Federated Learning (FL) has emerged as a promising approach for privacy-preserving machine learning, particu-larly in sensitive domains such as healthcare. In this context, the TRUSTroke project aims to leverage FL to assist clinicians in ischemic stroke prediction. This paper provides an overview of the TRUSTroke FL network infrastructure. The proposed archi-tecture adopts a client-server model with a central Parameter Server (PS). We introduce a Docker-based design for the client nodes, offering a flexible solution for implementing FL processes in clinical settings. The impact of different communication pro-tocols (HTTP or MQTT) on FL network operation is analyzed, with MQTT selected for its suitability in FL scenarios. A control plane to support the main operations required by FL processes is also proposed. The paper concludes with an analysis of security aspects of the FL architecture, addressing potential threats and to increase trustworthiness.
A Secure and Trustworthy Network Architecture for Federated Learning Healthcare Applications
Boiano, Antonio;Di Gennaro, Marco;Carminati, Michele;Nicoli, Monica;Redondi, Alessandro;Milasheuski, Usevalad;Kianoush, Sanaz;Savazzi, Stefano;
2024-01-01
Abstract
Federated Learning (FL) has emerged as a promising approach for privacy-preserving machine learning, particu-larly in sensitive domains such as healthcare. In this context, the TRUSTroke project aims to leverage FL to assist clinicians in ischemic stroke prediction. This paper provides an overview of the TRUSTroke FL network infrastructure. The proposed archi-tecture adopts a client-server model with a central Parameter Server (PS). We introduce a Docker-based design for the client nodes, offering a flexible solution for implementing FL processes in clinical settings. The impact of different communication pro-tocols (HTTP or MQTT) on FL network operation is analyzed, with MQTT selected for its suitability in FL scenarios. A control plane to support the main operations required by FL processes is also proposed. The paper concludes with an analysis of security aspects of the FL architecture, addressing potential threats and to increase trustworthiness.File | Dimensione | Formato | |
---|---|---|---|
eHPWAS (7).pdf
accesso aperto
Descrizione: file sottomesso
:
Post-Print (DRAFT o Author’s Accepted Manuscript-AAM)
Dimensione
815.49 kB
Formato
Adobe PDF
|
815.49 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.