Artificial Intelligence (AI) Based Multi-Layered Approaches for Privacy Preservation in Federated Learning

PDF (798KB), PP.190-202

Views: 0 Downloads: 0

Author(s)

Kummagoori Bharath 1 Pooja Chopra 1 Mukesh Kumar 1,2,*

1. School of Computer Application, Lovely Professional University, Phagwara-144411, Punjab, India

2. Advanced Centre of Research & Innovation (ACRI), School of Advanced Computing, CGC University, Mohali 140307, Punjab, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijmecs.2026.02.12

Received: 2 Jul. 2025 / Revised: 11 Nov. 2025 / Accepted: 2 Feb. 2026 / Published: 8 Apr. 2026

Index Terms

Federated Learning, Privacy-preserving, Hybrid Framework, Multi-layered architecture, Data Privacy

Abstract

This paper proposes the hybrid framework of privacy preserving that combines the concept of federated learning and homomorphic encryption with differential privacy, to address the privacy issue of collaborative machine learning for healthcare application. The proposed approach makes three contributions: (1) multi-layered architecture using federated learning in combination homomorphic encryption (based on CKKS scheme) and differential privacy that offers defense against inference attacks at different layers, (2) the implementation which alleviates the computational overhead compared to homomorphic encryption only with optimised cryptographic parameters, and (3) the application of the Grasshopper-Black Hole Optimization (G-BHO) for the optimisation of privacy parameters (e, deltas, gradient clipping thresholds) in order to balance the privacy-utility trade-off. Cryptographic keys are produced using the principles of cryptographically secure random number generation. Experimental evaluation on two healthcare data sets (MIMIC-III and chest X rays of the patients of Covid-19) to compare the hybrid approach to the single technique baselines in four metrics: classification accuracy (93.0±1.2% vs. 89.0±1.5% for federated learning only), differential privacy guarantee (ε=0.7, δ=10⁻⁵), computational overhead (2.5x baseline vs. 8x for homomorphic encryption only) and the resistance to membership inference attacks (92% vs. 68%) The observed improvement in the accuracy is unexpected, and potentially a consequence of side-effects due to the effects of the regularization in the differential privacy noise; this finding needs to be further explored in theory. The evaluation is restricted to the tasks of healthcare classification, while generalization to other domains needs more validation. The main contribution is an empirical proof that by using a combination of several privacy mechanisms, it will be possible to achieve a stronger attack resistance with a lower computational overhead than by using homomorphic encryption alone. 

Cite This Paper

Kummagoori Bharath, Pooja Chopra, Mukesh Kumar, "Artificial Intelligence (AI) Based Multi-Layered Approaches for Privacy Preservation in Federated Learning", International Journal of Modern Education and Computer Science(IJMECS), Vol.18, No.2, pp. 190-202, 2026. DOI:10.5815/ijmecs.2026.02.12

