SlideShare a Scribd company logo
1 of 21
Download to read offline
Anonymous and
efficient
authentication scheme
for privacy-preserving
distributed learning
Mini Project
Subhajit Ghosh (2102041)
Indian Institute of Information Technology Guwahati
Objective
• To provide an overview of the anonymous and efficient authentication scheme for
privacy-preserving distributed learning.
• This proposed work has helped to alleviate some of the drawbacks of
privacy-preserving in distributed learning or has innovated new technologies for
various applications.
• I attempted to identify the paper’s problems while also comprehending the
methodology (that is, the working model and algorithms).
Introduction
• A tremendous amount of data has been generated and transmitted to cloud servers
due to the integration of machine learning (ML) and cloud computing, which has
been developed rapidly in the past decade.
To resolve this issue, the concept of distributed learning (DL) is used.
• In this, the participating devices first train the ML model locally with the raw data,
and once computed, it sends the model parameters to the cloud. The cloud then
aggregates into a global ML model.
• To tackle this challenge of privacy violations , deploying encryption techniques or
differential privacy (DP) are two primary approaches.
• Encryption techniques, such as homomorphic encryption and secure multiparty
computation, are employed to design secure data exchange and aggregation
protocols.
Encryption techniques is not generalised for all ML algorithms in DL.
• Differential privacy (DP) is deployed to obfuscate information by introducing random
noise to the raw data or model parameters. DP-based schemes are generalised for all
ML algorithms in DL.
The randomness reduces data utility, bringing undesired accuracy degradation to ML
models.
Model convergence with longer latency.
The proposed scheme is based on the fact that if the participants in the DL system are
anonymous, then although the raw data is recovered, the adversary cannot link the data
to the corresponding participant’s real identity, thereby achieving privacy preservation.
• In this scheme, it deploys anonymous authentication.
• The new generalised certificateless signature scheme PCLS, which is built on
pairing-based cryptography, The designed signature scheme has an anonymous and
efficient authentication protocol that supports batch verification (AAPBV).
Problem statement
• The major problems addressed in this paper are:
Adversary is able to derive the raw data (user identity) by analysing the obtained
machine learning models.
Significantly reduces the time consumption in batch verification, achieving high
computational efficiency.
Proposed Methodology
System Overview
• Participants: It refer to individuals that are equipped with intelligent devices, such as
laptops , mobiles.
• Cloud Server: It receives the model parameters from participants and aggregates
into a global ML model.
• Trusted Authority (TA): TA is a powerful system manager that is responsible for
system initialization, participant registrations, key generation, identity management,
and so on.
Proposed Methodology
Model Flow
• Step 1: The cloud server initializes a global model and distributes the model to all
participants.
• Step 2: After receiving the global model, each participant continues to train the
model on its local dataset and obtains the updated model parameters Wn. Wn is
then uploaded to the cloud server.
• Step 3: The cloud server aggregates the model parameters. The global ML model is
corrected with Wg and sent to the participants for next-round training.
• Step 4: Repeat Steps 2, 3 until the global model converges.
Proposed Methodology
Proposed Methodology
Pairing based certificateless signature scheme (PCLS)
It lays down a design basis for the proposed anonymous authentication protocol.
• Instead of setting the signer’s real identity as the partial public key, the hash value of
the signer’s real identity is the partial public key, protecting the real identities from
disclosure.
• Modified the signature generation and message verification to support batch
verification, such that the authentication is more efficient.
Proposed Methodology
Pairing based certificateless signature scheme (PCLS)
It involves following steps:
• Setup
• Key Extract
• Sign
• Verify
Proposed Methodology
Pairing based certificateless signature scheme (PCLS)
Setup
• TA publishes (l, p, P, e, G1, G2, H1, H2, YTA) as the system parameters.
• Private key XTAis kept by TA and remains as a secret.
Key-Extract
• The signer randomly selects X’ as its partial private key and calculates Y’ = X’P as its
partial public key.
• The signer computes Y” = H1(I D) as the other partial public key and sends Y” to TA,
where ID is its true identity.
• Given Y”, TA then sets X” = XTA Y” and sends to the signer through a secure channel.
The signer uses (X’, X”) as its full private key and (Y, Y”) as its full public key.
Proposed Methodology
Pairing based certificateless signature scheme (PCLS)
Sign
k = H2(m || Y′|| Y′′|| YTA, rP)
U = X’ YTA -X”k
The signature is = (k, U) on message m.
Verify
After receiving the message m with signature , the verifier checks
e(Y’ , YTA) = e(U, P)e(Y”, YTA)k
Proposed Methodology
Anonymous authentication protocol AAPBV
The proposed AAPBV involves four stages
• Initialization stage
• Registration stage
• Authentication stage
• Batch verification stage
Proposed Methodology
Result
Protocols Sign Verify
Liu et al. [11] 5Tm Te + 4Tm + Tp
Zhang at al.[12] 9Tm 6Tm
Yang et al. [14] Te+Tm Te + 5Tp
Shen et al. [15] Te + Tm + Tp Te + Tm + 2Tp
Proposed 4Tm Te + 2m + 3p
COMPARISON OF THE COMPUTATIONAL TIME WITHOUT BATCH VERIFICATION
Result
Protocols Sign Verify
Liu et al. [11] 75.875 80.26
Zhang at al. [12] 136.575 91.05
Yang et al. [14] 16.675 91.8
Shen et al. [15] 34.735 52.795
Proposed 60.7 86.03
COMPARISON OF THE COMPUTATIONAL TIME WITHOUT BATCH VERIFICATION
Result
Protocols Time
Yang et al. [14] 5(n+1)Tm+5Tp
Shen et al. [15] nTe + nTm + 2nTp
Proposed nTm + 3Tp
COMPUTATIONAL TIME OF BATCH VERIFICATION
Conclusions
• The proposed protocol achieves efficient batch verification with a slight sacrifice of
computational efficiency in single verification. In addition, benefiting from the
designed DBV algorithm, the global model converges quickly under the proposed
AAPBV protocol, further improving the computational efficiency in DL.
• The proposed protocol guarantees various security properties while supporting
batch verification. The protocol provides high efficiency and enhanced security with
a small sacrifice in computational costs in single authentication, making it more
practical for large-scale DL systems.
Thank you!

