Blockchain-Based Federated Learning With Secure Aggregation in Trusted Execution Environment For Internet-of-Things
Blockchain-Based Federated Learning With Secure Aggregation in Trusted Execution Environment For Internet-of-Things
Abstract—This article proposes a blockchain-based fed- care, manufacturing, critical system infrastructure, agriculture,
erated learning (FL) framework with Intel Software Guard and transportation. IoT devices enable the collection of a large
Extension (SGX)-based trusted execution environment volume of data and act autonomously in an intelligent system,
(TEE) to securely aggregate local models in Industrial
Internet-of-Things (IIoTs). In FL, local models can be tam- thanks to machine learning algorithms. The large volume of IoT
pered with by attackers. Hence, a global model generated data plays an essential role in training a machine learning algo-
from the tampered local models can be erroneous. There- rithm system. In general, IoT devices are resource-constrained
fore, the proposed framework leverages a blockchain net- and cannot execute machine learning algorithms independently.
work for secure model aggregation. Each blockchain node Edge computing technology is gaining acceptance at a tremen-
hosts an SGX-enabled processor that securely performs
the FL-based aggregation tasks to generate a global model. dous rate to form intelligent networks in conjunction with IoT
Blockchain nodes can verify the authenticity of the aggre- and machine learning. An edge device (referred to as an edge
gated model, run a blockchain consensus mechanism to server throughout the article) and IoT devices within the network
ensure the integrity of the model, and add it to the dis- form a cluster. In an intelligent system, edge devices can host a
tributed ledger for tamper-proof storage. Each cluster can machine learning algorithm that uses a locallybuilt dataset and
obtain the aggregated model from the blockchain and verify
its integrity before using it. We conducted several experi- produce a trained model. IoT devices generate data and receive
ments with different CNN models and datasets to evaluate control instructions depending on the type of IoT device. Later,
the performance of the proposed framework. the trained model can be used to make an intelligent decision in
Index Terms—Blockchain, deep learning, federated
the system.
learning (FL), Intel Software Guard Extension (SGX), Although an edge and IoT-based system configuration with
Internet-of-Things (IoT), secure aggregation, trusted execu- machine learning capability can manage different system tasks
tion environment (TEE). automatically, the level of accuracy impedes its success. For
example, a trained model produced by an edge server with local
data might not consider many features that could be absent in the
I. INTRODUCTION
local dataset. The accuracy can be improved if the edge device
HE Internet-of-Things (IoT) explosion has made it an
T integral component of various intelligent applications.
Intelligent applications include but are not limited to health
can collaborate with other edge servers that have produced their
trained model based on their local datasets. This learning method
is called distributed collaborative machine learning [1]. Tradi-
tional distributed collaborative machine learning (see Fig. 1)
allows different clusters to send their locally trained model and
Manuscript received 10 January 2022; revised 8 February 2022 and
27 March 2022; accepted 12 April 2022. Date of publication 26 April datasets to a centralized server, such as the cloud. Cloud ag-
2022; date of current version 13 December 2022. This work was sup- gregates all locally trained models using datasets from different
ported by the Australian Research Council Discovery Project under sources and produces an aggregated trained model shared with
Grant DP210102761. Paper no. TII-22-0156. (Corresponding author:
Mohammad Saidur Rahman.) all clusters to improve decision-making accuracy.
Aditya Pribadi Kalapaaking, Ibrahim Khalil, Mohammad Saidur Rah- Distributed collaborative learning suffers from two significant
man, and Xun Yi are with the School of Computing Technolo- issues: privacy and trust [2]. A new form of distributed col-
gies, RMIT University, Melbourne, VIC 3000, Australia (e-mail: aditya.
[email protected]; [email protected]; laborative learning, called federated learning (FL) [3], enables
[email protected]; [email protected]). different clusters to build a trained model with their local data,
Mohammed Atiquzzaman is with the School of Computer Science, called a local model, and to share only the local model with
University of Oklahoma, Norman, OK 73019 USA (e-mail: [email protected]).