Reference

[1]S. Dutta et al., “Federated Learning with Quantum Computing and Fully Homomorphic Encryption: A Novel Computing Paradigm Shift in Privacy-Preserving ML,” arXiv:2409.11430, Sep. 2024. doi:10.48550/arXiv.2409.11430.
[2]H. Huang, B. Iskandarov, M. Rahman, H. T. Otal and M. A. Canbaz, “Federated Learning in Adversarial Environments: Testbed Design and Poisoning Resilience in Cybersecurity,” arXiv:2409.09794, Sep. 2024. doi:10.48550/arXiv.2409.09794.
[3]R. Madduri, Z. Li, T. Nandi, K. Kim, M. Ryu and Á. Rodríguez, “Advances in Privacy Preserving Federated Learning to Realize a Truly Learning Healthcare System,” IEEE TPS-ISA, pp. 273-282, Oct. 2024. doi:10.1109/TPS-ISA62245.2024.00039.
[4]Y. Bi, Y. Li, X. Feng and X. Mi, “Enabling Privacy-Preserving Cyber Threat Detection with Federated Learning,” arXiv:2404.05130, Apr. 2024. doi:10.48550/arXiv.2404.05130.
[5]B. Yurdem, M. Kuzlu, M. K. Güllü, F. Ö. Çatak and M. Tabassum, “Federated Learning: Overview, Strategies, Applications, Tools and Future Directions,” Heliyon, vol. 10, no. 19, e38137, Sep. 2024. doi:10.1016/j.heliyon.2024.e38137.
[6]B. Liu, N. Lv, Y. Guo and Y. Li, “Recent Advances on Federated Learning: A Systematic Survey,” Neurocomputing, vol. 597, art. 128019, Jun. 2024. doi:10.1016/j.neucom.2024.128019.
[7]M. R. Uddin, G. Shankar, S. H. Mukta, P. Kumar, and A. K. M. N. Islam, “Evolving Topics in Federated Learning: Trends and Emerging Directions for IS,” arXiv:2409.15773, Sep. 2024. doi:10.48550/arXiv.2409.15773.
[8]M. Bharathi, T. A. S. Srinivas and M. Bhuvaneswari, “Federated Learning: From Origins to Modern Applications and Challenges,” Journal of Information Technology and Cryptography, vol. 1, no. 2, pp. 29-38, Oct. 2024. doi:10.48001/joitc.2024.1229-38.
[9]Ahmed, B., Shuja, M., Mishra, H. M., Qtaishat, A., & Kumar, M. (2023, March). IoT based smart systems using artificial intelligence and machine learning: accessible and intelligent solutions. In 2023 6th International Conference on Information Systems and Computer Networks (ISCON) (pp. 1-6). IEEE.
[10]H. Shin, K. Ryu, J. Kim, and S. Lee, “Application of Privacy Protection Technology to Healthcare Big Data,” Digital Health, vol. 10, Jan. 2024. doi:10.1177/20552076241282242.
[11]S. K. M. et al., “Privacy-Preserving in Blockchain-Based Federated Learning Systems,” Computer Communications, vol. 222, pp. 38-54, Apr. 2024. doi:10.1016/j.comcom.2024.04.024.
[12]Y. Dong, Y. Wang, M. Gama, M. Mustafa, G. Deconinck, and X. Huang, “Privacy-Preserving Distributed Learning for Residential Short-Term Load Forecasting,” IEEE Internet of Things Journal, vol. 11, no. 9, pp. 16817-16831, Feb. 2024. doi:10.1109/JIOT.2024.3362587.
[13]Bhardwaj, V., Noonia, A., Chaurasia, S., Kumar, M., Rashid, A., & Othman, M. T. B. (2024). Optimizing structured data processing through robotic process automation. arXiv preprint arXiv:2408.14791.
[14]K. Daly, H. Eichner, P. Kairouz, H. B. McMahan, D. Ramage and Z. Xu, “Federated Learning in Practice: Reflections and Projections,” IEEE TPS-ISA, pp. 148-159, Oct. 2024. doi:10.1109/TPS-ISA62245.2024.00026.
[15]W. Wei and L. Liu, “Trustworthy Distributed AI Systems: Robustness, Privacy, and Governance,” ACM Computing Surveys, Feb. 2024. doi:10.1145/3645102.
[16]S. Banerjee, P. Sahu, M. Luo, A. Vahldiek-Oberwagner, N. J. Yadwadkar and M. Tiwari, “SoK: A Systems Perspective on Compound AI Threats and Countermeasures,” arXiv:2411.13459, Nov. 2024. doi:10.48550/arXiv.2411.13459.
