Secure Federated Computation Models for Data Privacy in Distributed AI Systems

Authors

  • Florin Stefan Andrei Department of Informatics and Cybernetics, University of Bucharest, Romania. Author

DOI:

https://doi.org/10.63282/3117-5481/AIJCST-V6I3P101

Keywords:

Federated Learning, Secure Multi-Party Computation, Homomorphic Encryption, Data Privacy, Distributed Artificial Intelligence, Differential Privacy, Secure Aggregation, Adversarial Robustness, Trust-Weighted Aggregation

Abstract

Due to the growing adoption of distributed artificial intelligence (AI) systems, the shift towards decentralized learning systems has been facilitated by the paradigm of a centralized data repository being replaced by provisions of decentralized learning systems like Federated Learning (FL). Nonetheless, even though FL has promises of privacy, the fulfilment of privacy is threatened by many vulnerabilities such as gradient leakage, model inversion and communication attacks, which represent significant threats to data confidentiality and integrity. The study will introduce a flexible framework of models of Secure Federated Computation (SFC) taking into account the conscious integration of Homomorphic Encryption (HE), Secure Multi-party Computation (SMC), and Differential Privacy (DP) methods that will contribute to data protection in distributed AI frameworks. The model proposed tries to reduce the adversarial inference attacks and guarantee safe model aggregation without the need to reduce the computational efficiency. In this research, an adaptive federated computation protocol based on hybrid encryption mechanism is proposed, which can dynamically trade off the privacy guarantees and system throughput. A new function of trust-weighted aggregation is also implemented in the protocol to handle bad client behaviours and data poisoning attacks. The empirical analysis of the benchmark datasets such as CIFAR-10 and MNIST indicates that the proposed SFC model delivers a privacy leakage risk reduction of 42 based models at an equivalent model performance to regular FL systems. Scalability Analytical modelling and simulations verify that the architecture can be scaled to support large-scale, real-world applications in healthcare, finance, and IoT-driven settings. The researchers conclude that cryptographic computation can introduce a viable roadmap to secure and privacy-sensitive distributed AI ecosystems that meet the strict regulatory privacy requirements of initiatives like GDPR and HIPAA

References

[1] McMahan, H. B., Moore, E., Ramage, D., Hampson, S., & Arcas, B. A. (2017). Communication‐efficient learning of deep networks from decentralized data. In Proceedings of AISTATS.

[2] Zhang, Y., Lu, Y., & Liu, F. (2023). A Systematic Survey for Differential Privacy Techniques in Federated Learning. Journal of Information Security, 14, 111-135. SCIRP+1

[3] Truex, S., Liu, L., Gursoy, M. E., Yu, L., & Wei, W. (2019). A Hybrid Approach to Privacy‐Preserving Federated Learning. In AISec ’19 Workshop.

[4] Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., … & Seth, K. (2017). Practical Secure Aggregation for Privacy‐Preserving Machine Learning. In CCS ’17.

[5] Byrd, D., Yilmaz, Y., (2020). Differentially Private Secure Multi‐Party Computation for Federated Learning in Financial Applications. In ACM International Conference on AI in Finance. par.nsf.gov

[6] Jin, W., Yao, Y., Han, S., Gu, J., Joe‐Wong, C., Ravi, S., Avestimehr, S., & He, C. (2023). FedML-HE: An Efficient Homomorphic‐Encryption‐Based Privacy‐Preserving Federated Learning System. arXiv preprint. arXiv

[7] “Federated Learning Meets Homomorphic Encryption” – IBM Research blog. (2022). IBM Research

[8] “A Survey of Security Strategies in Federated Learning.” (2022). Future Internet, 16(10). MDPI

[9] Zhu, B., Wang, L., Pang, Q., Ji, S., Jiao, J., & Song, D. (2023). Byzantine‐Robust Federated Learning with Optimal Statistical Rates. Proceedings of MLR, 206. proceedings.mlr.press

[10] Mohanarajesh Kommineni. Revanth Parvathi. (2013) Risk Analysis for Exploring the Opportunities in Cloud Outsourcing.

[11] Enabling Mission-Critical Communication via VoLTE for Public Safety Networks - Varinder Kumar Sharma - IJAIDR Volume 10, Issue 1, January-June 2019. DOI 10.71097/IJAIDR.v10.i1.1539

[12] Thallam, N. S. T. (2020). The Evolution of Big Data Workflows: From On-Premise Hadoop to Cloud-Based Architectures.

[13] Kanji, R. K. (2020). Federated Learning in Big Data Analytics Privacy and Decentralized Model Training. Journal of Scientific and Engineering Research, 7(3), 343-352.

[14] The Role of Zero-Emission Telecom Infrastructure in Sustainable Network Modernization - Varinder Kumar Sharma - IJFMR Volume 2, Issue 5, September-October 2020. https://doi.org/10.36948/ijfmr.2020.v02i05.54991

[15] P. K. Maroju, "Empowering Data-Driven Decision Making: The Role of Self-Service Analytics and Data Analysts in Modern Organization Strategies," International Journal of Innovations in Applied Science and Engineering (IJIASE), vol. 7, Aug. 2021.