Mahathir Almashor is with the CSIRO’s Data61 and Cyber Security other participants for the purpose of aggregation. The aggregated
Cooperative Research Centre, Marsfield, NSW 2122, Australia (e-mail: model is known as a global model. Data privacy is ensured
[email protected]). because the global model is generated without the data being
Color versions of one or more figures in this article are available at
https://doi.org/10.1109/TII.2022.3170348. shared with other participants. Nevertheless, the global model
Digital Object Identifier 10.1109/TII.2022.3170348 cannot be fully trusted as internal or external attackers can
1551-3203 © 2022 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: The University of British Columbia Library. Downloaded on June 06,2023 at 19:00:25 UTC from IEEE Xplore. Restrictions apply.
1704 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 19, NO. 2, FEBRUARY 2023
Fig. 1. Traditional collaborative learning application scenario. 2) We propose the hosting of an SGX processor by a
blockchain node that is responsible for the FL model
aggregation task.
launch several security attacks during the model aggregation
3) A blockchain-powered trustworthy aggregated model
and the dissemination of the global model. Hence, a trustworthy
storage and sharing model is proposed for FL-based
framework is required to ensure the privacy of sensitive data and
learning in IoT applications.
the trustworthiness of the generated global model. Moreover, the
receiver of the global model (e.g., edge server) should verify the
integrity of the global model before using it. B. Organization
The rest of this article is organized as follows. Section II de-
A. Contributions scribe the problem scenario in collaborative learning. Section III
discuss some of the closely related work. The proposed frame-
In this article, we propose a complete framework for FL that
work is described in Section IV. Section V presents the experi-
simultaneously safeguards the privacy of IoT data and ensures
mental results and evaluates various performance aspects of the
security during the generation of aggregated trained models. In
proposed framework. Finally, Section VI concludes this article.
addition, the proposed framework guarantees trustworthy stor-
age and sharing of the outcomes of any training. The proposed
II. PROBLEM SCENARIO
framework comprises a convolutional neural FL architecture
that combines an Intel Software Guard Extension (SGX)-based To demonstrate and discuss the problem that exists with tra-
trusted execution environment (TEE) and blockchain platform. ditional collaborative machine learning, we use an IoT-enabled
We assume that multiple IoT and edge devices clusters produce smart warehouse scenario (see Fig. 2). Assume that several
locally trained models based on their local dataset and send smart warehouses are geographically dispersed. Each warehouse
the local model to the blockchain network for aggregation. In receives multiple prepacked boxes of various garments (for both
this framework, each blockchain node hosts an SGX-enabled men and women), including shirts, trousers, shoes, jackets, and
processor that individually performs the FL-based aggregation bags for storage. Each warehouse uses machine learning and an
tasks to generate an aggregated model. Once SGX-enabled IoT-enabled camera to automatically sort the boxes according
processors of blockchain nodes perform the aggregation, each to the type of garment they contain. The camera scans the
node can verify the authenticity of the aggregated model, run a generic photo of the garment, which is shown on the box.
blockchain consensus mechanism to ensure the integrity of the However, IoT-enabled cameras are resourced-constrained and
model, and add it to a blockchain for tamper-proof storage. An cannot execute the machine learning algorithm. Hence, each
edge server from each cluster can collect the latest aggregated warehouse is equipped with an edge server with access to the
model from the blockchain and verify its integrity before using local dataset and hosts the machine learning algorithm to train a
it. The key contributions of our work are summarized below. model for recognizing garment items based on the local dataset.
1) The proposed framework introduces a new FL architec- Nevertheless, the accuracy of a training model derived from
ture for IoT to ensure secure generation of the aggregated the local dataset may not be good. Therefore, the edge server
model using Intel SGX-powered TEE. of each warehouse participates in a cloud-based collaborative
Authorized licensed use limited to: The University of British Columbia Library. Downloaded on June 06,2023 at 19:00:25 UTC from IEEE Xplore. Restrictions apply.
