{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:25:29Z","timestamp":1774542329037,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T00:00:00Z","timestamp":1710720000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T00:00:00Z","timestamp":1710720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100012547","name":"Natural Science Foundation of Guangxi Zhuang Autonomous Region","doi-asserted-by":"publisher","award":["2023GXNSFAA026236,"],"award-info":[{"award-number":["2023GXNSFAA026236,"]}],"id":[{"id":"10.13039\/100012547","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012659","name":"Foundation for Innovative Research Groups of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962012"],"award-info":[{"award-number":["61962012"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFB1006003"],"award-info":[{"award-number":["2020YFB1006003"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Traditional machine learning requires collecting data from participants for training, which may lead to malicious acquisition of privacy in participants\u2019 data. Federated learning provides a method to protect participants\u2019 data privacy by transferring the training process from a centralized server to terminal devices. However, the server may still obtain participants\u2019 privacy through inference attacks and other methods. In addition, the data provided by participants varies in quality, and the excessive involvement of low-quality data in the training process can render the model unusable, which is an important issue in current mainstream federated learning. To address the aforementioned issues, this paper proposes a Privacy Preserving Federated Learning Scheme with Partial Low-Quality Data (PPFL-LQDP). It can achieve good training results while allowing participants to utilize partial low-quality data, thereby enhancing the privacy and security of the federated learning scheme. Specifically, we use a distributed Paillier cryptographic mechanism to protect the privacy and security of participants\u2019 data during the Federated training process. Additionally, we construct composite evaluation values for the data held by participants to reduce the involvement of low-quality data, thereby minimizing the negative impact of such data on the model. Through experiments on the MNIST dataset, we demonstrate that this scheme can complete the model training of federated learning with the participation of partial low-quality data, while effectively protecting the security and privacy of participants\u2019 data. Comparisons with related schemes also show that our scheme has good overall performance.<\/jats:p>","DOI":"10.1186\/s13677-024-00618-8","type":"journal-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T09:02:09Z","timestamp":1710752529000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Privacy-preserving federated learning based on partial low-quality data"],"prefix":"10.1186","volume":"13","author":[{"given":"Huiyong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Shijie","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,18]]},"reference":[{"issue":"6245","key":"618_CR1","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1126\/science.aaa8415","volume":"349","author":"MI Jordan","year":"2015","unstructured":"Jordan MI, Mitchell TM (2015) Machine learning: Trends, perspectives, and prospects. Science 349(6245):255\u2013260","journal-title":"Science"},{"issue":"7706","key":"618_CR2","doi-asserted-by":"publisher","first-page":"S55","DOI":"10.1038\/d41586-018-05267-x","volume":"557","author":"N Fleming","year":"2018","unstructured":"Fleming N (2018) How artificial intelligence is changing drug discovery. Nature 557(7706):S55\u2013S55","journal-title":"Nature"},{"issue":"4","key":"618_CR3","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/s11704-016-6906-3","volume":"10","author":"ZH Zhou","year":"2016","unstructured":"Zhou ZH (2016) Learnware: on the future of machine learning. Front Comput Sci 10(4):589\u2013590","journal-title":"Front Comput Sci"},{"issue":"2","key":"618_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3436755","volume":"54","author":"B Liu","year":"2021","unstructured":"Liu B, Ding M, Shaham S, Rahayu W, Farokhi F, Lin Z (2021) When machine learning meets privacy: A survey and outlook. ACM Comput Surv (CSUR) 54(2):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"4","key":"618_CR5","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MSEC.2021.3076443","volume":"19","author":"E De Cristofaro","year":"2021","unstructured":"De Cristofaro E (2021) A critical overview of privacy in machine learning. IEEE Secur Priv 19(4):19\u201327","journal-title":"IEEE Secur Priv"},{"key":"618_CR6","unstructured":"McMahan HB, Moore E, Ramage D, y Arcas BA (2016) Federated learning of deep networks using model averaging. arXiv preprint arXiv:1602.05629"},{"key":"618_CR7","unstructured":"McMahan B, Moore E, Ramage D, Hampson S, y Arcas BA (2017) Communication-efficient learning of deep networks from decentralized data. In: Proceedings of the 20th International Conference on Artificial Intelligence and Statistics. Proceedings of Machine Learning Research, pp 1273\u20131282"},{"issue":"5","key":"618_CR8","first-page":"1333","volume":"13","author":"Y Aono","year":"2017","unstructured":"Aono Y, Hayashi T, Wang L, Moriai S (2017) Privacy-preserving deep learning via additively homomorphic encryption. IEEE Trans Inf Forensic Secur 13(5):1333\u20131345","journal-title":"IEEE Trans Inf Forensic Secur"},{"key":"618_CR9","doi-asserted-by":"publisher","unstructured":"Hitaj B, Ateniese G, Perez-Cruz F (2017) Deep models under the GAN: Information leakage from collaborative deep learning. