On Differential Privacy for Federated Learning in Wireless Systems with Multiple Base Stations

Nima Tavangaran   Mingzhe Chen   Zhaohui Yang  
José Mairton B. Da Silva Jr.
  and H. Vincent Poor   N. Tavangaran, J. M. B. da Silva Jr., and H. V. Poor are with the Department of Electrical and Computer Engineering, Princeton University, Princeton, NJ, USA, (e-mails: nimat@princeton.edu and poor@princeton.edu).M. Chen is with the Department of Electrical and Computer Engineering and Institute for Data Science and Computing, University of Miami, Coral Gables, FL, 33146 USA (e-mail: mingzhe.chen@miami.edu).Z. Yang is with the College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China, (e-mail: yang_zhaohui@zju.edu.cn).J. M. B. da Silva Jr. is also with the School of Electrical Engineering and Computer Science, KTH Royal Institute of Technology, Stockholm, Sweden (e-mail: jmbdsj@kth.se).The work of N. Tavangaran was partly supported by the German Research Foundation (DFG) under Grant TA 1431/1-1.The work of H. V. Poor was supported by the U.S. National Science Foundation under Grants CCF-1908308 and CNS-2128448.This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible.
Abstract

In this work, we consider a federated learning model in a wireless system with multiple base stations and inter-cell interference. We apply a differential private scheme to transmit information from users to their corresponding base station during the learning phase. We show the convergence behavior of the learning process by deriving an upper bound on its optimality gap. Furthermore, we define an optimization problem to reduce this upper bound and the total privacy leakage. To find the locally optimal solutions of this problem, we first propose an algorithm that schedules the resource blocks and users. We then extend this scheme to reduce the total privacy leakage by optimizing the differential privacy artificial noise. We apply the solutions of these two procedures as parameters of a federated learning system. In this setting, we assume that each user is equipped with a classifier. Moreover, the communication cells are assumed to have mostly fewer resource blocks than numbers of users. The simulation results show that our proposed scheduler improves the average accuracy of the predictions compared with a random scheduler. Furthermore, its extended version with noise optimizer significantly reduces the amount of privacy leakage.

Differential privacy, federated learning, neural networks, wireless channel, multiple base stations.

I Introduction

Machine Learning (ML) systems are expected to play an important role in future mobile communication standards [1]. With increasing applications of ML schemes in wireless systems, new technologies are emerging to enhance the performance of such systems. On the other hand the wireless technology itself can also be deployed to enhance the ML procedures [2]. Among possible candidates, Federated Learning (FL) has been shown to have considerable promise [3, 4, 5] and has the potential to benefit from wireless communication.

FL solves several issues of centralized ML systems by distributing the learning task among several edge devices. One advantage of using an FL system, which makes it a good fit in a wireless setting, is that edge devices do not need to transmit their local datasets to the server. This reduces the amount of wireless resources that is required for accomplishing the given ML task. Apart from this, the privacy of each edge device is not completely compromised since the server does not have a direct access to the data [6].

FL schemes operating over wireless networks have been extensively researched in recent years; see for example [7, 8, 9, 10, 11, 12, 13]. In [8], the authors studied the effects of wireless parameters on the FL process. They derived an upper bound on the optimality gap of the convergence terms and proposed an optimization problem to minimize the upper bound by considering wireless parameters like resource allocation, user scheduling, and packet error rate. Some other works that studied the communication aspects of FL are [14, 15, 16]. Moreover, FL with several layers of aggregation or with hierarchy has been studied in [17, 18, 19, 20, 21, 22].

Although the training data of each device in FL is not transmitted to the server, yet a function of the local model (query) is still sent to the server. It has been shown that this local model might leak some information about the training data [23]. To mitigate this drawback, FL has been extensively studied together with a privacy preserving scheme called Differential Privacy (DP) [24].

DP-based schemes follow the principle of not being adversely affected much by having one’s data used in any analysis [25]. This powerful notion is well established and is applied in industry. To realize a DP-based FL system, each edge device adds some artificial noise to its transmitting information. This noise provides a certain amount of privacy depending on the noise power and sensitivity of the query function.

DP based FL and its convergence behavior have been extensively studied; see for example [26, 27, 28, 29, 30, 31, 32]. In this regard, the work in [26] addresses the privacy implementation challenges through a combination of zero-concentrated differential privacy, local gradient perturbation and secure aggregation.[30] considers the resource allocation and user scheduling to minimize the FL training delay under the constraint of performance and DP requirements. Finally, [32] presents a closed-form global loss and privacy leakage of a DP-based FL system and then minimizes the loss and privacy leakage.

However, none of these works consider a joint learning and resource allocation scheme for DP-based FL that considers the effects of inter-cell interference as well. In this paper, we adapt the framework in [8] and consider a wireless FL system in a multiple base station scenario. Additionally, we consider DP noise added to the gradients [26] and combine this approach with resource scheduling.

The goal of the FL system here is to train a global model for a given predictor. We introduce an iterative DP-based FL scheme with two levels of aggregation (Algorithm 1) and then derive an upper bound on the optimality gap of its convergence terms (Theorem 1).

We then propose an optimization problem whose goal is to improve the convergence of the upper bound on the optimality gap of Algorithm 1 and simultaneously reduce the total privacy leakage. In this regard, the optimization problem is with respect to certain variables like user and resource scheduling, uplink transmit powers, and the amount of DP noise that is applied by each user to its transmitting information.

