Federated Learning for Secure AI Model Training Across Distributed Networks

Main Article Content

Anil Chowdary Inaganti
Nischal Ravichandran
Rajendra Muppalaneni
Senthil Kumar Sundaramurthy

Abstract

Federated learning (FL) provides a decentralized approach to artificial intelligence (AI) model training, enabling multiple devices or systems to collaboratively train models without sharing raw data. The core challenge lies in maintaining data privacy, security, and the overall efficiency of model convergence across distributed networks. This paper proposes a novel framework for secure federated learning that utilizes advanced encryption techniques, secure aggregation protocols, and differential privacy mechanisms to enhance both privacy and model accuracy. Experimental results from a real-world use case demonstrate the efficiency of this framework, with the proposed model outperforming existing solutions in terms of model convergence speed and privacy protection. The findings suggest that federated learning is a promising paradigm for AI model training in industries that require high data security, such as healthcare and finance.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Chowdary Inaganti, A. ., Ravichandran, N. ., Muppalaneni, R. ., & Kumar Sundaramurthy, S. . (2019). Federated Learning for Secure AI Model Training Across Distributed Networks. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 10(3), 753–787. https://doi.org/10.61841/turcomat.v10i3.15144
Section
Research Articles

References

Devlin, J., Chang, M. W., Lee, K., & Toutanova, K. (2019). BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. NAACL-HLT, 1(1), 4171–4186.

He, K., Zhang, X., Ren, S., & Sun, J. (2019). Bag of Tricks for Image Classification with Convolutional Neural Networks. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 1(1), 558–567.

Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A. N., & Polosukhin, I. (2019). Attention is All You Need. Advances in Neural Information Processing Systems (NeurIPS), 30(1), 5998–6008.

Silver, D., Hubert, T., Schrittwieser, J., Antonoglou, I., Lai, M., Guez, A., ... & Hassabis, D. (2018). A General Reinforcement Learning Algorithm that Masters Chess, Shogi, and Go through Self-Play. Science, 362(6419), 1140–1144.

Gholami, A., Yao, Z., Mahoney, M. W., & Keutzer, K. (2018). A Survey on Deep Learning Hardware: Challenges and Trends. arXiv preprint arXiv:1805.10399, 1(1), 1–21.

Dosovitskiy, A., & Brox, T. (2018). Generating Videos with Scene Dynamics. International Journal of Computer Vision, 126(10), 1073–1088.

Dalal, A., Abdul, S., Kothamali, P. R., & Mahjabeen, F. (2015). Cybersecurity Challenges for the Internet of Things: Securing IoT in the US, Canada, and EU.International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence,6(1), 53-64.

Dalal, A., Abdul, S., Kothamali, P. R., & Mahjabeen, F. (2017). Integrating Blockchain with ERP Systems: Revolutionizing Data Security and Process Transparency in SAP.Revista de Inteligencia Artificial en Medicina,8(1), 66-77.

Dalal, A., Abdul, S., Mahjabeen, F., & Kothamali, P. R. (2018). Advanced Governance, Risk, and Compliance Strategies for SAP and ERP Systems in the US and Europe: Leveraging Automation and Analytics. International Journal of Advanced Engineering Technologies and Innovations, 1(2), 30-43. https://ijaeti.com/index.php/Journal/article/view/577

Kothamali, P. R., & Banik, S. (2019). Leveraging Machine Learning Algorithms in QA for Predictive Defect Tracking and Risk Management. International Journal of Advanced Engineering Technologies and Innovations, 1(4), 103-120.

Banik, S., & Kothamali, P. R. (2019). Developing an End-to-End QA Strategy for Secure Software: Insights from SQA Management. International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, 10(1), 125-155.

Kothamali, P. R., & Banik, S. (2019). Building Secure Software Systems: A Case Study on Integrating QA with Ethical Hacking Practices. Revista de Inteligencia Artificial en Medicina, 10(1), 163-191.

Most read articles by the same author(s)