KALAPAAKING et al.: BLOCKCHAIN-BASED FEDERATED LEARNING WITH SECURE AGGREGATION 1705
machine learning platform to share its local dataset and the that a backdoor can compromise the FL and poison the machine
trained model. The cloud-based collaborative machine learning learning model. Our framework will create a secure end-to-end
platform produces an aggregated model based on the received FL process to overcome this problem by securing the machine
local datasets and models. The aggregated model is sent to learning model and the aggregation process.
all edge servers to achieve higher accuracy in recognizing the TEE-based machine learning: Recently, TEE has gained
garment items. popularity in the field of privacy-preserving machine learning.
Although the aforementioned collaborative learning scenario Ohrimenko et al. [11] investigated centralized machine learning
improves overall accuracy, it suffers from the following security processes in an SGX-enabled data center to improve data privacy
risks. and avoid data leaks. In his framework, the server requests the
1) Risks of data privacy: Sending local datasets to the cloud dataset from all the participants and computes it in a centralized
introduces the risk of a privacy breach. For example, a server. Tramer et al. [12] and Juvekar et al. [13] proposed a
dishonest employee from the cloud service provider can secure inference process inside of the TEE. Hynes et al. [14]
act as an internal attacker and collect the warehouse’s and Hunt et al. [15] demonstrated centralized privacy-preserving
sensitive product information and share it with a business machine learning by running all the CNN processes inside the
competitor for financial gain. Hence, there is the need for enclave.
an aggregation model that would not require local datasets The available frameworks use a single deep learning model,
to generate an aggregated model. and none of them performs within the FL setup. The current
2) Risks of generating biased aggregated trained model: The work also shows that the time cost is significantly increased
aggregated model produced by a cloud service provider when the training process is performed in the TEE. Hence, we
can be biased, as a cloud-based platform cannot be trusted. run the aggregation process inside the enclave to maximize the
For instance, an internal attacker can generate a biased performance and reduce time consumption.
aggregated model not using the given local models or Blockchain-based FL: Blockchain was first launched as a
inject a faulty trained model to interrupt the generation cryptocurrency technology. However, it has now been expanded
of aggregated models. Therefore, a secure environment is for data storage across multiple computational nodes in a dis-
required to prevent biased model generation. tributed fashion. Blockchain is structured as a linked list of
3) Risks of receiving alteration or faulty aggregated trained blocks holding a set of transactions. Ali et al. [16] proposed a
model: In the traditional cloud-based collaborative learn- method to ensure the privacy and security of health care systems
ing environment, an internal attacker of the cloud platform using blockchain. Their approach focuses mainly on securing
can interfere with disseminating the aggregated model. patient data from active collision attacks by leveraging novel
For example, an attacker can alter some part of the aggre- smart contracts and encryption algorithms. Nowadays, many
gated model before the cloud sends it to the edge servers. studies are incorporating blockchain into their FL methodologies
The traditional method does not allow a receiver of the because FL is based on a centralized server, which is vulnerable
aggregated model (i.e., edge server) to verify its integrity to attack. Zhao et al. [17] designed a system where each of the
before using it. Hence, a trustworthy platform is required clients will sign the model after the training process and send
for sharing the aggregated model with edge servers. it to the blockchain. However, if this model has many clients,
the computation cost will be very high. In recent works, Qu et
al. [18], Lu et al. [19], and Feng et al. [20] proposed a framework
III. RELATED WORK where the model is stored in the blockchain node, and FL is per-
This section discusses several studies that are closely related formed. However, in their architecture, the model is not totally
to our work. encrypted. Also, the aggregation is performed by an untrusted
Privacy-preserving FL: Several works on privacy-preserving party. Kim et al. [21] proposed a method where they deploy
federated learning have been presented recently. Yin et al. [4] the blockchain on the edge devices. The disadvantage of this
and Liu et al. [5] proposed an FL framework where the training method is that the edge devices will require a lot of computation
is performed on each node and only the model is sent to the power. Kumar et al. [22] proposed a blockchain architecture to
central server to perform the model aggregation. Wei et al. [6] collect the locally trained model weights collaboratively from
and Zhao et al. [7] proposed a framework where data privacy different sources for health care scenarios. However, the local
is improved by means of differential privacy (DP). However, model that is stored in the blockchain is not protected by any
the use of DP will slow down the training process and reduce privacy measure. In this case, other parties can see the model,
accuracy. In [8] the author proposed anonymous FL by adding thereby raising privacy issues.