Since the proposed optimization problem is a non-linear multi-variable mixed integer programming, we divide it into two simpler schemes.

First, we present a suboptimal approach to minimize the objective function only with respect to resource scheduling variables in a sequential manner, i.e., cell by cell. This reduces the original problem to a linear integer programming task and substantially simplifies the implementation. We call this scheme also the optimal scheduler (OptSched). Since this approach performs sequentially from one cell to another one, the amounts of optimal transmit power should be adjusted carefully due to the effects of inter-cell interference. To tackle this problem, we introduce a procedure to determine the users’ optimal transmit powers by solving a simple optimization problem.

Next, we enhance the OptSched scheme by further minimizing the objective function of the proposed optimization problem with respect to the DP noise. This leads us to a convex optimization problem with respect to the DP noise standard deviations. We call this extended scheme the optimal scheduler with DP optimizer (OptSched+DP).

We present all the numerical optimizations and benchmarking results. In this regard, we apply Python optimization packages like CVXPY, CVXOPT, GLPK, and ECOS [33, 34, 35, 36, 37]. The numerical results show that our proposed schemes (OptSched and OptSched+DP) reduce the objective function of the optimization task substantially compared with the case in which we randomly allocate the resources and apply the DP noise.

Next, we apply these (sub-)optimal parameters to our iterative learning scheme (Algorithm 1). In this regard, each user is equipped with a fully connected multi-layer neural network as a classifier. Furthermore, we assume that communication cells have mainly more users than available resource blocks. This is a legitimate assumption due to the bandwidth limitation. We then perform simulations to measure the accuracy, loss, and the amount of the privacy leakage in such a system for the proposed algorithms. To realize the simulations, we apply the TensorFlow, NumPy, and Matplotlib packages [38, 39, 40].

The simulations show that the OptSched scheme predominantly improves the classification accuracy by scheduling the users who have larger data chunks and better uplink channels. The OptSched+DP scheme, on the other hand, achieves a significant reduction in privacy leakage of individual users by systematically adjusting the DP noise power and moderately sacrificing accuracy.

Notation: We denote vectors by lowercase bold letters, e.g. . Matrices are represented by uppercase bold letters like , or the identity matrix with rows and columns. Sets are denoted by Calligraphic fonts like . Random mechanisms as a special kind of functions are represented by Fraktur fonts, e.g. . The transpose of a vector is denoted by . Logarithms are assumed to be to the basis 2. The set of real numbers is represented by . denotes the set .

Ii System Model

We begin this section by reviewing some preliminary notions on DP that are required in this work. The complete list of definitions can be found in [24, 25, 41].

Ii-a Differential Privacy Model

Let a data universe and the distribution on it be given. Assume that a database is denoted by a matrix and contains rows of independent and identically distributed (i.i.d.) -dimensional samples (row vectors). Two databases are called adjacent if they differ only in one row.

A query (mechanism) is a function which takes a database as input and gives a -dimensional output. If the output of the query contains randomness then it is called a randomized mechanism.

In the following, we introduce the notion of privacy for randomized mechanisms, which are defined on a given set of databases .

Definition 1.

A randomized mechanism is said to be -Differentially Private, or for short -DP, if for every adjacent , we have that

(1)

holds for any .

In this work, we apply a relaxed version of the -DP that is more suitable for Gaussian mechanisms.

Definition 2.

A randomized mechanism is said to be -zero-Concentrated Differentially Private (CDP), or for short -zCDP, if

(2)

holds for every adjacent and all , where is the -Rényi divergence [41].

Ii-B Federated Learning Model

Based on the notions from previous section, we introduce our privacy preserving FL model for a system with multiple base stations. Let a collection of base stations denoted by the set be given such that they can communicate with each other through a main server. Assume that each base station serves a set of edge devices (users) denoted by , where the users in have some arbitrary order. Let denote the size of this set.

We assume that each user assigned to the base station has access to a database

where is the number of samples (row vectors) in the database . Each row of the above matrix, say , is an -dimensional data sample given by

where the first elements are the inputs and the last entry is the output of the training data.

In the first step of the FL scheme at round , the main server broadcasts a weight vector to all base stations. This vector is called the global model and can be initialized randomly. Then, each base station transmits this model to all of its edge devices. Let only a subset of the users in each cell are active and participate in the learning process. We denote the active users in cell by:

(3)

where indicates that user is scheduled [8] to participate in the learning process and , otherwise.

Main
Server
Fig. 1: FL model with multiple base stations.

Fig. 1 shows an example of a model with multiple base stations. In this example, all users of cell (depicted on the bottom of the figure), are scheduled to participate in the FL process and receive the vector .

Each scheduled user computes a local loss function depending on the ML algorithm that is applied in the system. We denote the loss function of a user by , which is a function of the global model and its training sample. Next, this user computes the gradient [42, 4] of its loss function over all given samples as a query function

(4)

where the gradients are with respect to .

Similarly as in [26], the user then applies Gaussian noise to the outcome of the query to implement the randomized mechanism as follows

(5)

In this context, is assumed to be independent of all other random variables in our model, including the DP noise that is applied in previous iterations. The main reason of applying Gaussian noise is that it gives tight bounds when applied with zCDP [41]. The following vector denotes the noise standard deviations of the users in the cell :

(6)

Next, the edge device updates its local model by

(7)

where is the learning step size. It then transmits its updated model111For the sake of simplicity, we consider only a single local update at each edge device in each round and also consider the batch gradient descent. to its corresponding base station .