[17]S. S. Sefati, R. Crăciunescu, B. Arasteh, S. Halunga, O. Fratu and I. Tal, “Cybersecurity in a Scalable Smart City Framework Using Blockchain and Federated Learning for Internet of Things (IoT),” Smart Cities, vol. 7, no. 5, pp. 2802-2823, Oct. 2024. doi:10.3390/smartcities7050109.
[18]R. Sun et al., “Multi-Continental Healthcare Modelling Using Blockchain-Enabled Federated Learning,” arXiv:2410.17933, Oct. 2024. doi:10.48550/arXiv.2410.17933.
[19]S. Narkedimilli, R. A. Kumar, N. Kumar, R. P. Reddy, and C. P. Kumar, “FL-DECO-BC: A Privacy-Preserving, Provably Secure, and Provenance-Preserving Federated Learning Framework with Decentralized Oracles on Blockchain for VANETs,” arXiv:2407.21141, Jul. 2024. doi:10.48550/arXiv.2407.21141.
[20]W. Guo, F. Zhuang, X. Zhang, Y. Tong, and J. Dong, “A Comprehensive Survey of Federated Transfer Learning: Challenges, Methods and Applications,” Frontiers of Computer Science, vol. 18, no. 6, Jul. 2024. doi:10.1007/s11704-024-40065-x.
[21]C. Papadopoulos, K.-F. Kollias, and G. F. Fragulis, “Recent Advancements in Federated Learning: State of the Art, Fundamentals, Principles, IoT Applications and Future Trends,” Future Internet, vol. 16, no. 11, p. 415, Nov. 2024. doi:10.3390/fi16110415.
[22]H. U. Manzoor, A. Jafri and A. Zoha, “Adaptive Single-Layer Aggregation Framework for Energy-Efficient and Privacy-Preserving Load Forecasting in Heterogeneous Federated Smart Grids,” Internet of Things, art. 101376, Sep. 2024. doi:10.1016/j.iot.2024.101376.
[23]H. Guan, P. Yap, A. Bozoki and M. Liu, “Federated Learning for Medical Image Analysis: A Survey,” Pattern Recognition, vol. 151, art. 110424, Mar. 2024. doi:10.1016/j.patcog.2024.110424.
[24]Y. Chen, Z. Tang, T. Lu, B. Zhang, Z. Shi, and Z. Wang, “Accelerating Private Large Transformers Inference Through Fine-Grained Collaborative Computation,” arXiv:2412.16537, Dec. 2024. doi:10.48550/arXiv.2412.16537.
[25]M. Izabachène and J.-P. Bossuat, “TETRIS: Composing FHE Techniques for Private Functional Exploration Over Large Datasets,” arXiv:2412.13269, Dec. 2024. doi:10.48550/arXiv.2412.13269.
[26]M. Shrestha, Y. Ravichandran, and E. Kim, “Secure Multiparty Generative AI,” arXiv:2409.19120, Sep. 2024. doi:10.48550/arXiv.2409.19120.
[27]T. Sattarov, M. Schreyer and D. Borth, “FedTabDiff: Federated Learning of Diffusion Probabilistic Models for Synthetic Mixed-Type Tabular Data Generation,” arXiv:2401.06263, Jan. 2024. doi:10.48550/arXiv.2401.06263.
[28]R.-J. Yew, L. Qin and S. Venkatasubramanian, “You Still See Me: How Data Protection Supports the Architecture of ML Surveillance,” arXiv:2402.06609, Feb. 2024. doi:10.48550/arXiv.2402.06609.
[29]D. Commey, S. Hounsinou and G. V. Crosby, “Securing Health Data on the Blockchain: A Differential Privacy and Federated Learning Framework,” arXiv:2405.11580, May 2024. doi:10.48550/arXiv.2405.11580.
[30]Y. Chen and P. Esmaeilzadeh, “Generative AI in Medical Practice: In-Depth Exploration of Privacy and Security Challenges,” Journal of Medical Internet Research, vol. 26, Mar. 2024. doi:10.2196/53008.
[31]A. Nash, “Decentralized Health Intelligence Network (DHIN),” arXiv:2408.06240, Aug. 2024. doi:10.48550/arXiv.2408.06240.
[32]K. Ranaweera et al., “Adaptive Clipping for Privacy-Preserving Few-Shot Learning: Enhancing Generalization with Limited Data,” arXiv:2503.22749, 2025. doi:10.48550/arXiv.2503.22749.
[33]R. Shokri, M. Stronati, C. Song and V. Shmatikov, “Membership Inference Attacks Against Machine Learning Models,” in Proc. IEEE Symposium on Security & Privacy, pp. 3-18, 2017. doi:10.1109/SP.2017.41.