Federated Learning for Privacy-Aware Ubiquitous Applications
Raami RiadhusinDepartment of Computers Techniques Engineering, College of Technical Engineering, Islamic University of Najaf, Najaf, Iraq; Department of Computers Techniques Engineering, College of Technical Engineering, Islamic University of Najaf of Al Diwaniyah, Al Diwaniyah, Iraq. iu.tech.eng.ramy_riad@iunajaf.edu.iq0009-0000-7956-3567
Ahmed Hussien AhmedCollege of Engineering Technique, Al-Farahidi University, Baghdad, Iraq. ahmedhussien@uoalfarahidi.edu.iq0009-0009-4928-2882
P. RajanDepartment of Marine Engineering, AMET University, Kanathur, Tamil Nadu, India. prabhakaranrajan@ametuniv.ac.in0009-0006-9720-123X
Dr. Reema MathewDepartment of Computer Science and Engineering (Cybersecurity), Vimal Jyothi Engineering College, Chemperi, Kannur, Kerala, India. reemamathew@vjec.ac.in0000-0003-2099-3516
S.S. SivasankariSenior Assistant Professor, Department of Artificial Intelligence and Machine Learning, New Horizon College of Engineering, Bengaluru, India. yes.sivasankari@gmail.com0009-0000-8801-819X
T. SubalaxmiAssistant Professor, Department of Computer Science and Engineering, K.S. Rangasamy College of Technology, Tiruchengode, India. subalaxmi@ksrct.ac.in0009-0008-3148-0453
Abdurakhimova Zulaykho Ikromjon KiziTuran International University, Namangan, Uzbekistan. zulaykhoabdurakhimova96@gmile.com0009-0006-1885-4102
Federated Learning (FL) has emerged as a suitable option for collaborative, user-centric machine learning while protecting sensitive user data. FL differs significantly from traditional centralized frameworks that collect raw data on a central server. FL focuses on collecting model updates generated locally on edge devices. With traditional FL approaches, data must be downloaded to a central server for model training. In contrast, training occurs on the edge and only model updates are sent. This decentralized framework, unlike traditional FL approaches, is ideal for ubiquitous applications—systems woven seamlessly into everyday surroundings like smart homes, advanced mobile devices, and IoT systems—where sensitive data is constantly and automatically generated. In these systems, user privacy is paramount, and advanced methods must be implemented to ensure privacy and system efficacy. This paper discusses the integration of FL into ubiquitous environments, addressing the relevance, advantages, and disadvantages of this approach. I’d like to focus on privacy-preserving methods, but their preservation against data leakage and adversary attacks adds significant value. There are case studies to show the challenges encountered, lessons learned, and the use of FL within privacy-centric ubiquitous systems. In closing this paper, I summarize the key points and underscore the transformational potential of FL for privacy-sensitive, innovative systems. I also promote further research in this area to support its practical relevance. This paper demonstrates that among the many approaches to privacy within pervasive computing, FL is the only one that is practical and scalable.