Skip to main content

Federated Learning


Federated learning is a type of machine learning in which the process in executed in the user devices instead sending the user data to the server.
As we know how google takes user data which increase the privacy issues but we know that they take data for making our user experience better through machine learning that’s why they take our data which they store in their data center. To eliminate the sending the data packet to the server. Google introduced a new concept called federated learning.

Federated learning enables multiple actors to build a common. Robust machine learning model without sharing data, thus addressing critical issues such as data privacy, data security, data access right and access to heterogeneous data.

How the federated learning works?
There are mainly three steps:
1.      Request.
2.      Response.
3.      Report.



1.Firstly, the device sends a request to the server for the related data required for the process to be conducted.
2.Server responds to the request and send the confirmation data and the algorithm which is required to process the user data into report.
3.Training part is done on the devices and after the training is completed report is send to the server which is then use to machine learning.

But still federated learning is not perfect it has many problem or challenges.
1. One of the challenges is communication bandwidth. Federated learning on mobile phones relies on wireless communication to collaboratively learn a machine learning model. Although compute resources of mobile phones are becoming increasingly powerful, the bandwidth of wireless communication has not increased as much. As such, the bottleneck is shifted from computation to communication. As a consequence, limited communication bandwidth could incur long communication latency, and thus could significantly slow down the convergence time of the federated learning process.
2. Another challenge that federated learning needs to address is the reliability of end devices which participate in the federated learning process. Federated learning is an iterative process, it relies on the participating end devices to continuously communicate over iterations until the learning process converges. However, in real-world deployments, due to various practical reasons, not all end devices may fully participate in the complete iterative process from beginning to end.


Comments

Popular posts from this blog

Hustle

The innate hunger to build,create,do something & try. Hustle isn't just working on the things you like,it means doing the things you don't enjoy so you can do the things you love. Hustle:The ability to make things happen in light of knowing,how to get there ,but operate with the general principle that action breed results. Hustle stands for: H - How U - U  S -  Survive T -  The L - life  E - Everyday Some days I'm Humble. Some days I  Struggle. But everyday I Hustle. Remember Every Boss started as a worker.

Authentication Authorization Accounting(week 3)

Identification is the idea of describing an entity uniquely. Biometric authentication is the process of using unique physiological characteristics of an individual to identify them. C.R.L(Certificate revocation list) :This is a signed list published by the CA which defines certificates that have been explicitly revoked. Lightweight Directory Access Protocol(LDAP): LDAP is an open industry-standard protocol for accessing and maintaining directory services. Authentication is related to verifying the identity a user, authorization pertains to describing what the user account has access to or doesn't have access to. An access control list or ACL , is a way of defining permissions or authorizations for objects.  RADIUS or Remote Authentication Dial-In User Service , is a protocol that provides AAA services for users on a network.It's a very common protocol used to manage access to internal networks, WiFi networks, email services and VPN services. when a client wants to access a r...

Secure Network(Week 4)

Network hardening is the process of securing a network by reducing its potential vulnerabilities through configuration changes and taking specific steps.   Implicit deny is a network security concept where anything not explicitly permitted or allowed should be denied. Analyzing logs is the practice of collecting logs from different networks and sometimes client devices on your network, then performing an automated analysis on them. Correlation analysis is the process of taking log data from different systems and matching events across the systems. Flood guards provide protection against Dos or denial of service attacks. EAP-TLS is an authentication type supported by EAP that uses TLS to provide mutual authentication of both the client and the authenticating server.   if you really want to lock down your network, you can implement 802.1x . DHCP Snooping Attack Why WEP Encryption fall apart? A general concept in security and encryption is to never send the plain ...