APFederated Machine Learning
APFederated Machine Learning
IEEE SA
Authored by
Qiang Yang
Lixin Fan
Richard Tong
Angelica Lv
Authorized licensed use limited to: IEEE Xplore. Downloaded on April 09,2024 at 09:28:55 UTC from IEEE Xplore. Restrictions apply.
TRADEMARKS AND DISCLAIMERS
IEEE believes the information in this publication is accurate as of its publication date; such information is subject to change
without notice. IEEE is not responsible for any inadvertent errors.
The ideas and proposals in this specification are the respective author’s views and do not represent the views of the affiliated
organization.
The Institute of Electrical and Electronics Engineers, Inc. 3 Park Avenue, New York, NY 10016‐5997, USA
All rights reserved. June 2021. Printed in the United States of America.
IEEE is a registered trademark in the U. S. Patent & Trademark Office, owned by The Institute of Electrical and Electronics Engineers,
Incorporated. All other trademarks are the property of the respective trademark owners.
IEEE prohibits discrimination, harassment, and bullying. For more information, visit http://www.ieee.org/web/aboutus/whatis/policies/p9‐
26.html.
No part of this publication may be reproduced in any form, in an electronic retrieval system, or otherwise, without the prior written
permission of the publisher.
Although the IEEE P3652.1 members who have created this Work believe that the information and guidance given in this Work
serve as an enhancement to users, all persons must rely upon their own skill and judgment when making use of it. IN NO EVENT
SHALL IEEE-SA OR ICAP MEMBERS BE LIABLE FOR ANY ERRORS OR OMISSIONS OR DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO: PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
OUT OF THE USE OF THIS WORK, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE AND REGARDLESS OF WHETHER
SUCH DAMAGE WAS FORESEEABLE.
Further, information contained in this Work may be protected by intellectual property rights held by third parties or
organizations, and the use of this information may require the user to negotiate with any such rights holders in order to legally
acquire the rights to do so, and such rights holders may refuse to grant such rights. Attention is also called to the possibility
that implementation of any or all of this Work may require use of subject matter covered by patent rights. By publication of
this Work, no position is taken by the IEEE with respect to the existence or validity of any patent rights in connection therewith.
The IEEE is not responsible for identifying patent rights for which a license may be required, or for conducting inquiries into
the legal validity or scope of patents claims. Users are expressly advised that determination of the validity of any patent rights,
and the risk of infringement of such rights, is entirely their own responsibility. No commitment to grant licenses under patent
rights on a reasonable or non-discriminatory basis has been sought or received from any rights holder.
This Work is published with the understanding that IEEE and the IEEE P3652.1 members are supplying information through this
Work, not attempting to render engineering or other professional services. If such services are required, the assistance of an
appropriate professional should be sought. IEEE is not responsible for the statements and opinions advanced in this Work.
4. REFERENCES...........................................................................................17
Authorized licensed use limited to: IEEE Xplore. Downloaded on April 09,2024 at 09:28:55 UTC from IEEE Xplore. Restrictions apply.
IEEE FEDERATED MACHINE LEARNING
WHITE PAPER
ABSTRACT
Data privacy and information security pose significant challenges to the big data and artificial intelligence
(AI) community as these communities are increasingly under pressure to adhere to regulatory
requirements, such as the European Union’s General Data Protection Regulation. Many routine
operations in big data applications, such as merging user data from various sources in order to build a
machine learning model, are considered to be illegal under current regulatory frameworks. The purpose
of federated machine learning is to provide a feasible solution that enables machine learning applications
to utilize the data in a distributed manner that does not exchange raw data directly and does not allow
any party to infer private information of other parties. This white paper intends to present an overview
of the Federated Machine Learning (FML) technology that can be used as a basis for standards,
certifications, laws, policies, and/or product ratings.
This white paper targets an educated audience, including lawmakers, corporate and governmental policy
makers, manufacturers, engineers, and standard setting bodies. However, this white paper is also easily
understood by non‐technical managers and policy makers as it provides system developers and
manufacturers with an overview of Federated Machine Learning techniques. Finally, one must give credit
to the IEEE Federated Machine Learning (P3652.1) working group participants for their tremendous
dedication, expertise and thoughtful collaborations, without which the publication of IEEE Std 3652.1‐
2020 [1] would not have been possible .
As a result, we face a dilemma that our data is in the form of isolated islands, but we are forbidden in many
situations to collect, fuse, and use the data from different places for AI processing. How to legally solve the
problem of data fragmentation and isolation is a major challenge for AI researchers and practitioners today.
Federated machine learning is a technological framework that allows a machine learning model to be collectively
constructed and used through data that is distributed across repositories owned by different organizations or
devices. While facilitating the building of federated machine learning models, this framework also aims to
preserve privacy, improve security, and meet regulatory requirements concerning data usage.
This white paper does not detail the technical content of the guide; rather, the white paper illustrates the need of
such a guide by showcasing a variety of use cases of the FML frameworks defined in the guide. By doing so, the
hope is that the white paper will provide readers with a brief overview of the technological landscape of FML as
well as underlying principles concerning the implementation of the FML framework in real-life applications.