More Related Content

Similar to anonymous and efficient authentication scheme for privacy-preserving distributed learning

credit card fraud detection
credit card fraud detectioncredit card fraud detection
credit card fraud detectionjagan477830
 
MOBILE CLOUD COMPUTING USING CRYPTOGRAPHIC HASH FUNCTION
MOBILE CLOUD COMPUTING USING CRYPTOGRAPHIC HASH FUNCTIONMOBILE CLOUD COMPUTING USING CRYPTOGRAPHIC HASH FUNCTION
MOBILE CLOUD COMPUTING USING CRYPTOGRAPHIC HASH FUNCTIONI Ruby
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageIRJET Journal
 
Online e voting
Online e votingOnline e voting
Online e votingMerbinJose
 
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesAnalysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesIRJET Journal
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
 
online-examination-system.pptx
online-examination-system.pptxonline-examination-system.pptx
online-examination-system.pptxNehal1231
 
FlorenceAI: Reinventing Data Science at Humana
FlorenceAI: Reinventing Data Science at HumanaFlorenceAI: Reinventing Data Science at Humana
FlorenceAI: Reinventing Data Science at HumanaDatabricks
 
Automation of document management paul fenton webinar
Automation of document management paul fenton webinarAutomation of document management paul fenton webinar
Automation of document management paul fenton webinarMontrium
 
Implement Test Harness For Streaming Data Pipelines
Implement Test Harness For Streaming Data PipelinesImplement Test Harness For Streaming Data Pipelines
Implement Test Harness For Streaming Data PipelinesKnoldus Inc.
 