In the next step, base station aggregates all received updated models as given below:

(8)

where is the scheduling parameter and was defined as an element of the vector in Eq. (3).

Consequently, all base stations send their aggregated models to the main server. There, the global model at round is computed as follows

(9)

where

(10)

is the total number of training samples of all scheduled users.

1:The main server broadcasts , which are given by (3) and (6), to all base stations and their users.
2:The main server initializes the global model .
3:for  do
4:     The main server broadcasts to all base stations.
5:     for  base stations in parallel do
6:         Base station broadcasts to all its users.
7:         for users in parallel do
8:              if  then
9:                  The user updates its model as in (7).
10:                  The user then sends back to the base station .
11:              end if
12:         end for
13:         The base station aggregates the received models as in (8).
14:         The base station then sends back to the main server.
15:     end for
16:     The main server aggregates all models as in (9).
17:end for
Algorithm 1 Privacy preserving FL with multiple stations

Next, the main server broadcasts the new global model to the base stations where it is then forwarded further to their corresponding users. This process continues for a given number of iterations. Algorithm 1 summarizes these steps, where are assumed to be shared with all participants at the beginning of the learning process.

One difference between Algorithm 1 and other approaches like e.g. the FL schemes in [26, 8] is that here the aggregation is done in two steps. Additionally, the noise standard deviations at users are not necessarily identical here and a joint optimal user scheduling and DP noise adjustment is possible.

To characterize the DP noise, we need to make the following assumption which can be achieved in practice by weight clipping [43, 26].

Assumption 1.

The gradients of the local loss functions are always upper bounded:

In [26], it was shown that if Assumption 1 holds, then after iterations, a mechanism like is -zCDP where

(11)

is the privacy leakage.

Note that the DP noise affects the convergence of the learning process as well. In Section III, we study the convergence behavior of Algorithm 1 with respect to the vector parameters and .

Iii Convergence Analysis

In the following, we define the global loss as a function of local losses. We then derive an upper bound on the optimality gap that appears in each round of Algorithm 1.

The global loss function is computed over all base stations and is given by

(12)

where is the total number of samples (including scheduled or non-scheduled).

The following assumptions are necessary to analyze the global loss function and have been used before in the literature [44].

Assumption 2.

The loss function has a minimum value, i.e., there exists an input vector .

Assumption 3.

The gradient is uniformly -Lipschitz continuous with respect to the model , i.e.,

Assumption 4.

The loss function is -strongly convex, i.e.,

holds for all .

Assumption 5.

The loss function is twice continuously differentiable. Then, Assumptions 3 and 4 are equivalent to the following:

Assumption 6.

There exists constants and , such that for any training sample and model , the following inequality holds

Now, we are ready to derive an upper bound on the optimality gap of Algorithm 1.

Theorem 1.

Let Assumptions 26 hold. Then, the following upper bound on the optimality gap for Algorithm 1 holds:

where the expectation is taken over the DP noise and

Proof.

The proof is provided in the Appendix. ∎

Theorem 1 shows that the expected difference between the global loss and the optimal value per iteration is upper bound by expressions that depend on , , and . Hence, by lowering the values of , , and , the convergence of Algorithm 1 should be improved. In addition, Theorem 1 shows that the upper bound on the optimality gap is influenced by the scheduling parameters and DP noise standard deviations . We also observe that the upper bound converges only if . In Section IV, we design an optimal scheduler and a DP optimizer based on these variables and their effect on this upper bound.

Iv Learning over Wireless Channels with Inter-cell Interference

In this section, we consider other wireless parameters of the communication system and connect them to the notion of learning. These wireless parameters include resource allocation, transmit power consumption, fading channels, inter-cell interference, and communication rate.

We assume that the users apply an Orthogonal Frequency-Division Multiple Access (OFDMA) technique in the uplink channel to transmit data to their corresponding base station. In this case, each edge device is assigned a resource block indexed by where is the total number of available uplink transmission resource blocks in each cell.

We define the uplink resource allocation matrix in a given cell as

(13)

where . Each row of this matrix represents the resource allocation for a user . In this case, indicates that the edge device uses resource block in the uplink transmission and , otherwise. Moreover, we assume that each active user () is assigned only one resource block and inactive users () are not assigned any resource block at all, i.e.,

(14)

In addition, edge devices in a given cell do not interfere with each other, i.e.,

(15)

To be able to formulate the communication rate, we need first to define the transmit powers of the users. Let the uplink transmit power vector of all edge devices at a given cell be denoted by

where denotes the transmit power of the user . Moreover, the maximum transmit power of each user in any cell is denoted by .

Fig. 2: Uplink stage of the wireless FL model with multiple base stations and inter-cell interference.

Another wireless parameter, which is of great importance in the considered system with multiple base stations, is the inter-cell interference. Let denote the interference signal power [45] from the cell that affects the uplink signal received by the base station on the resource block . In this case, inequality (15) implies that is a factor of the transmit power of only one user in the cell that transmits signals on the resource block . In other words, the received interference signal power can be formulated as

(16)

The term in (16) is the channel gain between the user and the base station and can be computed by determining the pathloss [46]. The channel gain is given by

(17)

where is the uplink center frequency, is the distance between the user and base station , is the output of a Rayleigh distribution with a unit scale parameter, and is the speed of light.