a proxy layer and DP to the data. However, the proxy layer will Samuel et al. [23] proposed blockchain-based FL for health
add communication overhead, and the result shows that the DP care system. Their proposed framework protects the local model
decreases the ML accuracy. Li et al. [9] leveraged SMPC-based training with DP. The central server aggregates the global model
FL to secure aggregation. Hence, their framework relies on a and stores it in the blockchain. However, the global model
centralized server to arrange the secret sharing. This could be accuracy is lower than the locally trained model. The use of
a problem since all the models can be seen in plaintext after DP in this framework can preserve privacy while sacrificing
the cloud collects the secret share. FL is delicate to an attacker accuracy. Alsamhi et al. [24] and Otoum et al. [25] proposed
that can launch backdoor attacks. Bagdasaryan et al. [10] found an edge intelligence over smart environments with the support
Authorized licensed use limited to: The University of British Columbia Library. Downloaded on June 06,2023 at 19:00:25 UTC from IEEE Xplore. Restrictions apply.
1706 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 19, NO. 2, FEBRUARY 2023
TABLE I TABLE II
SUMMARY OF RELATED WORKS NOTATIONS
Authorized licensed use limited to: The University of British Columbia Library. Downloaded on June 06,2023 at 19:00:25 UTC from IEEE Xplore. Restrictions apply.
KALAPAAKING et al.: BLOCKCHAIN-BASED FEDERATED LEARNING WITH SECURE AGGREGATION 1707
Authorized licensed use limited to: The University of British Columbia Library. Downloaded on June 06,2023 at 19:00:25 UTC from IEEE Xplore. Restrictions apply.
1708 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 19, NO. 2, FEBRUARY 2023
r+1
where MGi denotes the updated global model, n is a number
of clients on the FL round r, |Di | is the number of data items
r+1
(images) owned by Ei to train local model MLi , and N the
total number of data used to train all of the local models. MG is
r+1
final updated global model MGi .
Third, Si generates a remote attestation, called report Ri =
Sign(MGi , AKi ). Here, Sign(., AKi ) is a signature function
and AKi is the attestation key of Si . The generated report
enables a verifier (i.e., blockchain node) to verify the MGi . The
pseudocode of the overall aggregation and remote attestation
is illustrated in Algorithm 1. The algorithm takes encrypted
trained models as input and outputs aggregated global models,
and its remote attestation report All tasks of Algorithm 1 are Fig. 6. Blockchain-based global model storage.
executed under a running enclave of the SGX. SGX uses a
quoting enclave to verify reports produced by the application
enclave and signs as a quote. The quoting enclave is used to
all remote attestations are verified, and the majority hashes of
determine the trustworthiness of the platform. Later, the quote
corresponding models are the same, the blockchain nodes in the
is sent to another party for verification. In our scenario, each
blockchain network add the global model MG as a block in the
Bi will have one Si and works as an aggregator and verifier
blockchain. Also, the global model is sent to all edge servers as
of attestation reports. Fig. 5 shows the details of the quoting
the update operation FL. An overview of this step is given in
enclave process.
Fig. 6.
1) Verifying Attestation Reports by a Blockchain Node:
D. Blockchain-Based Tamperproof Global Model Assume that each blockchain node is equipped with a quoting
Storage and Distribution
enclave and has an attestation key AKj to sign a remote
In this phase, the blockchain network receives all remote attestation report Ri produced by Si . Ri is signed with Akj to
attestations produced by SGX enclaves and runs a consensus generate a quote Qi . A quote contains the identity of the attesting
mechanism. The consensus mechanism verifies the remote at- enclave Si , execution mode details (e.g., security version
testations of a global model produced by the SGX enclaves. If number level Si ), and additional metadata. The function that is
Authorized licensed use limited to: The University of British Columbia Library. Downloaded on June 06,2023 at 19:00:25 UTC from IEEE Xplore. Restrictions apply.