New Testing Standards Are on the Horizon: What Will Be Their Impact?
New Testing Standards Are on the Horizon: What Will Be Their Impact?New Testing Standards Are on the Horizon: What Will Be Their Impact?
New Testing Standards Are on the Horizon: What Will Be Their Impact?TechWell
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersIRJET Journal
 
Activity Monitoring Using Wearable Sensors and Smart Phone
Activity Monitoring Using Wearable Sensors and Smart PhoneActivity Monitoring Using Wearable Sensors and Smart Phone
Activity Monitoring Using Wearable Sensors and Smart PhoneDrAhmedZoha
 
ADDO Open Source Observability Tools
ADDO Open Source Observability Tools ADDO Open Source Observability Tools
ADDO Open Source Observability Tools Mickey Boxell
 
Net campus2015 antimomusone
Net campus2015 antimomusoneNet campus2015 antimomusone
Net campus2015 antimomusoneDotNetCampus
 
PREDICT THE FUTURE , MACHINE LEARNING & BIG DATA
PREDICT THE FUTURE , MACHINE LEARNING & BIG DATAPREDICT THE FUTURE , MACHINE LEARNING & BIG DATA
PREDICT THE FUTURE , MACHINE LEARNING & BIG DATADotNetCampus
 
Production Monitoring Platform
Production Monitoring PlatformProduction Monitoring Platform
Production Monitoring PlatformAriel Smoliar
 
Сервис, ты как? Практики и подходы к мониторингу ИТ-сервисов системами инфрас...
Сервис, ты как? Практики и подходы к мониторингу ИТ-сервисов системами инфрас...Сервис, ты как? Практики и подходы к мониторингу ИТ-сервисов системами инфрас...
Сервис, ты как? Практики и подходы к мониторингу ИТ-сервисов системами инфрас...ALG Systems (АЛЖ Системс)
 

Similar to anonymous and efficient authentication scheme for privacy-preserving distributed learning (20)

credit card fraud detection
credit card fraud detectioncredit card fraud detection
credit card fraud detection
 
MOBILE CLOUD COMPUTING USING CRYPTOGRAPHIC HASH FUNCTION
MOBILE CLOUD COMPUTING USING CRYPTOGRAPHIC HASH FUNCTIONMOBILE CLOUD COMPUTING USING CRYPTOGRAPHIC HASH FUNCTION
MOBILE CLOUD COMPUTING USING CRYPTOGRAPHIC HASH FUNCTION
 
A Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud StorageA Survey on Batch Auditing Systems for Cloud Storage
A Survey on Batch Auditing Systems for Cloud Storage
 
Online e voting
Online e votingOnline e voting
Online e voting
 
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesAnalysis on Fraud Detection Mechanisms Using Machine Learning Techniques
Analysis on Fraud Detection Mechanisms Using Machine Learning Techniques
 
Insuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud EnvironmentInsuring Security for Outsourced Data Stored in Cloud Environment
Insuring Security for Outsourced Data Stored in Cloud Environment
 
online-examination-system.pptx
online-examination-system.pptxonline-examination-system.pptx
online-examination-system.pptx
 
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...
2019 GDRR: Blockchain Data Analytics - QuTrack: Model Life Cycle Management f...
 
E discovery Process Improvement
E discovery Process ImprovementE discovery Process Improvement
E discovery Process Improvement
 
FlorenceAI: Reinventing Data Science at Humana
FlorenceAI: Reinventing Data Science at HumanaFlorenceAI: Reinventing Data Science at Humana
FlorenceAI: Reinventing Data Science at Humana
 
Automation of document management paul fenton webinar
Automation of document management paul fenton webinarAutomation of document management paul fenton webinar
Automation of document management paul fenton webinar
 
Implement Test Harness For Streaming Data Pipelines
Implement Test Harness For Streaming Data PipelinesImplement Test Harness For Streaming Data Pipelines
Implement Test Harness For Streaming Data Pipelines
 
New Testing Standards Are on the Horizon: What Will Be Their Impact?
New Testing Standards Are on the Horizon: What Will Be Their Impact?New Testing Standards Are on the Horizon: What Will Be Their Impact?
New Testing Standards Are on the Horizon: What Will Be Their Impact?
 