Fig. 2 illustrates an example of a wireless communication system with three base stations and in the uplink stage. In this example, the received signals on the resource block at the base station are affected by the interference signal power from cell . Furthermore, base station is affected by the interference signal power from cell .

Let the uplink fading channel between each user and its corresponding base station be fixed and equal to . Also assume that the uplink bandwidth is denoted by . Furthermore, all participants are assumed to have perfect channel knowledge. It is known (see e.g. [45, 8]) that the maximum uplink communication rate between each user and its corresponding base station can be formulated as

(18)

where is the thermal noise power spectral density. We assume that the minimum required uplink communication rate between each user and its base station is denoted by a constant .

Before applying these wireless parameters in the learning process, we first need to introduce another measure based on the DP standard deviations . In this regard, we define the total privacy leakage as follows:

(19)

In this definition, the summands in (19) are computed by multiplying the privacy leakage given by (11) at each user with the scheduling variables . Minimizing this measure reduces the individual privacy leakage as well. This improvement is due to the systematic adjustment of the DP noise power at each user. In this case, edge devices who have a larger number of samples are assigned less DP noise power.

The parameters and play a critical role in improving the convergence rate of Algorithm 1 (cf. Theorem 1) and reducing the total privacy leakage. Furthermore, the parameter is critical in establishing a reliable communication. By minimizing and with respect to these parameters, the upper bound on the optimality gap in Theorem 1 reduces and thus the convergence rate of the FL procedure should improve. To this end, it is sufficient to minimize only the expressions inside the squared term in .

Therefore, we propose an optimization problem over the variables and minimize the values of and from Theorem 1 and the total privacy leakage given by (19). In this combined formulation, we assume that other FL parameters, such as and , are constant. The main server can then solve this optimization problem and then broadcast the results to all base stations before Algorithm 1 starts.

Since it is hard to directly solve a multi-objective optimization problem for both scheduling and total privacy leakage, we formulate the problem as a single-objective optimization task as follows:

(20)
subject to
(21)
(22)
(23)
(24)
(25)
(26)

where is a constant and is used to balance the optimization of the scheduling and the total privacy leakage. Typically, the value of the constant can be obtained by hyperparameter tuning and simulations.

Minimizing the first term in the objective function in (20) improves the convergence of Algorithm 1 and is computed by applying (14) to the summation term in of Theorem 1. Minimizing the second term, on the other hand, reduces the total privacy leakage at all users and is given by (19).

Constraint (21) guarantees that the DP noise error, which is characterized by the term of Theorem 1, is less than a given constant . To derive condition (21), we first consider the following upper bound on the squared term in

(27)

which follows by (10) and . Constraint (21) then follows by applying (10) and (14) to this upper bound and setting it to be smaller than . We can then control the amount of DP noise variance and its error by adjusting the constant .

Conditions (23)-(24) provide the resource allocation constraints, whereas (25)-(26) restrict the transmit power to a maximum amount and ensure a minimum communication rate for each user in each cell, respectively. Finally, constraint (22) guarantees an upper bound on the privacy leakage of the users individually due to (11). In this case, the constant controls the minimum amount of DP noise at each user.

We notice that the variable and , which are given by (3) and (13), are related due to (14). Therefore, does not appear as a minimization variable.

The optimization problem in (20) is not easy to solve. However, we can subdivide it into simpler problems and search for (sub-)optimal solutions. The main server can then compute and broadcast these (sub-)optimal to all base stations where they can be forwarded to the users. These computations and initialization should be done prior to the beginning of Algorithm 1.

V Algorithm Design

In this section, we propose two suboptimal sequential algorithms to solve the optimization problem in (20). First, for fixed DP noise the objective function in (20) is minimized with respect to users’ transmit powers and resource block allocation in a cell-by-cell manner. In the second part, with given transmit power and resource block allocation, the optimization problem in (20) becomes convex with respect to the DP noise standard deviations.

V-a Optimal Scheduler

Let the DP noise standard deviations be given such that condition (22) is always satisfied. In the following, we consider the joint transmit power and resource block allocation problem, which is a simplified version of (20).

(28)

The optimization problem in (28) is non-linear with respect to due to (26) and (18). To further simplify it, we first compute the optimal transmit powers while guaranteeing the minimum communication rate constraint. In this case, setting (26) to equality, combining it with (18), and using the fact that , the optimal transmit powers can be obtained as

(29)

We then consider only one cell at each optimization step in an alternating strategy. Based on this approach and applying (29) to (25), the optimization task in (28) reduces to the following linear integer programming problem for a single cell :

(30)
subject to
(31)
(32)
(33)
(34)
1:Initialize the values of randomly such that they satisfy (21)-(25).
2:Compute by solving (35) and unschedule those users whose communication rates do not meet (26).
3:Output the resulting parameters as a (sub-)optimal solution .
Algorithm 2 Random scheduler with random DP noise (RndSched)

To solve (30), we assume that are known and satisfy conditions (23)-(25). We then solve this problem with respect to while taking with as constants. By solving this optimization problem for each cell, we obtain a (sub-)optimal scheduling solution for the whole system.

