Privacy-Preserving Technologies in Edge Analytics: Architectures, Mechanisms, and Performance Frontiers

Authors

  • Naresh Kalimuthu Independent Researcher, USA. Author

DOI:

https://doi.org/10.63282/3050-9262.IJAIDSML-V7I1P107

Keywords:

Edge Computing, Privacy-Preserving Analytics, Federated Learning, Differential Privacy, Split Learning, Swarm Learning, Homomorphic Encryption, Non-IID Data

Abstract

The shift of data analytics from centralized clouds to the network edge enhances latency and bandwidth efficiency, but it also raises significant privacy concerns. As sensitive biometric, behavioral, and operational data are gathered on resource-limited IoT devices, traditional security measures become outdated. This paper explores the main challenges in securing edge analytics, emphasizing the "Privacy-Utility Paradox" and the risks of inference attacks. It provides a detailed analysis of distributed learning architectures—Federated Learning (FL), Split Learning (SL), and Swarm Learning—and assesses cryptographic techniques such as Differential Privacy (DP), Homomorphic Encryption (HE), and Secure Multi-Party Computation (SMPC). Based on recent quantitative research, we propose mitigation strategies that balance accuracy, latency, and energy use, guiding the development of compliant and trustworthy edge intelligence systems.

References

[1] M. Abadi et al., "Deep Learning with Differential Privacy," in Proc. of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, pp. 308–318. doi: 10.1145/2976749.2978318

[2] P. Voigt and A. von dem Bussche, The EU General Data Protection Regulation (GDPR): A Practical Guide, Springer International Publishing, 2017. doi: 10.1007/978-3-319-57959-7

[3] R. Shokri, M. Stronati, C. Song, and V. Shmatikov, "Membership Inference Attacks Against Machine Learning Models," in IEEE Symposium on Security and Privacy (SP), 2017, pp. 3–18. doi: 10.1109/SP.2017.41

[4] K. Bonawitz et al., "Practical Secure Aggregation for Privacy-Preserving Machine Learning," in Proc. of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 1175–1191. doi: 10.1145/3133956.3133982

[5] Richard Kim, Max Kleiman-Weiner, Andrés Abeliuk, Edmond Awad, Sohan Dsouza, Joshua B. Tenenbaum, and Iyad Rahwan. 2018. A Computational Model of Commonsense Moral Decision Making. In Proceedings of the 2018 AAAI/ACM Conference on AI, Ethics, and Society (AIES '18). Association for Computing Machinery, New York, NY, USA, 197–203. https://doi.org/10.1145/3278721.3278770

[6] Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., & Chandra, V. (2018). Federated Learning with Non-IID Data. ArXiv. https://doi.org/10.48550/arXiv.1806.00582

[7] Vepakomma, P., Gupta, O., Swedish, T., & Raskar, R. (2018). Split learning for health: Distributed deep learning without sharing raw patient data. ArXiv. https://arxiv.org/abs/1812.00564

[8] Zhu, L., Liu, Z., & Han, S. (2019). Deep Leakage from Gradients. ArXiv. https://arxiv.org/abs/1906.08935

[9] A. Salem et al., "ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models," in Network and Distributed System Security Symposium (NDSS), 2019. doi: 10.14722/ndss.2019.23119

[10] Singh, A., Vepakomma, P., Gupta, O., & Raskar, R. (2019). Detailed comparison of communication efficiency of split learning and federated learning. ArXiv. https://arxiv.org/abs/1909.09145

[11] T. Li, A. K. Sahu, A. Talwalkar and V. Smith, "Federated Learning: Challenges, Methods, and Future Directions," in IEEE Signal Processing Magazine, vol. 37, no. 3, pp. 50-60, May 2020, doi: 10.1109/MSP.2020.2975749.