KALAPAAKING et al.: BLOCKCHAIN-BASED FEDERATED LEARNING WITH SECURE AGGREGATION 1709
Authorized licensed use limited to: The University of British Columbia Library. Downloaded on June 06,2023 at 19:00:25 UTC from IEEE Xplore. Restrictions apply.
1710 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 19, NO. 2, FEBRUARY 2023
Authorized licensed use limited to: The University of British Columbia Library. Downloaded on June 06,2023 at 19:00:25 UTC from IEEE Xplore. Restrictions apply.
KALAPAAKING et al.: BLOCKCHAIN-BASED FEDERATED LEARNING WITH SECURE AGGREGATION 1711
TABLE IV
COMPARISON OF MACHINE LEARNING MODEL ACCURACY IN FEDERATED
LEARNING PROCESS WHEN USING NORMAL CPU AND SGX
Authorized licensed use limited to: The University of British Columbia Library. Downloaded on June 06,2023 at 19:00:25 UTC from IEEE Xplore. Restrictions apply.
1712 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 19, NO. 2, FEBRUARY 2023
[10] E. Bagdasaryan, A. Veit, Y. Hua, D. Estrin, and V. Shmatikov, “How to [36] A. Krizhevsky and G. Hinton, “Convolutional deep belief networks on
backdoor federated learning,” in Proc. Int. Conf. Artif. Intell. Statist., 2020, CIFAR-10,” Unpublished Manuscript, vol. 40, no. 7, pp. 1–9, 2010.
pp. 2938–2948. [37] L. Deng, “The MNIST database of handwritten digit images for machine
[11] O. Ohrimenko et al., “Oblivious multi-party machine learning on trusted learning research [Best of the Web],” IEEE Signal Process. Mag., vol. 29,
processors,” in Proc. 25th {USENIX} Secur. Symp., 2016, pp. 619–636. no. 6, pp. 141–142, Nov. 2012.
[12] F. Tramer and D. Boneh, “Slalom: Fast, verifiable and private execution of [38] C. Szegedy, S. Ioffe, V. Vanhoucke, and A. A. Alemi, “Inception-v4,
neural networks in trusted hardware,” in Int. Conf. Learn. Representations, inception-resnet and the impact of residual connections on learning,” in
2019. Proc. 31st AAAI Conf. Artif. Intell., 2017, pp. 4278–4284.
[13] C. Juvekar, V. Vaikuntanathan, and A. Chandrakasan, “{GAZELLE}: A [39] M. Fredrikson, S. Jha, and T. Ristenpart, “Model inversion attacks that
low latency framework for secure neural network inference,” in Proc. 27th exploit confidence information and basic countermeasures,” in Proc. 22nd
{USENIX} Secur. Symp., 2018, pp. 1651–1669. ACM SIGSAC Conf. Comput. Commun. Secur., 2015, pp. 1322–1333.
[14] N. Hynes, R. Cheng, and D. Song, “Efficient deep learning on multi-source [40] B. Wang and N. Z. Gong, “Stealing hyperparameters in machine learning,”
private data,” 2018, arXiv:1807.06689. in Proc. IEEE Symp. Secur. Privacy, 2018, pp. 36–52.
[15] T. Hunt, C. Song, R. Shokri, V. Shmatikov, and E. Witchel, [41] M. S. Rahman, I. Khalil, and M. Atiquzzaman, “Blockchain-powered
“Chiron: Privacy-preserving machine learning as a service,” 2018, policy enforcement for ensuring flight compliance in drone-based service
arXiv:1803.05961. systems,” IEEE Netw., vol. 35, no. 1, pp. 116–123, Jan./Feb. 2021.