In the next step, the optimal transmit powers should be accordingly computed by using (29). Yet, the term in (29) is itself a linear function of transmit powers of other users due to (16). In fact, (29) can be written as a linear equation system with unknown variables . In this case, is a vector consisting of all transmit powers and and are the coefficients of the linear equation system given by (29). To compute the optimal transmit powers, we solve the following simple optimization:

(35)

After finding the optimal powers from (35), we can compute the uplink communication rates by using (18). We then unschedule those users whose rates do not satisfy (26) and set their transmit power to zero.

1:Initialize the values of randomly such that they satisfy (21)-(25).
2:for  do
3:     For fixed and , obtain a (sub-)optimal resource block allocation matrix by solving the optimization problem in (30).
4:end for
5:Compute by solving (35) and unschedule those users whose communication rates do not meet (26).
6:Output the resulting parameters as a (sub-)optimal solution .
Algorithm 3 Optimal scheduler with random DP noise (OptSched)

Based on these solutions, we propose two procedures for user scheduling and DP noise adjustment. Algorithm 2 presents a random scheduler (RndSched). Algorithm 3 provides an optimal scheduler (OptSched) based on (30). Both algorithms benefit from the power allocation procedure based on (35) and both apply random DP noise to achieve privacy.

We note that one advantage of the optimal scheduler is that it is linear and therefore efficient from a practical point of view compared with (28). Nevertheless, the drawback of this approach is that it is performed sequentially and cell by cell. As a result, there is no guarantee that this approach always provides us with an optimal solution. However, as we will see in Subsection VI-A, it delivers very good results compared with the randomized scheduler. In the next subsection, we extend this algorithm to include a DP optimizer.

V-B DP Optimizer

Let the transmit powers and resource block allocation values from the optimal scheduler be given. The DP noise optimization problem is then given by

(36)

Since the objective function and all constraints in (36) are convex, the global optimal solution can be obtained by solving the Karush-Kuhn-Tucker (KKT) [47] conditions. The Lagrange function can be formulated as:

where is a Lagrange multiplier.

Setting the derivative of with respect to to zero yields

(37)

Let hold. It then follows by combing (37) with (22) that

(38)

where and . If holds, then we have .

Fig. 3: User and channel initialization with 100 users.

For the optimal solution, constraint (21) always holds with equality since the objective function monotonically decreases with increasing . Consequently, substituting (38) into (21) with equality implies that

(39)

After the value of is found from (V-B), the optimal can be computed from (38). We then combine this scheme with the procedure in Subsection V-A. A summary of this scheme is provided in Algorithm 4 (OptSched+DP).

Vi Simulations and Numerical Solutions

Vi-a Optimization Problems

In this subsection, we present the numerical solutions of the algorithms that were presented in Section V. In this regard, we apply the Python optimization packages CVXPY, CVXOPT, GLPK, and ECOS [33, 34, 35, 36, 37].

Since Algorithms 3 and 4 are heuristic, their solutions depend on the initial values of the optimizing variables as well as the wireless channels and the number of training samples at each user. As a result, we repeat the computations for several random initial values, channels and data distributions among the users and then compute the average.

System parameter values
Number of cells or base stations :
Total number of users: 100
Cell radius: 500m
Uplink center frequency: 2450MHz
Channels’ Rayleigh distribution scale parameter: 1
Uplink resource block bandwidth (B):
Thermal noise power spectral density :
Maximum transmit power :
Minimum communication rate :
DP noise error upper bound :
Minimum total DP noise at each user :
TABLE I:
1:Perform Algorithm 3.
2:For the given from Algorithm 3, obtain the optimal by solving (36).
3:Output the resulting parameters as a (sub-)optimal solution .
Algorithm 4 Optimal scheduler with DP noise optimizer (OptSched+DP)
(a)
(b)
Fig. 4: Numerical results of the optimization problem in (20).

To this end, the variables are first initialized based on a shuffled Round-robin scheme and are set uniformly at random such that and hold. Second, the users are positioned in a square area consisting of seven hexagon cells according to a uniform distribution. The edge devices are then assigned to their nearest base stations according to their random position. Based on their distances to the base stations, their fading channels are then computed by applying (17).

An example of channel initialization, which is generated by our simulator in Python language, is shown in Fig. 3. In this case, the channels between one of the users and base stations are depicted as dashed lines. We notice that the cells 1-6 in this setting can cover users also outside their area while the central cell only covers devices inside the central hexagon. As a result, the effects of boundary and central cells are both taken into account in our simulations.

After the users are assigned to their corresponding base stations, the training data is randomly distributed among all users. Inspired by [48], the number of samples are determined by a lognormal distribution.

Algorithms 3 and 4 should then provide us with and which determine (sub-)optimal allocated resource blocks, uplink transmit powers, and the scheduled users.

The system parameters that are used in the computations are listed in Table I. Fig. 4 shows the results of all algorithms in the form of an empirical Cumulative Distribution Function (CDF) of the normalized objective value in (20). The normalization is done by dividing the value of the objective function by the total number of samples (scheduled or unscheduled). The CDF is computed for two values of available number of resource blocks and the optimization constant from (20) . The results are averaged over random channels and initial values. As seen in Fig. 4, the OptSched (Algorithm 3) outperforms the RndSched (Algorithm 2) in terms of minimizing the objective value in (20). Moreover, the OptSched+DP (Algorithm 4) further improves the results of the OptSched by reducing the total privacy leakage. Furthermore, the OptSched+DP achieves lower values for compared with the case in which . This is because, larger in (20) gives more weight to the DP noise optimization.

