Advanced Privacy-Preserving Federated Learning in 6G Networks Using Differential Privacy and Homomorphic Encryption
Keywords:
6G Network, Homomorphic Encryption, Differential Privacy, Data Security, Global Accuracy.Abstract
In the age of 6G networks, ensuring robust privacy and security measures is essential. Given the widespread connectivity and a plethora of applications, the management of extensive data in the realm of 6G, facilitated by cutting-edge technologies, demands an elevated level of safeguarding. Essentially, strong privacy measures cultivate trust, encouraging broad adoption by instilling confidence among both users and organizations. In this landscape, prioritizing privacy and security is paramount to safeguarding sensitive information, maintaining integrity, and mitigating risks associated with the dynamic and interconnected nature of 6G networks. The research introduces an advanced federated learning approach tailored for 6G networks. Utilizing differential privacy during localized model training and homomorphic encryption for secure transmission, the central server orchestrates secure aggregating encrypted updates. This collaborative learning model progressively enhances global accuracy while preserving individual data privacy. Robust monitoring ensures regulatory compliance and dynamic improvements to privacy mechanisms signify the proactive evolution of this paradigm within the enigmatic realms of 6G networks, offering a significant advancement in both model precision and privacy standards.Top of Form
Downloads
References
Alaya, B., Laouamer, L., & Msilini, N. (2020). Homomorphic encryption systems statement: Trends and challenges. Computer Science Review, 36, 100235.
Hamza, R., Hassan, A., Ali, A., Bashir, M. B., Alqhtani, S. M., Tawfeeg, T. M., & Yousif, A. (2022). Towards secure big data analysis via fully homomorphic encryption algorithms. Entropy, 24(4), 519.
Domingo-Ferrer, J., Farras, O., Ribes-González, J., & Sánchez, D. (2019). Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Computer Communications, 140, 38-60.
Wood, A., Najarian, K., & Kahrobaei, D. (2020). Homomorphic encryption for machine learning in medicine and bioinformatics. ACM Computing Surveys (CSUR), 53(4), 1-35.
Mangla, M., Shinde, S. K., Mehta, V., Sharma, N., & Mohanty, S. N. (Eds.). (2022). Handbook of Research on Machine Learning: Foundations and Applications. CRC Press.
Ali, M., Naeem, F., Tariq, M., & Kaddoum, G. (2022). Federated learning for privacy preservation in smart healthcare systems: A comprehensive survey. IEEE journal of biomedical and health informatics, 27(2), 778-789.
Thilakarathne, N. N., Muneeswari, G., Parthasarathy, V., Alassery, F., Hamam, H., Mahendran, R. K., & Shafiq, M. (2022). Federated Learning for Privacy-Preserved Medical Internet of Things. Intell. Autom. Soft Comput, 33(1), 157-172.
Tabassum, A., Erbad, A., Lebda, W., Mohamed, A., & Guizani, M. (2022). Fedgan-ids: Privacy-preserving ids using gan and federated learning. Computer Communications, 192, 299-310.
Ali, B., Gregory, M. A., & Li, S. (2021). Multi-access edge computing architecture, data security and privacy: A review. IEEE Access, 9, 18706-18721.
Thapa, C., & Camtepe, S. (2021). Precision health data: Requirements, challenges and existing techniques for data security and privacy. Computers in biology and medicine, 129, 104130.
Chen, Z., Liao, W., Hua, K., Lu, C., & Yu, W. (2021). Towards asynchronous federated learning for heterogeneous edge-powered internet of things. Digital Communications and Networks, 7(3), 317-326.
Yousefpoor, M. S., Yousefpoor, E., Barati, H., Barati, A., Movaghar, A., & Hosseinzadeh, M. (2021). Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review. Journal of Network and Computer Applications, 190, 103118.
Yousefpoor, M. S., Yousefpoor, E., Barati, H., Barati, A., Movaghar, A., & Hosseinzadeh, M. (2021). Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review. Journal of Network and Computer Applications, 190, 103118.
Gopalakrishnan Subburayalu, Hemanand Duraivelu, Arun Prasath Raveendran, Rajesh Arunachalam, Deepika Kongara & Chitra Thangavel (2023) Cluster Based Malicious Node Detection System for Mobile Ad-Hoc Network Using ANFIS Classifier, Journal of Applied Security Research, 18:3, 402-420.
Hemanand, D., Reddy, G. ., Babu, S. S. ., Balmuri, K. R. ., Chitra, T., & Gopalakrishnan, S. (2022). An Intelligent Intrusion Detection and Classification System using CSGO-LSVM Model for Wireless Sensor Networks (WSNs). International Journal of Intelligent Systems and Applications in Engineering, 10(3), 285–293.
Ali, A., Al-Rimy, B. A. S., Tin, T. T., Altamimi, S. N., Qasem, S. N., & Saeed, F. (2023). Empowering Precision Medicine: Unlocking Revolutionary Insights through Blockchain-Enabled Federated Learning and Electronic Medical Records. Sensors, 23(17), 7476.
Yaacoub, J. P. A., Noura, H. N., & Salman, O. (2023). Security of federated learning with IoT systems: Issues, limitations, challenges, and solutions. Internet of Things and Cyber-Physical Systems, 3, 155-179.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.