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Dallas, 30 October-3 November 2017. https:\/\/doi.org\/10.1145\/3133956.3134012. pp 603\u2013618","DOI":"10.1145\/3133956.3134012"},{"key":"618_CR10","doi-asserted-by":"crossref","unstructured":"Richardson A, Filos-Ratsikas A, Faltings B (2020) Budget-bounded incentives for federated learning. Federated Learn Priv Incent vol.12500:176\u2013188","DOI":"10.1007\/978-3-030-63076-8_13"},{"issue":"8","key":"618_CR11","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1038\/s42256-022-00516-1","volume":"4","author":"W Liang","year":"2022","unstructured":"Liang W, Tadesse GA, Ho D, Fei-Fei L, Zaharia M, Zhang C, Zou J (2022) Advances, challenges and opportunities in creating data for trustworthy AI. Nat Mach Intell 4(8):669\u2013677","journal-title":"Nat Mach Intell"},{"key":"618_CR12","doi-asserted-by":"crossref","unstructured":"Fouque P A, Poupard G, Stern J (2000) Sharing decryption in the context of voting or lotteries. In: Financial Cryptography: 4th International Conference, Anguilla, British West Indies, 20-24 February 2000. pp 90\u2013104","DOI":"10.1007\/3-540-45472-1_7"},{"key":"618_CR13","doi-asserted-by":"publisher","first-page":"3454","DOI":"10.1109\/TIFS.2020.2988575","volume":"15","author":"K Wei","year":"2020","unstructured":"Wei K, Li J, Ding M, Ma C, Yang HH, Farokhi F, Poor HV (2020) federated learning with differential privacy: Algorithms and performance analysis. IEEE Trans Inf Forensic Secur 15:3454\u20133469","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"3","key":"618_CR14","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MCI.2022.3180883","volume":"17","author":"A Falcetta","year":"2022","unstructured":"Falcetta A, Roveri M (2022) Privacy-preserving deep learning with homomorphic encryption: An introduction. IEEE Comput Intell Mag 17(3):14\u201325","journal-title":"IEEE Comput Intell Mag"},{"issue":"4","key":"618_CR15","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1109\/MNET.001.1900506","volume":"34","author":"C Ma","year":"2020","unstructured":"Ma C, Li J, Ding M, Yang HH, Shu F, Quek TQ, Poor HV (2020) On safeguarding privacy and security in the framework of federated learning. IEEE Netw 34(4):242\u2013248","journal-title":"IEEE Netw"},{"issue":"4","key":"618_CR16","doi-asserted-by":"publisher","first-page":"94","DOI":"10.3390\/fi13040094","volume":"13","author":"H Fang","year":"2021","unstructured":"Fang H, Qian Q (2021) Privacy Preserving Machine Learning with Homomorphic Encryption and Federated Learning. Future Internet 13(4):94","journal-title":"Future Internet"},{"issue":"2","key":"618_CR17","doi-asserted-by":"publisher","first-page":"734","DOI":"10.3390\/app12020734","volume":"12","author":"J Park","year":"2022","unstructured":"Park J, Lim H (2022) Privacy-preserving federated learning using homomorphic encryption. Appl Sci 12(2):734","journal-title":"Appl Sci"},{"key":"618_CR18","doi-asserted-by":"publisher","first-page":"1486","DOI":"10.1109\/TIFS.2019.2939713","volume":"15","author":"L Zhao","year":"2019","unstructured":"Zhao L, Wang Q, Zou Q, Zhang Y, Chen Y (2019) Privacy-preserving collaborative deep learning with unreliable participants. IEEE Trans Inf Forensic Secur 15:1486\u20131500","journal-title":"IEEE Trans Inf Forensic Secur"},{"issue":"4","key":"618_CR19","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MIS.2020.2987774","volume":"35","author":"H Yu","year":"2020","unstructured":"Yu H, Liu Z, Liu Y, Chen T, Yang Q (2020) A Sustainable Incentive Scheme for Federated Learning. IEEE Intell Syst 35(4):58\u201369","journal-title":"IEEE Intell Syst"},{"issue":"2","key":"618_CR20","first-page":"1364","volume":"19","author":"G Xu","year":"2020","unstructured":"Xu G, Li H, Zhang Y, Xu S, Ning J, Deng RH (2020) Privacy-preserving Federated deep learning with irregular users. IEEE Trans Dependable Secure Comput 19(2):1364\u20131381","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"13","key":"618_CR21","doi-asserted-by":"publisher","first-page":"11590","DOI":"10.1109\/JIOT.2021.3130115","volume":"9","author":"Y Li","year":"2021","unstructured":"Li Y, Li H, Xu G, Huang X, Lu R (2021) Efficient privacy-preserving federated learning with unreliable users. IEEE Internet Things J 