Federated Learning for Cybersecurity in Edge and Cloud Computing
DOI:
https://doi.org/10.47941/ijce.1829Keywords:
Federated Learning, Cybersecurity, Edge Computing, Cloud Computing, Machine Learning, Privacy-PreservingAbstract
Purpose: The article explores the integration of federated learning within edge and cloud computing frameworks to address complex cybersecurity challenges. It aims to illustrate how federated learning, by enabling collaborative model training across decentralized devices without data exchange, can serve as an effective mechanism for enhancing cybersecurity defenses. This study investigates the potential of federated learning to improve privacy-preserving data analysis and augment real-time threat detection capabilities in the context of the growing Internet of Things (IoT) ecosystem.
Methodology: The research delves into the conceptual framework of federated learning, examining its application in cybersecurity contexts through a detailed literature review and theoretical analysis. It evaluates the benefits and limitations of federated learning in enhancing data privacy and reducing latency in threat detection. Furthermore, the article assesses the technical and security challenges of implementing federated learning, including communication overhead, model aggregation complexities, and vulnerability to model poisoning, through qualitative analysis.
Findings: The study finds that federated learning significantly improves privacy-preserving data analysis and enhances real-time threat detection capabilities by keeping data localized while enabling collaborative learning. However, it also identifies key challenges in deploying federated learning strategies, such as the risk of model poisoning and the complexities involved in model aggregation and communication overhead. The research highlights the need for robust mechanisms to address these challenges to fully leverage federated learning in cybersecurity.
Unique Contribution to Theory, Policy, and Practice: This article contributes uniquely to the theoretical understanding of federated learning as a cybersecurity measure, offering a comprehensive analysis of its applications, benefits, and limitations within edge and cloud computing environments. Practically, it provides insights for cybersecurity professionals and researchers on integrating federated learning into existing cybersecurity frameworks to enhance data privacy and threat detection. The article recommends further exploration into combining federated learning with other cutting-edge technologies to develop resilient cybersecurity measures. Additionally, it suggests that policymakers should consider the implications of federated learning on data privacy regulations and cybersecurity standards. Through its thorough examination of federated learning's potential and challenges, the article offers valuable recommendations for fortifying cybersecurity frameworks in an increasingly interconnected world.
Downloads
References
H. B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, "Communication-Efficient Learning of Deep Networks from Decentralized Data," in Artificial Intelligence and Statistics, 2017.
J. Konečný, H. B. McMahan, F. X. Yu, P. Richtárik, A. T. Suresh, and D. Bacon, "Federated Learning: Strategies for Improving Communication Efficiency," in Proceedings of the NIPS Workshop on Private Multi-Party Machine Learning, 2016.
Y. Li, J. Yu, G. Zhao, Q. Wang, and J. Zhao, "The Application of Federated Learning in Mobile Edge Computing: A Survey," Comput. Netw., vol. 162, 2020.
D. T. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato, H. V. Poor, and H. V. Poor, "Federated Learning for Internet of Things: A Comprehensive Survey," IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 2031-2063, Third Quarter 2020.
H. B. McMahan, E. Moore, D. Ramage, and B. A. y Arcas, "Federated Learning of Deep Networks using Model Averaging," CoRR, vol. abs/1602.05629, 2016.
J. Konečný, H. B. McMahan, D. Ramage, and P. Richtárik, "Federated Optimization: Distributed Machine Learning for On-Device Intelligence," CoRR, vol. abs/1610.02527, 2016.
D. Evans, V. Kolesnikov, and M. Rosulek, "A Pragmatic Introduction to Secure Multi-Party Computation," Foundations and Trends® in Privacy and Security, vol. 2, no. 2-3, pp. 70-246, 2018.
L. Lyu, X. Yu, and Q. Yang, "Threats to Federated Learning: A Survey," in International Journal of Intelligent Systems, vol. 35, no. 1, pp. 142-168, 2020.
D. T. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato, H. V. Poor, and H. V. Poor, "Federated Learning for Internet of Things: A Comprehensive Survey," IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 2031-2063, Third Quarter 2020.
Y. Li, J. Yu, G. Zhao, Q. Wang, and J. Zhao, "The Application of Federated Learning in Mobile Edge Computing: A Survey," Comput. Netw., vol. 162, 2020.
F. Briggs, X. Fan, and P. Andras, "Federated Learning for Anomaly Detection in Industrial IoT," IEEE Access, vol. 8, pp. 74720-74733, 2020.
Q. Yang, Y. Liu, T. Chen, and Y. Tong, "Federated Machine Learning: Concept and Applications," ACM Transactions on Intelligent Systems and Technology (TIST), vol. 10, no. 2, Article 12, Jan. 2019.
J. Konečný, H. B. McMahan, D. Ramage, and P. Richtárik, "Federated Optimization: Distributed Machine Learning for On-Device Intelligence," CoRR, vol. abs/1610.02527, 2016.
V. Smith, C.-K. Chiang, M. Sanjabi, and A. S. Talwalkar, "Federated Multi-Task Learning," in Advances in Neural Information Processing Systems (NIPS), 2017.
E. Bagdasaryan, A. Veit, Y. Hua, D. Estrin, and V. Shmatikov, "How to Backdoor Federated Learning," in Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics (AISTATS), 2019.
J T. Li, A. K. Sahu, A. Talwalkar, and V. Smith, "Federated Learning: Challenges, Methods, and Future Directions," IEEE Signal Processing Magazine, vol. 37, no. 3, pp. 50-60, May 2020.
R. C. Geyer, T. Klein, and M. Nabi, "Differentially Private Federated Learning: A Client Level Perspective," arXiv preprint arXiv:1712.07557, 2017.
R. Shokri and V. Shmatikov, "Privacy-Preserving Deep Learning," in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015.
K. Bonawitz et al., "Practical Secure Aggregation for Privacy-Preserving Machine Learning," in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017.
S. Samarakoon, M. Bennis, W. Saad, and M. Debbah, "Federated Learning for Ultra-Reliable Low-Latency V2V Communications," in IEEE Global Communications Conference (GLOBECOM), 2018.
H. B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas, "Communication-Efficient Learning of Deep Networks from Decentralized Data," in Artificial Intelligence and Statistics (AISTATS), 2017.
M. A. Pathak, S. Rane, and B. Raj, "Homomorphic Encryption and Applications," in Springer Briefs in Computer Science, 2014.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Phani Sekhar Emmanni
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.