[16] Aragani, Venu Madhav and Maroju, Praveen Kumar and Mudunuri, Lakshmi Narasimha Raju, “Efficient Distributed Training through Gradient Compression with Sparsification and Quantization Techniques” (September 29, 2021). Available at SSRN: https://ssrn.com/abstract=5022841 or http://dx.doi.org/10.2139/ssrn.5022841

[17] Lakshmi Narasimha Raju Mudunuri, “AI Powered Supplier Selection: Finding the Perfect Fit in Supply Chain Management”, IJIASE, January-December 2021, Vol 7; 211-231.

[18] Kommineni, M. "Explore Knowledge Representation, Reasoning, and Planning Techniques for Building Robust and Efficient Intelligent Systems." International Journal of Inventions in Engineering & Science Technology 7.2 (2021): 105- 114.

[19] Thallam, N. S. T. (2021). Privacy-Preserving Data Analytics in the Cloud: Leveraging Homomorphic Encryption for Big Data Security. Journal of Scientific and Engineering Research, 8(12), 331-337

[20] Kanji, R. K. (2021). Federated data governance framework for ensuring quality-assured data sharing and integration in hybrid cloud-based data warehouse ecosystems through advanced ETL/ELT techniques. International Journal of Computer Techniques, 8(3), 1-9.

[21] Reinforcement Learning Applications in Self Organizing Networks - Varinder Kumar Sharma - IJIRCT Volume 7 Issue 1, January-2021. DOI: https://doi.org/10.5281/zenodo.17062920

[22] Thirunagalingam, A. (2022). Enhancing Data Governance Through Explainable AI: Bridging Transparency and Automation. Available at SSRN 5047713.

[23] P. K. Maroju, "Conversational AI for Personalized Financial Advice in the BFSI Sector," International Journal of Innovations in Applied Sciences and Engineering, vol. 8, no.2, pp. 156–177, Nov. 2022.

[24] Kulasekhara Reddy Kotte. 2022. ACCOUNTS PAYABLE AND SUPPLIER RELATIONSHIPS: OPTIMIZING PAYMENT CYCLES TO ENHANCE VENDOR PARTNERSHIPS. International Journal of Advances in Engineering Research , 24(6), PP – 14-24, https://www.ijaer.com/admin/upload/02%20Kulasekhara%20Reddy%20Kotte%2001468.pdf

[25] Gopi Chand Vegineni. 2022. Intelligent UI Designs for State Government Applications: Fostering Inclusion without AI and ML, Journal of Advances in Developmental Research, 13(1), PP – 1-13, https://www.ijaidr.com/research-paper.php?id=1454

[26] Hullurappa, M. (2022). The Role of Explainable AI in Building Public Trust: A Study of AI-Driven Public Policy Decisions. International Transactions in Artificial Intelligence, 6.

[27] Mohanarajesh Kommineni. (2022/9/30). Discover the Intersection Between AI and Robotics in Developing Autonomous Systems for Use in the Human World and Cloud Computing. International Numeric Journal of Machine Learning and Robots. 6. 1-19. Injmr

[28] Naga Surya Teja Thallam. (2022). Enhancing Security in Distributed Systems Using Bastion Hosts, NAT Gateways, and Network ACLs. International Scientific Journal of Engineering and Management, 1(1).

[29] Thallam, N. S. T. (2022). Columnar Storage vs. Row-Based Storage: Performance Considerations for Data Warehousing. Journal of Scientific and Engineering Research, 9(4), 238-249.

[30] Garg, A. (2022). Unified Framework of Blockchain and AI for Business Intelligence in Modern Banking . International Journal of Emerging Research in Engineering and Technology, 3(4), 32-42. https://doi.org/10.63282/3050-922X.IJERET-V3I4P105

[31] Kanji, R. K. (2022). A Unified Data Warehouse Architecture for Multi-Source Forest Inventory Integration and Automated Remote Sensing Analysis. Sarcouncil Journal of Engineering and Computer Sciences, 1, 10-16.

[32] Performance Evaluation of Network Slicing in 5G Core Networks - Varinder Kumar Sharma - IJMRGE 2022; 3(5): 648-654. DOI: https://doi.org/10.54660/.IJMRGE.2022.3.5.648-654

[33] Thirunagalingam, A. (2023). Improving Automated Data Annotation with Self-Supervised Learning: A Pathway to Robust AI Models Vol. 7, No. 7,(2023) ITAI. International Transactions in Artificial Intelligence, 7(7).

[34] Praveen Kumar Maroju, "Optimizing Mortgage Loan Processing in Capital Markets: A Machine Learning Approach, " International Journal of Innovations in Scientific Engineering, 17(1), PP. 36-55 , April 2023.

[35] P. K. Maroju, "Leveraging Machine Learning for Customer Segmentation and Targeted Marketing in BFSI," International Transactions in Artificial Intelligence, vol. 7, no. 7, pp. 1-20, Nov. 2023.

