Fed-ID: A Privacy-Preserving Federated Learning Framework for Cross-Institutional Synthetic Identity Discovery
Keywords:
Collaborative Detection, Distributed Learning, Fairness-Aware AI, Federated Learning, Fraud Detection, Privacy-Preserving Machine Learning, Synthetic Identity FraudAbstract
This research proposes Fed-ID, a privacy-preserving federated learning framework for cross-institutional detection of anomalous and synthetic identity patterns. Traditional centralized approaches are limited by regulatory constraints, data residency requirements, and single points of failure. Fed-ID employs a secure aggregation protocol enhanced with differential privacy to enable collaborative model training across distributed institutions without sharing raw data. A client-weighted optimization strategy addresses non-IID distributions across heterogeneous datasets, while a communication-efficient synchronization protocol minimizes bandwidth overhead. The framework further integrates a contrastive representation learning module to enforce identity consistency across federated nodes, improving generalization to unseen domains. Empirical evaluation on large-scale, multi-institution identity datasets demonstrates that Fed-ID achieves 98% parity with centralized baselines while maintaining formal privacy guarantees. These findings establish decentralized, collaborative AI as a practical and scalable approach for privacy-preserving identity verification across heterogeneous digital ecosystems.
Downloads
References
Pakina, A. K., Kejriwal, D., Goel, A., and Pujari, T. D. T., “AI-Generated Synthetic Identities in Fin Tech: Detecting Deep fakes KYC Fraud Using Behavioral Biometrics,” IOSR Journal of Computer Engineering, vol. 25, no. 3, pp. 26–37, 2023.
Suman Kumar Sanjeev Prasanna, “GeoDNN: Geometry-Aware Deep Neural Networks for Cross-Domain Fingerprint Spoof Detection”, Int J Intell Syst Appl Eng, vol. 6, no. 1, pp. 97–107, Mar. 2018.
Haddadi, H., et al., “Federated learning and edge intelligence,” IEEE Internet of Things Journal, 2020.
Shahid, J., Ahmad, R., Kiani, A. K., Ahmad, T., Saeed, S., and Almuhaideb, A. M., “Data protection and privacy of the internet of healthcare things (IoHTs),” Applied Sciences, vol. 12, no. 4, p. 1927, 2022.
Kumar, S., Prasanna, S., and Ruan, X., “A unified hybrid machine learning architecture for robust identity anomaly detection in large-scale digital ecosystems,” Journal of Electrical Systems, vol. 14, no. 1, pp. 160–173, 2018.
Papernot, N., et al., “Scalable private learning with PATE,” in International Conference on Learning Representations, 2018.
Kumar, S., and Prasanna, S., “Heterogeneous ensemble learning for robust adversarial pattern recognition in digital ecosystems,” Journal of Computational Analysis and Applications, vol. 27, no. 5, pp. 18–28, 2019.
Suman Kumar Sanjeev Prasanna, “DeepSynth: A Robust Multi-Layer Neural Detection of Coordinated Latent Anomalies in High-Dimensional Identity Systems ”, Int J Intell Syst Appl Eng, vol. 7, no. 1, pp. 66–77, Mar. 2019.
Canillas, R., Talbi, R., Bouchenak, S., Hasan, O., Brunie, L., and Sarrat, L., “Exploratory study of privacy preserving fraud detection,” in Proc. 19th Int. Middleware Conf. Industry, Dec. 2018, pp. 25–31.
Lebichot, B., Verhelst, T., Le Borgne, Y. A., He-Guelton, L., Oble, F., and Bontempi, G., “Transfer learning strategies for credit card fraud detection,” IEEE Access, vol. 9, pp. 114754–114766, 2021.
Nguyen, D. C., Ding, M., Pham, Q. V., Pathirana, P. N., Le, L. B., Seneviratne, A., Li, J., Niyato, D., and Poor, H. V., “Federated learning meets blockchain in edge computing: Opportunities and challenges,” IEEE Internet of Things Journal, vol. 8, no. 16, pp. 12806–12825, 2021.
Joyson, A., “Credit card fraud identification using machine learning algorithm,” The Journal of Contemporary Issues in Business and Government, 2021.
Kaleel, A., and Polkowski, Z., “Credit card fraud detection and identification using machine learning techniques,” Wasit Journal of Computer and Mathematics Science, vol. 2, no. 4, pp. 159–165, 2023.
Yachamaneni, T., Kotadiya, U., and Arora, A. S., “A deep learning-based framework for detecting synthetic identity fraud in digital credit card applications,” International Journal of Emerging Research in Engineering and Technology, vol. 4, no. 4, pp. 43–52, 2023.
Maniraj, S. P., Saini, A., Ahmed, S., and Sarkar, S., “Credit card fraud detection using machine learning and data science,” International Journal of Engineering Research, vol. 8, no. 9, pp. 110–115, 2019.
S. Gore, P. Kumar Mishra and S. Gore, "Improvisation of Food Delivery Business by Leveraging Ensemble Learning with Various Algorithms," 2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS), Erode, India, 2023, pp. 221-229, doi: 10.1109/ICSSAS57918.2023.10331669.
Alarfaj, F. K., Malik, I., Khan, H. U., Almusallam, N., Ramzan, M., and Ahmed, M., “Credit card fraud detection using state-of-the-art machine learning and deep learning algorithms,” IEEE Access, vol. 10, pp. 39700–39715, 2022.
S. Gore, I. Dutt, D. Shyam Prasad, C. Ambhika, A. Sundaram and D. Nagaraju, "Exploring the Path to Sustainable Growth with Augmented Intelligence by Integrating CSR into Economic Models," 2023 Second International Conference on Augmented Intelligence and Sustainable Systems (ICAISS), Trichy, India, 2023, pp. 265-271, doi: 10.1109/ICAISS58487.2023.10250636.
Yee, O. S., Sagadevan, S., and Malim, N. H. A. H., “Credit card fraud detection using machine learning as data mining technique,” Journal of Telecommunication, Electronic and Computer Engineering (JTEC), vol. 10, no. 1–4, pp. 23–27, 2018.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.