[16] A. Ali et al., “Security, Privacy, and reliability in digital healthcare systems [42] S. H. Alsamhi, O. Ma, M. S. Ansari, and F. A. Almalki, “Survey on
using blockchain,” Electronics, vol. 10, no. 16, 2021, Art. no. 2034. collaborative smart drones and Internet of Things for improving smartness
[17] Y. Zhao et al., “Privacy-preserving blockchain-based federated learning of smart cities,” IEEE Access, vol. 7, pp. 128125–128152, 2019.
for IoT devices,” IEEE Internet Things J., vol. 8, no. 3, pp. 1817–1829, [43] M. S. Rahman, I. Khalil, and M. Atiquzzaman, “Blockchain-enabled SLA
Feb. 2021. compliance for crowdsourced edge-based network function virtualiza-
[18] Y. Qu, S. R. Pokhrel, S. Garg, L. Gao, and Y. Xiang, “A blockchained tion,” IEEE Netw., vol. 35, no. 5, pp. 58–65, Sep./Oct. 2021.
federated learning framework for cognitive computing in Industry 4.0
networks,” IEEE Trans. Ind. Inform., vol. 17, no. 4, pp. 2964–2973,
Apr. 2021.
[19] Y. Lu, X. Huang, K. Zhang, S. Maharjan, and Y. Zhang, “Communication- Aditya Pribadi Kalapaaking received the
efficient federated learning and permissioned blockchain for digital twin bachelor’s degree in computer science (Hons.)
edge networks,” IEEE Internet Things J., vol. 8, no. 4, pp. 2276–2288, in 2020 from RMIT University, Melbourne,
Feb. 2021. Australia, where he.is currently working toward
[20] L. Feng, Y. Zhao, S. Guo, X. Qiu, W. Li, and P. Yu, “Blockchain-based the Ph.D. degree in computer science with the
asynchronous federated learning for Internet of Things,” IEEE Trans. School of Computing Technologies.
Comput., vol. 71, no. 5, pp. 1092–1103, May 2022. His research interests include machine learn-
[21] H. Kim, J. Park, M. Bennis, and S.-L. Kim, “Blockchained on-device ing, privacy-preserving techniques, cybersecu-
federated learning,” IEEE Commun. Lett., vol. 24, no. 6, pp. 1279–1283, rity, edge computing, distributed system, and
Jun. 2020. blockchain.
[22] R. Kumar et al., “Blockchain-federated-learning and deep learning models
for COVID-19 detection using CT imaging,” IEEE Sensors J., vol. 21,
no. 14, pp. 16301–16314, Jul. 2021.
[23] O. Samuel et al., “IoMT: A COVID-19 healthcare system driven by
federated learning and blockchain,” IEEE J. Biomed. Health Inform., to Ibrahim Khalil received the Ph.D. degree in
be published, doi: 10.1109/JBHI.2022.3143576. computer science from the University of Berne,
[24] S. H. Alsamhi et al., “Drones’ edge intelligence over smart environments Berne, Switzerland, in 2003.
in B5G: Blockchain and federated learning synergy,” IEEE Trans. Green He is currently a Professor with the School of
Commun. Netw., vol. 6, no. 1, pp. 295–312, Mar. 2022. Computing Technologies, RMIT University, Mel-
[25] S. Otoum, I. A. Ridhawi, and H. Mouftah, “A federated learning bourne, VIC, Australia. He has several years
and blockchain-enabled sustainable energy-trade at the edge: A frame- of experience in Silicon Valley, California-based
work for industry 4.0,” IEEE Internet Things J., to be published, networking companies, as a Software Engineer
doi: 10.1109/JIOT.2022.3140430. working on secure network protocols and smart
[26] Y. Qu et al., “Decentralized privacy using blockchain-enabled federated network provisioning. He was also with EPFL
learning in fog computing,” IEEE Internet Things J., vol. 7, no. 6, and the University of Berne and Osaka Uni-
pp. 5171–5183, Jun. 2020. versity, Osaka, Japan, before joining RMIT University. In the past, he
[27] B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, also worked on distributed systems, e-health, wireless and body sensor
“Communication-efficient learning of deep networks from decentralized networks, biomedical signal processing, network security. His research
data,” in Proc. Artif. Intell. Statist., 2017, pp. 1273–1282. interests include privacy, blockchain, secure AI, and data analytics.