FML, as a machine-learning framework, first concerns the performance of the learned models. It is expected that
any sound FML methods maintain performance that is very close to that of the model built when data from
multiple participants were put together in one location. Second, due to the distributed learning nature of FML,
the learning efficiency is of crucial importance for various FML methods. IEEE Std 3652.1-2020 [1] devotes a great
deal of attention on reducing both computational complexity and communication costs with efficient FML
methods. Third, for the sake of data security and privacy-preservation, the design, development, and
Depending on how the data are portioned between different participants, FML can be categorized as Horizontal
FML, Vertical FML, and Federated Transfer Learning (see Figure 1). Specifically, Horizontal FML refers to building
a model in the scenario where data sets have significant overlaps on the feature spaces but not on the ID spaces.
For example, Google proposed a horizontal federated learning solution for Android phone model updates
(McMahan, et al. [5]). In that framework, a single user using an Android phone updates the model parameters
locally and uploads the parameters to the Android cloud, thus jointly training the centralized model together with
other data owners. A secure aggregation scheme to protect the privacy of aggregated user updates under their
federated learning framework is also introduced (Bonawitz, et al. [6]).
Vertical FML refers to building a model in the scenario where data sets have significant overlaps on the sample
space, but not on the feature spaces. For example, consider two different companies in the same cityone is a
bank, and the other is an e-commerce company. Their user sets are likely to contain most of the residents of the
area, so the intersection of their user space is large. However, since the bank records the user’s revenue and
expenditure behavior and credit rating, and the e-commerce retains the user’s browsing and purchasing history,
their feature spaces are very different. Under this circumstance, one may apply Vertically Federated Learning,
which is the process of aggregating these different features and computing the training loss and gradients in a
privacy-preserving manner to build a model with data from both parties collaboratively.
Federated Transfer Learning (FTL) refers to the federated machine learning technique designed for application
scenarios where data sets have no significant overlap on neither the sample space nor the feature space. Consider
two institutionsone is a bank located in China, and the other is an e-commerce company located in the United
States. Due to geographical restrictions, the user groups of the two institutions have a small intersection. On the
other hand, due to the different businesses, only a small portion of the feature space from both parties overlaps.
In this case, transfer learning (Yang, et al. [7]) techniques can be applied to provide solutions for the entire sample
and feature space under a federation. Specifically, a common representation between the two-feature space is
learned using the limited common sample sets and later applied to obtain predictions for samples with only one-
sided features.
3.1. FINANCE
Finance or financial services is an important area that can be greatly improved with the use of AI and big data.
Traditionally financial companies or banks make business decisions based on their data such as information from
bank accounts, credit card use, and loan history, which might be insufficient to evaluate customers’ financial risks
because these data only present a small part of user behavior needed for risk modeling. In contrast, customers’
yearly income, real estate ownership, and shopping history may provide more valuable information, but these are
the private information of users that need to be protected. In financial application scenarios, regulatory
requirements and privacy concerns prevent banks and financial companies from sharing their data. The main risks
faced by financial institutions are overdue loans and fraudulent loans caused by user credit risk and even fraud.
Traditional financial institutions may only know users’ borrowing history and behavior locally, but they know little
about users’ interests, consumption tendencies, behavior, and other private information. To conduct modeling
without involving privacy leakage and improve the assessment of risks of loans, the traditional practice is to
provide each institution with a separate model and integrate all model’s results to get the evaluation result.
However, this modeling method often has low performance and the obtained result may not be accurate enough.
Federated machine learning can solve this problem by jointly modeling the users’ overall behavior across many
sectors and financial institutions, without compromising model performances. By adopting FML methods, each
data holder can exchange encryption parameters to jointly train a model and obtain more reliable evaluation
results when the data is retained locally. It can help financial institutions avoid risks more effectively.
3.2. TELECOMMUNICATIONS
Mobile devices equipped with neural network processing units exploit their strong computational power to train
NN models using data captured by a wide range of on-device sensors. With such on-device computational power
and data, mobile applications have significantly improved their usability and bring convenience to people’s lives.
3.3. HEALTHCARE
There are diverse health-related data such as trans-omics data, including genome, epigenome, transcriptome,
metabolome, proteome and metagenome, imaging data and phenotype data collected from wearable devices or
other channels, along with the environmental, socioeconomic and behavior data. However, health-related data,
especially patients’ data is highly sensitive and distributed in nature, thus collection and sharing of such data may
bring critical legal and ethical privacy concerns. For example, if insurers learn a patient’s health data and find out
he/she has severe or high medical cost diseases, they may refuse to provide insurance service. FML can overcome
those obstacles by providing a federated machine learning model across organizations while keeping sensitive
health data in the local environment. FML applications in the healthcare field may have different scenarios
including business-to-government (B2G), business-to-business (B2B), business-to-customer (B2C) or mixed
models. The most common FML scenario in healthcare is B2B, where there is a need for the collaborative building
of FML models among different hospitals, companies, research institutions, etc. Direct moving data between
hospitals may raise concerns about security, privacy, and availability of medical data. FML can address these
concerns and the horizontal FML model should achieve better performance than the models trained with single
institutional data. As an example, with horizontal FML, in genetic studies, the comprehensive analysis of genes
helps to discover the hidden patterns between genotype and phenotype and benefits diagnostic and treatment
development of diseases such as cancers. Currently, samples collected from a single institution is insufficient to
cover all the mutations in BRCA1/2, while FML provides a feasible and secured way of training an FML model
predicting the risk of breast and ovarian cancer.