[12] W. Y. B. Lim et al., "Federated Learning in Mobile Edge Networks: A Comprehensive Survey," IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 2031–2063, 2020. doi: 10.1109/COMST.2020.2986024

[13] X. Wang, Y. Han, V. C. M. Leung, D. Niyato, X. Yan, and X. Chen, "Convergence of Edge Computing and Deep Learning: A Comprehensive Survey," IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 869–904, 2020. doi: 10.1109/COMST.2020.2970550

[14] Li, T., Sahu, A. K., Zaheer, M., Sanjabi, M., Talwalkar, A., & Smith, V. (2018). Federated Optimization in Heterogeneous Networks. ArXiv. https://arxiv.org/abs/1812.06127

[15] C. Thapa, M. A. P. Chamikara, and S. Camtepe, "SplitFed: When Federated Learning Meets Split Learning," arXiv preprint arXiv:2004.12088, 2020. doi: 10.48550/arXiv.2004.12088

[16] P. Kairouz et al., "Advances and Open Problems in Federated Learning," Foundations and Trends® in Machine Learning, vol. 14, no. 1–2, pp. 1–210, 2021. doi: 10.1561/2200000083

[17] Zhang, C., Xie, Y., Bai, H., Yu, B., Li, W., & Gao, Y. (2021). A survey on federated learning. Knowledge-Based Systems, 216, 106775. https://doi.org/10.1016/j.knosys.2021.106775

[18] H. Yin, A. Mallya, A. Vahdat, J. M. Alvarez, J. Kautz and P. Molchanov, "See through Gradients: Image Batch Recovery via GradInversion," 2021 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Nashville, TN, USA, 2021, pp. 16332-16341, doi: 10.1109/CVPR46437.2021.01607.

[19] V. Turina, Z. Zhang, F. Esposito, and I. Matta, "Federated or Split? A Performance and Privacy Analysis of Hybrid Split and Federated Learning Architectures," in IEEE International Conference on Cloud Computing (CLOUD), 2021. doi: 10.1109/CLOUD49388.2021.00069

[20] S. Warnat-Herresthal et al., "Swarm Learning for Decentralized and Confidential Clinical Machine Learning," Nature, vol. 594, pp. 265–270, 2021. doi: 10.1038/s41586-021-03583-3

[21] Wu, Yulei & Choo, Kim-Kwang Raymond & Yang, Laurence. (2019). IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management. IEEE Access. 7. 65223-65227. 10.1109/ACCESS.2019.2915489.

[22] J. Zhang et al., "Secure Aggregation Techniques in Federated Learning," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 1–15, 2023. doi: 10.1109/TIFS.2023.3235652

[23] Nguyen, T. T., Huynh, T. T., Ren, Z., Nguyen, T. T., Nguyen, P. L., Yin, H., & Nguyen, Q. V. (2024). A Survey of Privacy-Preserving Model Explanations: Privacy Risks, Attacks, and Countermeasures. ArXiv. https://arxiv.org/abs/2404.00673

[24] Behnia, R., Riasi, A., Ebrahimi, R., Chow, S. S., Padmanabhan, B., & Hoang, T. (2023). Efficient Secure Aggregation for Privacy-Preserving Federated Machine Learning. ArXiv. https://arxiv.org/abs/2304.03841

[25] Tae Hyun Kim, Jae Yong Yu, Won Seok Jang, Sun Cheol Heo, MinDong Sung, JaeSeong Hong, KyungSoo Chung, Yu Rang Park, PPFL: A personalized progressive federated learning method for leveraging different healthcare institution-specific features, iScience, Volume 27, Issue 10, 2024. https://doi.org/10.1016/j.isci.2024.110943.

[26] Xiao, D., Fan, X., & Chen, L. (2025). Top-k Shuffled Differential Privacy Federated Learning for Heterogeneous Data. Sensors, 25(5), 1441. https://doi.org/10.3390/s25051441

[27] Giehl, Alexander & Schneider, Peter & Busch, Maximilian & Schnoes, Florian & Kleinwort, Robin & Zaeh, Michael. (2019). Edge-computing enhanced privacy protection for industrial ecosystems in the context of SMEs. 1-6. 10.1109/CMI48017.2019.8962138.

[28] J. Liu et al., "FedEVA: Federated Learning for Edge Video Analytics," arXiv preprint arXiv:2401.08872, 2024. doi: 10.48550/arXiv.2401.08872.

Published

2026-01-20

Issue

Section

Articles

How to Cite

1.
Kalimuthu N. Privacy-Preserving Technologies in Edge Analytics: Architectures, Mechanisms, and Performance Frontiers . IJAIDSML [Internet]. 2026 Jan. 20 [cited 2026 Jan. 23];7(1):29-33. Available from: https://ijaidsml.org/index.php/ijaidsml/article/view/400