We also notice that by increasing from 5 to 8, the normalized objective values of the RndSched get slightly closer to the outcome of the OptSched algorithm. This is due to the fact that by increasing and keeping the total number of users constant, chances that all users are successfully scheduled by RndSched become higher. In this case, for large values of , the RndSched might eventually achieves the same performance as for OptSched. However, the choice of selecting a large number of resource blocks for a low number of users is not desirable due to the limited amount of available bandwidth.

Vi-B Federated Learning Simulations

In this subsection, we apply the random parameters and as well as (sub-)optimal and from Subsection VI-A to an FL system as described in Algorithm 1. In this case, we assume that the main server and all users each maintain a fully connected neural network in the form of a multi-label classifier. The networks consist of two hidden layers, each with 256 nodes. To implement the simulations, we apply the TensorFlow, NumPy, and Matplotlib packages [38, 39, 40]. Furthermore, we use the MNIST image dataset [49] to train and test the multi-label classifier.

(a)
(b)
(c)
(d)
(e)
(f)
Fig. 5: FL system with a learning rate of and a maximum gradient global norm of .

In this setting, we train the local models over communication rounds between users and the main server. To follow our mathematical model in Section II, we perform no local iterations and use the batch gradient descent scheme. We do not apply any decay and use a fixed learning rate .

Furthermore, to guarantee that Assumption 1 holds, the gradient of all weights are clipped so that their global norm is smaller than or equal to . This directly affects the amount of privacy leakage as given by (11).

We perform the simulations over 100 channels and initial values and then average the resulting accuracy and loss. Furthermore, we generate the empirical CDF of the privacy leakage of all users. Fig. 5 shows the accuracy, loss, and privacy leakage CDF of this learning system for different values of available resource blocks and optimization constant .

As seen in Fig. 5, the OptSched outperforms the RndSched algorithm in terms of accuracy and loss for both and . In this case, the OptSched systematically selects the users with large chunks of data that have a better channel and suffer less from the inter-cell interference. The RndSched algorithm, however, fails in this scenario since it applies a random scheduling scheme.

The OptSched+DP, on the other hand, slightly degrades the performance of the optimal scheduler by increasing and optimizing the DP noise. Yet OptSched+DP provides a similar or even better performance compared with RndSched scheme for small values of (see Figs 4(a) and 4(c)). The degradation is the price that is paid to improve the privacy. Figs. 4(e) and 4(f) show the empirical CDF of the privacy leakage (). In this case, the value of at each user is computed by using (11) and the results over all simulation iterations are collected to compute the CDF. The simulations show that the OptSched+DP scheme substantially reduces the amount of privacy leakage at each user. In particular it achieves a maximum privacy leakage of around thanks to the DP optimizer scheme. This is a significant improvement compared with the RndSched scheme with a maximum leakage of around .

Adjusting the optimization constant is also crucial. In this regard, by choosing the OptSched achieves lower privacy leakage compared with (see Figs. 4(e) and 4(f)). This is because larger gives less weight to the optimal scheduler in (20) and users with higher DP noise power are preferred in scheduling.

Vii Conclusion

In this work, a privacy preserving FL procedure in a multiple base station scenario with inter-cell interference has been considered. An upper bound on the optimality gap of the convergence term of this learning scheme has been derived and an optimization problem to reduce this upper bound has been provided. We have proposed two sequential algorithms to obtain (sub-)optimal solutions for this optimization task; namely an optimal scheduler (OptSched) in Algorithm 3 and its extended version with DP optimizer (OptSched+DP) in Algorithm 4. In designing these schemes we avoid non-linearity in the integer programming problems. The outputs of these algorithms are then applied to an FL system.

Simulation results have shown that the OptSched increases the accuracy of the classification FL system and reduces the loss compared with the RndSched when the number of available resource blocks is small. In this case, when the total number of users is and , the OptSched shows an accuracy improvement of over . Simulations have further shown that the OptSched not only improves the accuracy but also can reduce the privacy leakage compared with the RndSched if the parameter is set properly.

The OptSched+DP, on the other hand, further optimizes the DP noise and substantially reduces the privacy leakage compared with both RndSched and OptSched. In this case, simulations have shown that the OptSched+DP reduces the maximum privacy leakage for both and by a factor of 8 (from to ). It is worth mentioning that when is small (e.g. ), this improvement is achieved while OptSched+DP shows a similar or even better performance in terms of accuracy and loss compared with RndSched.

Appendix

Proof of Theorem 1

Proof.

It follows by using Assumption 5 and applying the Taylor expansion to the global loss function that

(40)

Next, we compute the local updates at each user by combing (4), (5), and (7) as follows

(41)

Furthermore, Combining (8) and (9) implies that

(42)

We then obtain the global update at the main server by inserting the value of from (41) into (42) as follows

(43)

To simplify the rest of calculations, we define a new random variable to reflect the difference between the global update and the global gradient as below:

(44)

Now by inserting the term (the global update) from (44) into (40), we have that

(45)

Furthermore, the following identity always holds:

(46)

Considering the learning step size to be and applying the identity (46) to (45), it follows that

(47)

where is the optimal loss function (Assumption 2).