[36] Kulasekhara Reddy Kotte. 2023. Leveraging Digital Innovation for Strategic Treasury Management: Blockchain, and Real-Time Analytics for Optimizing Cash Flow and Liquidity in Global Corporation. International Journal of Interdisciplinary Finance Insights, 2(2), PP - 1 - 17, https://injmr.com/index.php/ijifi/article/view/186/45

[37] Mudunuri L.N.R.; (December, 2023); “AI-Driven Inventory Management: Never Run Out, Never Overstock”; International Journal of Advances in Engineering Research; Vol 26, Issue 6; 24-36

[38] Lakshmi Narasimha Raju Mudunuri, “Risk Mitigation Through Data Analytics: A Proactive Approach to Sourcing”, Excel International Journal of Technology, Engineering and Management, vol. 10, no.4, pp. 159-170, 2023, https://doi.uk.com/7.000100/EIJTEM.

[39] Sudheer Panyaram, (2023), AI-Powered Framework for Operational Risk Management in the Digital Transformation of Smart Enterprises.

[40] Hullurappa, M. (2023). Intelligent Data Masking: Using GANs to Generate Synthetic Data for Privacy-Preserving Analytics. International Journal of Inventions in Engineering & Science Technology, 9, 9.

[41] B. C. C. Marella, “Data Synergy: Architecting Solutions for Growth and Innovation,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 11, no. 9, pp. 10551–10560, Sep. 2023.

[42] Mohanarajesh Kommineni. (2023/6). Investigate Computational Intelligence Models Inspired By Natural Intelligence, Such As Evolutionary Algorithms And Artificial Neural Networks. Transactions On Latest Trends In Artificial Intelligence. 4. P30. Ijsdcs.

[43] Settibathini, V. S., Kothuru, S. K., Vadlamudi, A. K., Thammreddi, L., & Rangineni, S. (2023). Strategic analysis review of data analytics with the help of artificial intelligence. International Journal of Advances in Engineering Research, 26, 1-10.

[44] Sandeep Rangineni Latha Thamma reddi Sudheer Kumar Kothuru , Venkata Surendra Kumar, Anil Kumar Vadlamudi. Analysis on Data Engineering: Solving Data preparation tasks with ChatGPT to finish Data Preparation. Journal of Emerging Technologies and Innovative Research. 2023/12. (10)12, PP 11, https://www.jetir.org/view?paper=JETIR2312580

[45] Sehrawat, S. K. (2023). Transforming Clinical Trials: Harnessing the Power of Generative AI for Innovation and Efficiency. Transactions on Recent Developments in Health Sectors, 6(6), 1-20.

[46] Venkata SK Settibathini. Data Privacy Compliance in SAP Finance: A GDPR (General Data Protection Regulation) Perspective. International Journal of Interdisciplinary Finance Insights, 2023/6, 2(2), https://injmr.com/index.php/ijifi/article/view/45/13

[47] Thallam, N. S. T. (2023). Comparative Analysis of Public Cloud Providers for Big Data Analytics: AWS, Azure, and Google Cloud. International Journal of AI, BigData, Computational and Management Studies, 4(3), 18-29.

[48] Arpit Garg, S Rautaray, Devrajavans Tayagi. Artificial Intelligence in Telecommunications: Applications, Risks,and Governance in the 5G and Beyond Era. International Journal of Computer Techniques – Volume10Issue1,January - February – 2023. 1-19.

[49] Mukkala, S. R. (2023). A Proficient Hospital Ratings Aware Patient Churn Prediction And Prevention System Using Abg-Fuzzy And Ner-Gfjdkmeans. Educational Administration: Theory and Practice, 29 (03), 1407-1424 Doi: 10.53555/kuey. v29i3, 9511.

[50] Rajesh Kumar Kanji, Vinodkumar Reddy Surasani, Naveen Kumar Kotha and Uday Kiran Chilakalapalli4 (2023). NLP-BASED INTER AND INTRA-SENTENCE RELATIONSHIP ANALYSIS-AWARE BANK CUSTOMER BEHAVIOR ANALYSIS AND PREFERENCE DETECTION USING GLSNSTM. Journal of Computational Analysis and Applications, 31(4), 1834-1857

[51] Varinder Kumar Sharma - Cloud-Edge Continuum in 5G: A Latency-Aware Network Design Review -International Scientific Journal of Engineering and Management Volume: 02 Issue: 03 | Mar – 2023. DOI: 10.55041/ISJEM00133

Downloads

Published

2024-05-04

Issue

Section

Articles

How to Cite

[1]
F. S. Andrei, “Secure Federated Computation Models for Data Privacy in Distributed AI Systems”, AIJCST, vol. 6, no. 3, pp. 1–12, May 2024, doi: 10.63282/3117-5481/AIJCST-V6I3P101.

Similar Articles

31-40 of 100

You may also start an advanced similarity search for this article.