3.4. EDUCATION
Uses of machine learning in education and training applications range from standard data mining for the purpose
of domain specific student assessment (such as language skill diagnosis), personalized learning, teacher’s aids,
human knowledge discovery and representation, etc. The educational AI employs a variety of traditional machine
a) The protection of personally identifiable data, which is regulated in general, but even more highly
regulated in the educational arena, especially when children are involved.
b) The interoperable exchange and sharing of the models generated by machine learning driven learning
management systems, such as adaptive instructional system (AIS), many of which are expressed in terms
of knowledge, skills, abilities, attitudes, and other characteristics and include learner models, domain
models, pedagogical models, adaptive models and interface models.
c) The ethical practice of AI, which includes verifying that the models generated are not applied in
unwarranted or unwanted ways and are either not biased or transparent about their biases.
1) Constructing learner models with data from multiple learning systems: In this use case, multiple learning
systems produce data about learners, some of whom use more than one system, but the systems are
prohibited from sharing data and the identity of learners. Each system applies its own machine learning
to estimate mastery, or to make predictions or estimate the effect of a particular activity as a function of
the aggregation of learner states. These estimates are exchanged among multiple learning systems and
a larger model is constructed using federated machine learning to improve the accuracy of each system
and, if appropriate, the recommendations it makes.
2) Using FML to aggregate and combine learner interaction data related to domain models: This enables
machine learning driven content analysis, ontological construction content generation, and content
quality improvement for adaptive instructional system authoring.
3) Using FML for improving pedagogical strategies: Pedagogical strategies are represented in AIS in many
ways. A common way is as a set of rules, which may be an event-condition-action table, a sequence of
speech or dialog acts, rules based on instructional design theories, or branching and remediation rules
based on estimates of the learner’s current state. In existing AIS, these action rules are almost
3.8. MARKETING
The development of a smart marketing strategy is usually achieved by mathematically modeling over big data sets.
Conventionally, the data sets used for modeling are the collected fundamental profiles and historical behaviors of
the advertiser’s existing clients. These data sets often cover different dimensions based on the category of the
subareas in which the advertisers serve. Any individual site may only have limited descriptive capability to produce
The introduction of FML, especially vertical FML across different organizations that complement each other in
data dimensions, conducts virtual model aggregation without risk of privacy breaching when making decisions. A
wide range of features and samples achieved by FML help enrich useful patterns that can be extracted for training
a machine learning model and thereby significantly improve the marketing model performance. Cooperating with
client's social behavior data collected from social media companies via FML, for example, credit rating companies
have the capability to identify clients with potentially high default rates, which can only be computed by
collectively checking on multiple financial organizations.
As AI applications are getting increasingly popular on mobile devices, the application developers are no longer
satisfied with AI models being trained with opened datasets. They also wish to collect information from users to
optimize their models for improving model performance and user experience. However, collecting personal data
The following list of sources either has been referenced within this paper or may be useful for additional reading:
[1] IEEE Std 3652.1-2020, IEEE Guide for Architectural Framework and Application of Federated Machine Learning,
2020. https://standards.ieee.org/standard/3652_1-2020.html
[2] Jakub Konecný, H. Brendan McMahan, Daniel Ramage, and Peter Richtárik. 2016a. Federated Optimization:
Distributed Machine Learning for On-Device Intelligence. CoRR abs/1610.02527 (2016).
[3] Peter Kairouz, et al., Advances and Open Problems in Federated Learning, Foundations and Trends in Machine
Learning Vol 4 Issue 1. http://dx.doi.org/10.1561/2200000083. 2021.
[4] Qiang Yang, Yang Liu, Yong Cheng, Yan Kang, Tianjian Chen, Han Yu. Federated Learning. ISBN:
9781681736976, https://doi.org/10.2200/S00960ED2V01Y201910AIM043. Morgan & Claypool Publishers,
Dec 2019.
[5] H. Brendan McMahan, et al. Federated Learning of Deep Networks using Model Averaging. CoRR
abs/1602.05629 (2016). arXiv:1602.05629, 2016.
[6] Keith Bonawitz, et al. Practical Secure Aggregation for Privacy-Preserving Machine Learning. In Proceedings of
the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS ’17). ACM, New York, NY,
USA, 1175–1191. 2017.
[7] Qiang Yang, Yu Zhang, Wenyuan Dai and Sinno Jilin Pan, Transfer Learning. ISBN: 9781139061773. DOI:
https://doi.org/10.1017/9781139061773. Cambridge University Press. Jan. 2020.
Tel.+1732-981-0060 Fax+1732-562-1571
Authorized licensed use limited to: IEEE Xplore. Downloaded on April 09,2024 at 09:28:55 UTC from IEEE Xplore. Restrictions apply.