A Survey of Federated Learning Privacy Preservation Techniques for Malicious Behavior Detection

Faculty Computer Science Year: 2025
Type of Publication: ZU Hosted Pages:
Authors:
Journal: Journal of Information Systems Engineering and Management International Association for Digital Transfor mation and Technological Innovation Volume:
Keywords : , Survey , Federated Learning Privacy Preservation Techniques    
Abstract:
Centralized machine learning requires the centralization of data in one server for model training, the data of individuals must be transmitted to the centralized server using its raw form which resulting in serious privacy and security concerns. Federated learning is a decentralization machine learning technique which improves the issues of security and privacy related to traditional machine learning by enabling local model training on devices without sharing raw data with the centralized server. Federated learning includes multiple clients and one central server. Clients perform training on its own data while the server coordinates the overall federated learning process. In federated learning, raw data never leaves its own place, ensuring data confidentiality. Only local model updates, form each client are transmitted to the central server that organizes the learning process. The server performs aggregation on received local model updates. Following the aggregation process, the global model is then updated by the server. The final global model is used then for evaluation. However federated learning improves privacy along with security of centralized machine learning, it is still targeted by attacks through model updates transmitted between clients and server. To improve privacy along with security related to federated learning, privacy preservation techniques are integrated with federated learning. We propose a survey of privacy preservation techniques combined with federated learning to improve privacy and security and achieve a good balance between utility and privacy. Private Aggregation of Teacher Ensembles, Homomorphic Encryption, as well as Secure Multi-Party Computation represent the most popular used privacy preservation techniques with federated learning for malicious behavior detection.
   
     
 
       

Author Related Publications

  • Eman selim, "Evaluating Model Inversion Attack Success Across Neural Architectures in Federated Learning for Malware Classification", Springer Nature, 2025 More
  • Eman selim, "Privacy-Preserving Federated Learning in Network Intrusion Detection: A Systematic Literature Review", Zagazig University, 2025 More
  • Eman selim, "A Lightweight Android Malware Classifier Using Novel Feature Selection Methods", MDPI, 2020 More
  • Eman selim, "On Malware Detection on Android Smartphones", IJRASET, 2020 More
  • Eman selim, "A Comparative Study of Privacy-Preserving Techniques in Federated Learning: A Performance and Security Analysis", MDPI, 2025 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "Enhanced inter-ASN handover authentication scheme for IEEE 802.16m network", Institution of Engineering and Technology United Kingdom, 2015 More
  • Walid Ibrahim Ibrahim Khedr, "Improved Lightweight Authentication Scheme For Ieee 802.11P Vehicle-to-Infrastructure Communications", Old City Publishing, Inc., USA, 2015 More
  • Ehab Roshdy Mohamed, "Neutrosophic Super-Hypergraph Fusion for Proactive Cyberattack Countermeasures: A Soft Computing Framework", Neutrosophic Sets and Systems, 2025 More
  • Khalied Mohamed Hosny, "Blind Watermarking of Color Medical Images Using Hadamard Transform and Fractional-Order Moments_Sensors", MPDI, 2021 More
  • Nabil Ali Mohamed Lashen, "Blind Watermarking of Color Medical Images Using Hadamard Transform and Fractional-Order Moments_Sensors", MPDI, 2021 More
Tweet