[28] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet classification Dr. Ibrahim is the Chief Investigators of a few prestigious ARC discov-
with deep convolutional neural networks,” Commun. ACM, vol. 60, no. 6, ery and linkage grants on blockchain and privacy awarded in Australia
pp. 84–90, 2017. between 2017 and 2021. He was the recipient of international European
[29] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learn- grants, industry grants, and QNRF grant from Qatar.
ing applied to document recognition,” Proc. IEEE, vol. 86, no. 11,
pp. 2278–2324, Nov. 1998.
[30] K. Simonyan and A. Zisserman, “Very deep convolutional networks for
large-scale image recognition,” in Proc. 3rd Int. Conf. Learn. Representa-
tions, Y. Bengio and Y. LeCun, Eds., San Diego, CA, USA, 2015. Mohammad Saidur Rahman received the
[31] V. Costan and S. Devadas, “Intel SGX Explained,” IACR Cryptology ePrint B.Sc. degree in computer engineering and the
Arch., vol. 2016, no. 86, pp. 1–118, 2016. M.Sc. degree in computer science from the
[32] A. Paszke et al., “Pytorch: An imperative style, high-performance deep American International University-Bangladesh
learning library,” Adv. Neural Inf. Process. Syst., vol. 32, pp. 8026–8037, (AIUB) of Dhaka, Dhaka, Bangladesh, in 2007
2019. and 2009, respectively, and the Ph.D. degree in
[33] A. Ziller et al., “PySyft: A library for easy federated learning,” in Federated computer science from the School of Science,
Learning Systems. Berlin, Germany: Springer, 2021, pp. 111–139. RMIT University, Melbourne, VIC, Australia, in
[34] C.-C. Tsai, D. E. Porter, and M. Vij, “Graphene-SGX: A practical library 2020.
{OS } for unmodified applications on {SGX},” in Proc. {USENIX} Annu. He is currently a Research Associate with the
Tech. Conf., 2017, pp. 645–658. School of Computing Technologies, RMIT Uni-
[35] H. Xiao, K. Rasul, and R. Vollgraf, “Fashion-MNIST: A novel im- versity. He was a Faculty Member with AIUB before starting his Ph.D.
age dataset for benchmarking machine learning algorithms,” 2017, His current research interests include blockchain, data privacy, lossless
arXiv:1708.07747. data hiding, Internet of Things (IoT), and service computing.
Authorized licensed use limited to: The University of British Columbia Library. Downloaded on June 06,2023 at 19:00:25 UTC from IEEE Xplore. Restrictions apply.
1714 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 19, NO. 2, FEBRUARY 2023
Mohammed Atiquzzaman (Senior Member) Mahathir Almashor received the Ph.D. degree
received the M.S. and Ph.D. degrees in electri- in computer science from RMIT University, Mel-
cal engineering and electronics from the Univer- bourne, VIC, Australia, in 2013.
sity of Manchester, Manchester, U.K., in 1984 He is a Senior Research Scientist with
and 1987, respectively. CSIRO’s Data61 and Cyber Security Cooper-
He currently holds the Edith Kinney Gay- ative Research Centre, Black Mountain, ACT,
lord Presidential Professorship with the School Australia, with a background in software engi-
of Computer Science, University of Oklahoma, neering research and data science. After his
Norman, OK, USA. His research interests in- Ph.D., his talents have afforded him opportu-
clude communications switching, transport pro- nities at industry leaders such as Seeing Ma-
tocols, wireless and mobile networks, satellite chines and IBM Research. Prior work includes
networks, and optical communications. traffic simulators, machine-vision, distributed systems, and antiphishing
Dr. Atiquzzaman is the Editor-in-Chief of the Journal of Networks and techniques. Recent focus has been on the capture, analysis and visu-
Computer Applications, Founding Editor-in-Chief of Vehicular Commu- alization of billions of records within distributed Python and DB frame-
nications, and has served/serving on the editorial boards of various works. He is currently with the Smart Shield antiphishing project, which
IEEE journals and cochaired numerous IEEE international conferences is jointly supported by Data61, Cyber Security Cooperative Research
including IEEE Globecom. Centre, and the West Australian Government.
Authorized licensed use limited to: The University of British Columbia Library. Downloaded on June 06,2023 at 19:00:25 UTC from IEEE Xplore. Restrictions apply.