Inspired by [8], We first obtain an upper bound on the expectation of the term on the right hand side of (47). It follows by combining (43) and (44) that

(48)
(49)

where (48) follows by applying (12) and (46) and the fact that the DP noise is independent of other random variables and . Inequality (49) is due to the triangle inequality and the fact that the vectors are -dimensional.

Next, by applying Assumption 6 to (49) we have for some and that

(50)

where the last term in (50) is obtained due to the fact that the random variables in (49) are independent of each other.

On the other hand, since is -strongly convex (Assumption 4) we have that

(51)

By inserting (50) in (47) and using (51), the proof follows. ∎

References

  • [1] Y. C. Eldar, A. Goldsmith, D. Gündüz, H. V. Poor et al., Machine Learning and Wireless Communications.   Cambridge University Press, 2022.
  • [2] H. Hellström, J. M. B. da Silva Jr, M. M. Amiri et al., “Wireless for machine learning: A survey,” Foundations and Trends® in Signal Processing, vol. 15, no. 4, pp. 290–399, 2022.
  • [3] K. Bonawitz, H. Eichner, W. Grieskamp et al., “Towards federated learning at scale: System design,” in Proc. Syst. Mach. Learn. Conf., 2019, pp. 1–15.
  • [4] J. Konečný, H. B. McMahan, D. Ramage, and P. Richtárik, “Federated optimization: Distributed machine learning for on-device intelligence,” CoRR, vol. abs/1610.02527, 2016. [Online]. Available: http://arxiv.org/abs/1610.02527
  • [5] B. McMahan, E. Moore, D. Ramage et al., “Communication-efficient learning of deep networks from decentralized data,” in Proc. International Conference on Artificial Intelligence and Statistics.   PMLR, 2017, pp. 1273–1282.
  • [6] T. Li, A. K. Sahu, A. Talwalkar, and V. Smith, “Federated learning: Challenges, methods, and future directions,” IEEE Signal Process. Mag., vol. 37, no. 3, pp. 50–60, 2020.
  • [7] S. Samarakoon, M. Bennis, W. Saad, and M. Debbah, “Distributed federated learning for ultra-reliable low-latency vehicular communications,” IEEE Trans. Commun., vol. 68, no. 2, pp. 1146–1159, 2019.
  • [8] M. Chen, Z. Yang, W. Saad et al., “A joint learning and communications framework for federated learning over wireless networks,” IEEE Trans. Wireless Commun., vol. 20, no. 1, pp. 269–283, 2020.
  • [9] M. M. Amiri and D. Gündüz, “Federated learning over wireless fading channels,” IEEE Trans. Wireless Commun., vol. 19, no. 5, pp. 3546–3557, 2020.
  • [10] Z. Yang, M. Chen, W. Saad et al., “Energy efficient federated learning over wireless communication networks,” IEEE Trans. Wireless Commun., vol. 20, no. 3, pp. 1935–1949, March 2021.
  • [11] R. Hamdi, M. Chen, A. B. Said et al., “Federated learning over energy harvesting wireless networks,” IEEE Internet Things J., 2021.
  • [12] Z. Wang, Y. Zhou, Y. Shi, and W. Zhuang, “Interference management for over-the-air federated learning in multi-cell wireless networks,” IEEE J. Sel. Areas Commun., 2022.
  • [13] H. Chen, S. Huang, D. Zhang et al., “Federated learning over wireless IoT networks with optimized communication and resources,” IEEE Internet Things J., 2022.
  • [14] Q. Zeng, Y. Du, K. Huang, and K. K. Leung, “Energy-efficient radio resource allocation for federated edge learning,” in 2020 IEEE International Conference on Communications Workshops, 2020, pp. 1–6.
  • [15] S. Wang, T. Tuor, T. Salonidis et al., “Adaptive federated learning in resource constrained edge computing systems,” IEEE J. Sel. Areas Commun., vol. 37, no. 6, pp. 1205–1221, 2019.
  • [16] N. H. Tran, W. Bao, A. Zomaya et al., “Federated learning over wireless networks: Optimization model design and analysis,” in IEEE INFOCOM - IEEE Conference on Computer Communications, 2019, pp. 1387–1395.
  • [17] S. Hosseinalipour, S. S. Azam, C. G. Brinton et al., “Multi-stage hybrid federated learning over large-scale d2d-enabled fog networks,” IEEE/ACM Trans. Netw., pp. 1–16, 2022.
  • [18] L. U. Khan, W. Saad, Z. Han, and C. S. Hong, “Dispersed federated learning: Vision, taxonomy, and future directions,” IEEE Wireless Commun., vol. 28, no. 5, pp. 192–198, 2021.
  • [19] L. U. Khan, Y. K. Tun, M. Alsenwi et al., “A dispersed federated learning framework for 6G-enabled autonomous driving cars,” arXiv preprint arXiv:2105.09641, 2021.
  • [20] Z. Zhang, Z. Gao, Y. Guo, and Y. Gong, “Scalable and low-latency federated learning with cooperative mobile edge networking,” arXiv preprint arXiv:2205.13054, 2022.
  • [21] S. R. Pandey, M. N. H. Nguyen, T. N. Dang et al., “Edge-assisted democratized learning toward federated analytics,” IEEE Internet Things J., vol. 9, no. 1, pp. 572–588, 2022.