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud MembersAn Efficient Scheme for Data Sharing Among Dynamic Cloud Members
An Efficient Scheme for Data Sharing Among Dynamic Cloud Members
 
Activity Monitoring Using Wearable Sensors and Smart Phone
Activity Monitoring Using Wearable Sensors and Smart PhoneActivity Monitoring Using Wearable Sensors and Smart Phone
Activity Monitoring Using Wearable Sensors and Smart Phone
 
ADDO Open Source Observability Tools
ADDO Open Source Observability Tools ADDO Open Source Observability Tools
ADDO Open Source Observability Tools
 
Net campus2015 antimomusone
Net campus2015 antimomusoneNet campus2015 antimomusone
Net campus2015 antimomusone
 
PREDICT THE FUTURE , MACHINE LEARNING & BIG DATA
PREDICT THE FUTURE , MACHINE LEARNING & BIG DATAPREDICT THE FUTURE , MACHINE LEARNING & BIG DATA
PREDICT THE FUTURE , MACHINE LEARNING & BIG DATA
 
Production Monitoring Platform
Production Monitoring PlatformProduction Monitoring Platform
Production Monitoring Platform
 
Сервис, ты как? Практики и подходы к мониторингу ИТ-сервисов системами инфрас...
Сервис, ты как? Практики и подходы к мониторингу ИТ-сервисов системами инфрас...Сервис, ты как? Практики и подходы к мониторингу ИТ-сервисов системами инфрас...
Сервис, ты как? Практики и подходы к мониторингу ИТ-сервисов системами инфрас...
 

Recently uploaded

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 

Recently uploaded (20)

Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

anonymous and efficient authentication scheme for privacy-preserving distributed learning