9(13):11590\u201311603","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"618_CR22","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/COMST.2021.3075439","volume":"23","author":"DC Nguyen","year":"2021","unstructured":"Nguyen DC, Ding M, Pathirana PN, Seneviratne A, Li J, Poor HV (2021) federated learning for internet of things: A comprehensive survey. IEEE Commun Surv Tutorials 23(3):1622\u20131658","journal-title":"IEEE Commun Surv Tutorials"},{"key":"618_CR23","doi-asserted-by":"crossref","unstructured":"Danner G, Jelasity M (2015) Fully distributed privacy preserving mini-batch gradient descent learning. In: Distributed Applications and Interoperable Systems: 15th IFIP WG 6.1 International Conference, Grenoble, France, 2-4 June 2015, Springer, Cham. pp 30\u201344","DOI":"10.1007\/978-3-319-19129-4_3"},{"key":"618_CR24","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd I, Jurik M (2001) A generalisation, a simplification and some applications of Paillier\u2019s probabilistic public-key system. In: Public Key Cryptography: 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001 Cheju Island, Korea, 13-15 February 2001 Proceedings 4. Springer Berlin Heidelberg. pp 119\u2013136","DOI":"10.1007\/3-540-44586-2_9"},{"issue":"4","key":"618_CR25","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/TDSC.2013.6","volume":"10","author":"JM Bohli","year":"2014","unstructured":"Bohli JM, Gruschka N, Jensen M, Iacono LL, Marnau N (2014) Security and privacy-enhancing multicloud architectures. IEEE Trans Dependable Secure Comput 10(4):212\u2013224","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"618_CR26","doi-asserted-by":"publisher","unstructured":"Xu G, Li H, Lu R (2018) Practical and privacy-aware truth discovery in mobile crowd sensing systems. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. https:\/\/doi.org\/10.1145\/3243734.3278529. pp 2312\u20132314","DOI":"10.1145\/3243734.3278529"},{"key":"618_CR27","doi-asserted-by":"publisher","unstructured":"Choi I, Song Q, Sun K (2019) Federated-cloud based deep neural networks with privacy preserving image filtering techniques. In: IEEE Conference on Dependable and Secure Computing (DSC), Hangzhou, China, November 2019. https:\/\/doi.org\/10.1109\/DSC47296.2019.8937635. pp 1\u20138","DOI":"10.1109\/DSC47296.2019.8937635"},{"issue":"5\u20136","key":"618_CR28","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1080\/14783363.2017.1332954","volume":"30","author":"R Vaziri","year":"2019","unstructured":"Vaziri R, Mohsenzadeh M, Habibi J (2019) Measuring data quality with weighted metrics. Total Qual Manag Bus Excell 30(5\u20136):708\u2013720","journal-title":"Total Qual Manag Bus Excell"},{"key":"618_CR29","doi-asserted-by":"publisher","unstructured":"D\u00edaz C, Calderon-Ramirez S, Aguilar LDM (2022) Data Quality Metrics for Unlabelled Datasets. In: IEEE 4th International Conference on BioInspired Processing (BIP), Cartago, Costa Rica, November 2022. https:\/\/doi.org\/10.1109\/BIP56202.2022.10032475. pp 1\u20137","DOI":"10.1109\/BIP56202.2022.10032475"},{"key":"618_CR30","doi-asserted-by":"crossref","unstructured":"Luping W, Wei W, Bo L C (2019)CMEL: Mitigating Communication Overhead for Federated Learning. In: 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Dallas, TX, USA. https:\/\/doi.org\/10.1109\/ICDCS.2019.00099. pp 954\u2013964","DOI":"10.1109\/ICDCS.2019.00099"},{"key":"618_CR31","first-page":"4424","volume":"30","author":"V Smith","year":"2017","unstructured":"Smith V, Chiang CK, Sanjabi M, Talwalkar AS (2017) Federated multi-task learning. Adv Neural Inf Process Syst 30:4424\u20134434","journal-title":"Adv Neural Inf Process Syst"},{"key":"618_CR32","doi-asserted-by":"publisher","unstructured":"Bonawitz K, Ivanov V, Kreuter B, Marcedone A, McMahan HB, Patel S, Seth K (2017) Practical secure aggregation for privacy-preserving machine learning. In: proceedings of the ACM SIGSAC Conference on Computer and Communications Security, New York, USA, October 2017. https:\/\/doi.org\/10.1145\/3133956.3133982. pp 1175\u20131191","DOI":"10.1145\/3133956.3133982"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00618-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-024-00618-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-024-00618-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T09:03:39Z","timestamp":1710752619000},"score":1,"resource":{"primary":{"URL":"https:\/\/journalofcloudcomputing.springeropen.com\/articles\/10.1186\/s13677-024-00618-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,18]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["618"],"URL":"https:\/\/doi.org\/10.1186\/s13677-024-00618-8","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3417554\/v1","asserted-by":"object"}]},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,18]]},"assertion":[{"value":"7 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This declaration is not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"62"}}