priv"},{"key":"1184_CR29","doi-asserted-by":"crossref","unstructured":"Segal A, Marcedone A, Kreuter B, Ramage D, McMahan HB, Seth K, Bonawitz K, Patel S, Ivanov V (2017) Practical secure aggregation for privacy-preserving machine learning. In: proceedings of the 2017 ACM SIGSAC conference on computer and communications security. pp 1175\u20131191","DOI":"10.1145\/3133956.3133982"},{"issue":"11","key":"1184_CR30","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"key":"1184_CR31","doi-asserted-by":"crossref","unstructured":"Shokri R, Stronati M, Song C, Shmatikov V (2017) Membership inference attacks against machine learning models. In: 2017 IEEE symposium on security and privacy (SP). IEEE, pp 3\u201318","DOI":"10.1109\/SP.2017.41"},{"key":"1184_CR32","doi-asserted-by":"crossref","unstructured":"Sun L, Qian J, Chen X (2020) Ldp-fl: practical private aggregation in federated learning with local differential privacy. arXiv preprint arXiv:2007.15789","DOI":"10.24963\/ijcai.2021\/217"},{"key":"1184_CR33","doi-asserted-by":"crossref","unstructured":"Truex S, Liu L, Gursoy ME, Wei W, Yu L (2019) Effects of differential privacy and data skewness on membership inference vulnerability. In: 2019 First IEEE international conference on trust, privacy and security in intelligent systems and applications (TPS-ISA). IEEE, pp 82\u201391","DOI":"10.1109\/TPS-ISA48467.2019.00019"},{"key":"1184_CR34","doi-asserted-by":"crossref","unstructured":"Voigt P, Von dem Bussche A (2017) The eu general data protection regulation (gdpr). A practical guide, vol 10(3152676), 1st edn. Springer International Publishing, Cham, pp 10\u20135555","DOI":"10.1007\/978-3-319-57959-7_1"},{"key":"1184_CR35","unstructured":"Wang J, Liu Q, Liang H, Joshi G, Poor HV (2020) Tackling the objective inconsistency problem in heterogeneous federated optimization. Adv Neural Inf Process Syst 33:7611\u20137623"},{"key":"1184_CR36","doi-asserted-by":"crossref","unstructured":"Wang Z, Song M, Zhang Z, Song Y, Wang Q, Qi H (2019) Beyond inferring class representatives: User-level privacy leakage from federated learning. In: IEEE INFOCOM 2019-IEEE conference on computer communications. IEEE, pp 2512\u20132520","DOI":"10.1109\/INFOCOM.2019.8737416"},{"key":"1184_CR37","unstructured":"Yang CS, So J, He C, Li S, Yu Q, Avestimehr S (2021) Lightsecagg: Rethinking secure aggregation in federated learning. arXiv preprint arXiv:2109.14236"},{"issue":"2","key":"1184_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. ACM Trans Intell Syst Technol (TIST) 10(2):1\u201319","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"key":"1184_CR39","unstructured":"Yang Y, Hui B, Yuan H, Gong N, Cao Y Privatefl: accurate, differentially private federated learning via personalized data transformation (2013) PrivateFL: accurate, differentially private federated learning via personalized data transformation"},{"key":"1184_CR40","doi-asserted-by":"crossref","unstructured":"Yu L, Liu L, Pu C, Gursoy ME, Truex S (2019) Differentially private model publishing for deep learning. In: 2019 IEEE symposium on security and privacy (SP). IEEE, pp 332\u2013349","DOI":"10.1109\/SP.2019.00019"},{"key":"1184_CR41","unstructured":"Zhao B, Mopuri KR, Bilen H (2020) idlg: improved deep leakage from gradients. arXiv preprint arXiv:2001.02610"},{"key":"1184_CR42","unstructured":"Zhu L, Liu Z, Han S (2019) Deep leakage from gradients. arxiv:1906.08935"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01184-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-023-01184-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-023-01184-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T11:47:43Z","timestamp":1742212063000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-023-01184-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,31]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1184"],"URL":"https:\/\/doi.org\/10.1007\/s40747-023-01184-3","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,31]]},"assertion":[{"value":"8 January 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}