  • 1. Anonymous and efficient authentication scheme for privacy-preserving distributed learning Mini Project Subhajit Ghosh (2102041) Indian Institute of Information Technology Guwahati
  • 2. Objective • To provide an overview of the anonymous and efficient authentication scheme for privacy-preserving distributed learning. • This proposed work has helped to alleviate some of the drawbacks of privacy-preserving in distributed learning or has innovated new technologies for various applications. • I attempted to identify the paper’s problems while also comprehending the methodology (that is, the working model and algorithms).
  • 3. Introduction • A tremendous amount of data has been generated and transmitted to cloud servers due to the integration of machine learning (ML) and cloud computing, which has been developed rapidly in the past decade. To resolve this issue, the concept of distributed learning (DL) is used. • In this, the participating devices first train the ML model locally with the raw data, and once computed, it sends the model parameters to the cloud. The cloud then aggregates into a global ML model.
  • 4. • To tackle this challenge of privacy violations , deploying encryption techniques or differential privacy (DP) are two primary approaches. • Encryption techniques, such as homomorphic encryption and secure multiparty computation, are employed to design secure data exchange and aggregation protocols. Encryption techniques is not generalised for all ML algorithms in DL.
  • 5. • Differential privacy (DP) is deployed to obfuscate information by introducing random noise to the raw data or model parameters. DP-based schemes are generalised for all ML algorithms in DL. The randomness reduces data utility, bringing undesired accuracy degradation to ML models. Model convergence with longer latency.
  • 6. The proposed scheme is based on the fact that if the participants in the DL system are anonymous, then although the raw data is recovered, the adversary cannot link the data to the corresponding participant’s real identity, thereby achieving privacy preservation. • In this scheme, it deploys anonymous authentication. • The new generalised certificateless signature scheme PCLS, which is built on pairing-based cryptography, The designed signature scheme has an anonymous and efficient authentication protocol that supports batch verification (AAPBV).
  • 7. Problem statement • The major problems addressed in this paper are: Adversary is able to derive the raw data (user identity) by analysing the obtained machine learning models. Significantly reduces the time consumption in batch verification, achieving high computational efficiency.
  • 8. Proposed Methodology System Overview • Participants: It refer to individuals that are equipped with intelligent devices, such as laptops , mobiles. • Cloud Server: It receives the model parameters from participants and aggregates into a global ML model. • Trusted Authority (TA): TA is a powerful system manager that is responsible for system initialization, participant registrations, key generation, identity management, and so on.
  • 9. Proposed Methodology Model Flow • Step 1: The cloud server initializes a global model and distributes the model to all participants. • Step 2: After receiving the global model, each participant continues to train the model on its local dataset and obtains the updated model parameters Wn. Wn is then uploaded to the cloud server. • Step 3: The cloud server aggregates the model parameters. The global ML model is corrected with Wg and sent to the participants for next-round training. • Step 4: Repeat Steps 2, 3 until the global model converges.
  • 11. Proposed Methodology Pairing based certificateless signature scheme (PCLS) It lays down a design basis for the proposed anonymous authentication protocol. • Instead of setting the signer’s real identity as the partial public key, the hash value of the signer’s real identity is the partial public key, protecting the real identities from disclosure. • Modified the signature generation and message verification to support batch verification, such that the authentication is more efficient.
  • 12. Proposed Methodology Pairing based certificateless signature scheme (PCLS) It involves following steps: • Setup • Key Extract • Sign • Verify
  • 13. Proposed Methodology Pairing based certificateless signature scheme (PCLS) Setup • TA publishes (l, p, P, e, G1, G2, H1, H2, YTA) as the system parameters. • Private key XTAis kept by TA and remains as a secret. Key-Extract • The signer randomly selects X’ as its partial private key and calculates Y’ = X’P as its partial public key. • The signer computes Y” = H1(I D) as the other partial public key and sends Y” to TA, where ID is its true identity. • Given Y”, TA then sets X” = XTA Y” and sends to the signer through a secure channel. The signer uses (X’, X”) as its full private key and (Y, Y”) as its full public key.
  • 14. Proposed Methodology Pairing based certificateless signature scheme (PCLS) Sign k = H2(m || Y′|| Y′′|| YTA, rP) U = X’ YTA -X”k The signature is = (k, U) on message m. Verify After receiving the message m with signature , the verifier checks e(Y’ , YTA) = e(U, P)e(Y”, YTA)k
  • 15. Proposed Methodology Anonymous authentication protocol AAPBV The proposed AAPBV involves four stages • Initialization stage • Registration stage • Authentication stage • Batch verification stage
  • 17. Result Protocols Sign Verify Liu et al. [11] 5Tm Te + 4Tm + Tp Zhang at al.[12] 9Tm 6Tm Yang et al. [14] Te+Tm Te + 5Tp Shen et al. [15] Te + Tm + Tp Te + Tm + 2Tp Proposed 4Tm Te + 2m + 3p COMPARISON OF THE COMPUTATIONAL TIME WITHOUT BATCH VERIFICATION
  • 18. Result Protocols Sign Verify Liu et al. [11] 75.875 80.26 Zhang at al. [12] 136.575 91.05 Yang et al. [14] 16.675 91.8 Shen et al. [15] 34.735 52.795 Proposed 60.7 86.03 COMPARISON OF THE COMPUTATIONAL TIME WITHOUT BATCH VERIFICATION
  • 19. Result Protocols Time Yang et al. [14] 5(n+1)Tm+5Tp Shen et al. [15] nTe + nTm + 2nTp Proposed nTm + 3Tp COMPUTATIONAL TIME OF BATCH VERIFICATION
  • 20. Conclusions • The proposed protocol achieves efficient batch verification with a slight sacrifice of computational efficiency in single verification. In addition, benefiting from the designed DBV algorithm, the global model converges quickly under the proposed AAPBV protocol, further improving the computational efficiency in DL. • The proposed protocol guarantees various security properties while supporting batch verification. The protocol provides high efficiency and enhanced security with a small sacrifice in computational costs in single authentication, making it more practical for large-scale DL systems.