Federated Learning Frameworks for Privacy Preserving Artificial Intelligence Applications
Main Article Content
Abstract
Federated Learning (FL) has emerged as a revolutionary paradigm in artificial intelligence (AI) that enables multiple decentralized devices or institutions to collaboratively train machine learning models without sharing raw data. This approach addresses critical privacy concerns, especially in sensitive domains like healthcare, finance, and smart cities, where data confidentiality is paramount. This paper explores various federated learning frameworks developed to facilitate privacy-preserving AI applications, focusing on system architectures, communication protocols, and optimization techniques that enhance performance and security. The study evaluates state-of-the-art FL frameworks such as Google's TensorFlow Federated, PySyft, and IBM's Federated Learning Framework, highlighting their design principles and suitability for different application scenarios. Emphasis is placed on how these frameworks manage challenges like data heterogeneity, limited communication bandwidth, and adversarial attacks. Through comprehensive literature analysis and experimental implementation, the paper assesses the trade-offs between privacy preservation, model accuracy, and computational overhead. Results demonstrate that FL frameworks significantly reduce the risk of data leakage while maintaining competitive model performance compared to traditional centralized training. However, issues such as model poisoning and gradient inversion attacks pose ongoing challenges. The paper discusses emerging solutions like secure multi-party computation, differential privacy, and homomorphic encryption to bolster privacy guarantees. The findings underscore the potential of federated learning as a cornerstone for future privacy-preserving AI applications, promoting ethical data use and regulatory compliance. Finally, the paper suggests future research directions focusing on improving scalability, robustness, and cross-silo collaboration in federated learning systems.
Article Details
Section
How to Cite
References
1. McMahan, H. B., et al. (2017). Communication-Efficient Learning of Deep Networks from Decentralized Data. Proc. AISTATS.
2. Geyer, R. C., Klein, T., & Nabi, M. (2017). Differentially Private Federated Learning: A Client Level Perspective. arXiv preprint arXiv:1712.07557.
3. Bonawitz, K., et al. (2017). Practical Secure Aggregation for Privacy-Preserving Machine Learning. Proc. CCS.
4. Kairouz, P., et al. (2019). Advances and Open Problems in Federated Learning. arXiv preprint arXiv:1912.04977.
5. Potel, R. (2019). A Real-Time Analytics Architecture for Enterprise Order Lifecycle Visibility and Backlog Management. International Journal of Research and Applied Innovations, 2(6), 2460-2469.
6. Sugumar, R., Rengarajan, A., & Jayakumar, C. (2015). Design a Weight Based Sorting Distortion Algorithm for Privacy Preserving Data Mining. Middle-East Journal of Scientific Research, 23(3), 405-412.
7. Mathew, A. R., & Al Hajj, A. (2017). Secure communications on IoT and big data. Indian Journal of Science and Technology, 10(11).
8. Selvi, R., Saravan Kumar, S., & Suresh, A. (2014). An intelligent intrusion detection system using average manhattan distance-based decision tree. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1 (pp. 205-212). New Delhi: Springer India.
9. Anbazhagan, R. S. K. (2016). A Proficient Two Level Security Contrivances for Storing Data in Cloud.
10. Jagadeesh, S., & Sugumar, R. (2017). Optimal knowledge extraction system based on GSA and AANN. International Journal of Control Theory and Applications, 10(12), 153–162.
11. Saravanan, C. B., & Sugumar, R. (2014, February). Nepotism responsive of data mining for prejudice inimitability. In International Conference on Information Communication and Embedded Systems (ICICES2014) (pp. 1-3). IEEE.
12. G. Vimal Raja, K. K. Sharma (2015). Applying Clustering technique on Climatic Data. Envirogeochimica Acta 2 (1):21-27.
13. Murugeshwari, B., Jayakumar, C., & Sarukesi, K. (2012). Secure Multi Party Computation Technique for Classification Rule Sharing. International Journal of Computer Applications, 55(7).
14. Sudhan, S. K. H. H., & Kumar, S. S. (2016). Gallant Use of Cloud by a Novel Framework of Encrypted Biometric Authentication and Multi Level Data Protection. Indian Journal of Science and Technology, 9, 44.
15. Anand, L., & Neelanarayanan, V. (2019). Feature Selection for Liver Disease using Particle Swarm Optimization Algorithm. International Journal of Recent Technology and Engineering (IJRTE), 8(3), 6434-6439.
16. Mathew, A., & Mai, C. (2018, May). Study of Various Data Recovery and Data Back Up Techniques in Cloud Computing & Their Comparison. In 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 2021-2024). IEEE.
17. G. Vimal Raja, K. K. Sharma (2014). Analysis and Processing of Climatic data using data mining techniques. Envirogeochimica Acta 1 (8):460-467.