  • [22] M. Asad, A. Moustafa, F. A. Rabhi, and M. Aslam, “THF: 3-way hierarchical framework for efficient client selection and resource management in federated learning,” IEEE Internet of Things Journal, vol. 9, no. 13, pp. 11 085–11 097, 2022.
  • [23] M. Al-Rubaie and J. M. Chang, “Reconstruction attacks against mobile-based continuous authentication systems in the cloud,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 12, pp. 2648–2663, 2016.
  • [24] C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in Proc. Theory of Cryptography Conference.   Springer, 2006, pp. 265–284.
  • [25] C. Dwork and A. Roth, “The algorithmic foundations of differential privacy.” Foundations and Trends in Theoretical Computer Science, vol. 9, no. 3-4, pp. 211–407, 2014.
  • [26] R. Hu, Y. Guo, and Y. Gong, “Concentrated differentially private and utility preserving federated learning,” arXiv preprint arXiv:2003.13761, 2020.
  • [27] M. Wu, D. Ye, J. Ding et al., “Incentivizing differentially private federated learning: A multi-dimensional contract approach,” IEEE Internet Things J., 2021.
  • [28] P. Sun, H. Che, Z. Wang et al., “Pain-FL: Personalized privacy-preserving incentive for federated learning,” IEEE J. Sel. Areas Commun., vol. 39, no. 12, pp. 3805–3820, 2021.
  • [29] K. Wei, J. Li, M. Ding et al., “Federated learning with differential privacy: Algorithms and performance analysis,” IEEE Trans. Inf. Forensics Security, vol. 15, pp. 3454–3469, 2020.
  • [30] K. Wei, J. Li, C. Ma et al., “Low-latency federated learning over wireless channels with differential privacy,” IEEE J. Sel. Areas Commun., vol. 40, no. 1, pp. 290–307, 2022.
  • [31] M. S. E. Mohamed, W.-T. Chang, and R. Tandon, “Privacy amplification for federated learning via user sampling and wireless aggregation,” IEEE J. Sel. Areas Commun., vol. 39, no. 12, pp. 3821–3835, 2021.
  • [32] T. Liu, B. Di, and L. Song, “Privacy-preserving federated edge learning: Modelling and optimization,” IEEE Commun. Lett., 2022.
  • [33] S. Diamond and S. Boyd, “CVXPY: A Python-embedded modeling language for convex optimization,” Journal of Machine Learning Research, vol. 17, no. 83, pp. 1–5, 2016.
  • [34] A. Agrawal, R. Verschueren, S. Diamond, and S. Boyd, “A rewriting system for convex optimization problems,” Journal of Control and Decision, vol. 5, no. 1, pp. 42–60, 2018.
  • [35] M. Andersen, L. Vandenberghe, and J. Dahl, “CVXOPT: A python package for convex optimization,” URL https://cvxopt.org.
  • [36] A. Makhorin, “GNU linear programming kit (GLPK),” URL http://www.gnu.org/software/glpk/glpk.html.
  • [37] A. Domahidi, E. Chu, and S. Boyd, “ECOS: An SOCP solver for embedded systems,” in European Control Conference (ECC), 2013, pp. 3071–3076.
  • [38] M. Abadi, A. Agarwal, P. Barham et al., “TensorFlow: Large-scale machine learning on heterogeneous systems,” 2015. [Online]. Available: https://www.tensorflow.org/
  • [39] C. R. Harris, K. J. Millman, S. J. van der Walt et al., “Array programming with NumPy,” Nature, vol. 585, no. 7825, pp. 357–362, Sep. 2020.
  • [40] J. D. Hunter, “Matplotlib: A 2D graphics environment,” IEEE Computing in Science & Engineering, vol. 9, no. 3, pp. 90–95, 2007.
  • [41] M. Bun and T. Steinke, “Concentrated differential privacy: Simplifications, extensions, and lower bounds,” in Proc. Theory of Cryptography Conference.   Springer, 2016, pp. 635–658.
  • [42] Y. Nesterov, Introductory lectures on convex optimization: A basic course.   Springer Science & Business Media, 2003, vol. 87.
  • [43] M. Abadi, A. Chu, I. Goodfellow et al., “Deep learning with differential privacy,” in Proc. of the 2016 ACM SIGSAC Conference on Computer and Communications Security.   Association for Computing Machinery, 2016, p. 308–318.
  • [44] M. P. Friedlander and M. Schmidt, “Hybrid deterministic-stochastic methods for data fitting,” SIAM J. Sci. Comput., vol. 34, no. 3, pp. A1380–A1405, 2012.
  • [45] M. Moretti and A. Todini, “A resource allocator for the uplink of multi-cell OFDMA systems,” IEEE Trans. Wireless Commun., vol. 6, no. 8, pp. 2807–2812, 2007.
  • [46] J. Andersen, T. Rappaport, and S. Yoshida, “Propagation measurements and models for wireless communications channels,” IEEE Commun. Mag., vol. 33, no. 1, pp. 42–49, 1995.
  • [47] M. S. Bazaraa, H. D. Sherali, and C. M. Shetty, Nonlinear programming: theory and algorithms.   John Wiley & Sons, 2013.
  • [48] T. Li, A. K. Sahu, M. Zaheer et al., “Federated optimization in heterogeneous networks,” in Proc. of Machine Learning and Systems, vol. 2, 2020, pp. 429–450.
  • [49] Y. LeCun, “The MNIST database of handwritten digits,” URL http://yann.lecun.com/exdb/mnist/, 1998.