18. Chiranjeevi, K. G., Latha, R., & Kumar, S. S. (2016). Enlarge Storing Concept in an Efficient Handoff Allocation during Travel by Time Based Algorithm. Indian Journal of Science and Technology, 9, 40.
19. Satyanarayana, D., Mathew, A. R., & Sathyashree, S. (2016). An Architecture for Wireless Communication Systems using Li-Fi technology. In 8th International Conference on Latest Trends in Engineering and Technology (ICLTET’2016) (pp. 37-41).
20. Sugumar, R., & Murugeshwari, B. (2016). An Efficient MChord based Authentication for Vehicular Ad-Hoc Networks.
21. Jeetha Lakshmi, P. S., Saravan Kumar, S., & Suresh, A. (2014). Intelligent Medical Diagnosis System Using Weighted Genetic and New Weighted Fuzzy C-Means Clustering Algorithm. In Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1 (pp. 213-220). New Delhi: Springer India.
22. Raja, G. V. (2020). Metadata gets a makeover: The machine learning approach. International Journal of Computer Technology and Electronics Communication, 3(6), 2900-2903.
23. Socrates, S., Shanmugapriya, M., Murugeshwari, B., & Angalaeswari, S. (2024). Efficient Design for Implantable Device Constant Current Induction Doubly Fed Generating Incorporating Grid Connectivity. In Intelligent Solutions for Sustainable Power Grids (pp. 382-392). IGI Global Scientific Publishing.
24. Usha, G., Babu, M. R., & Kumar, S. S. (2017). Dynamic anomaly detection using cross layer security in MANET. Computers & Electrical Engineering, 59, 231-241.
25. Garg, V. K., Soundappan, S. J., & Kaur, E. M. (2020). Enhancement in intrusion detection system for WLAN using genetic algorithms. South Asian Research Journal of Engineering and Technology, 2(6), 62–64. https://doi.org/10.36346/sarjet.2020.v02i06.003
26. Pushparathi, V. G., Sudha, M., David, D. J., Anbazhagan, K., & Vethamani, S. E. (2020). A Continuous Decision Based Multi Kernel Median Filter for Noise Removal on Brain MRI Images. Advanced imaging, 1(3), 5.
27. Sudhan, S. K. H. H., & Kumar, S. S. (2015). An innovative proposal for secure cloud authentication using encrypted biometric authentication scheme. Indian journal of science and technology, 8(35), 1-5.
28. Santhoshini, G., & Anbazhagan, K. (2014, February). An object based software tool for software measurement. In International Conference on Information Communication and Embedded Systems (ICICES2014) (pp. 1-5). IEEE.
29. Sruthi, R. S., Ananya, S., & Murugeshwari, B. (2010). Web Based Virtual Control System Laboratory and On-Line Temperature Control of Electrophoresis Equipment using LabVIEW. International Journal of Computer Applications, 975, 8887.
30. Mathew A R, Al Zahli J A. Cloud Technology and the Challenges for Forensics InvestigatorsJ. DEStech Transactions on Computer Science and Engineering, 2017 (cnsce).
31. Saraswathi, U., Anbu, S., & Anbazhagan, K. (2014, February). Distributed file load rebalancing methodology for map reduce system. In International Conference on Information Communication and Embedded Systems (ICICES2014) (pp. 1-4). IEEE.
32. Natarajan, R., Sugumar, R., Mahendran, M., & Anbazhagan, K. (2012). Design a cryptographic approach for privacy preserving data mining. Int. J. Innov. Res. Sci. Eng. Technol, 1(1), 45-57.
33. Padala, S. (2019). AWS Cloud Architecture for Scalable Healthcare Contact Centers. American International Journal of Computer Science and Technology, 1(2), 21-26.
34. Jagadeesh, S., & Sugumar, R. (2017). A Comparative study on Artificial Bee Colony with modified ABC algorithm. European Journal of Applied Sciences, 9(5), 243-248.
35. Soundappan, S. J. (2020). Big Data Analytics in Healthcare: Applications for Pandemic Forecastin. International Journal of Advanced Research in Computer Science & Technology (IJARCST), 3(1), 2248-2253.
36. Mallick, P. K., Satapathy, B. S., Mohanty, M. N., & Kumar, S. S. (2015, February). Intelligent technique for CT brain image segmentation. In 2015 2nd International Conference on Electronics and Communication Systems (ICECS) (pp. 1269-1277). IEEE.
37. Anbazhagan, K., SUGUMAR, D., Mahendran, M., & Natarajan, R. (2012). An efficient approach for statistical anonymization techniques for privacy preserving data mining. International Journal of Advanced Research in Computer and Communication Engineering, 1(7), 482-485.
38. Ryffel, T., et al. (2018). A Generic Framework for Privacy Preserving Deep Learning. arXiv preprint arXiv:1811.04017.