Federated Edge Computing for Privacy-Preserving Analytics in Healthcare and IoT Systems |
||
![]() |
![]() |
|
© 2025 by IJCTT Journal | ||
Volume-73 Issue-1 |
||
Year of Publication : 2025 | ||
Authors : Ravi Kumar Vankayalapati, P.R. Sudha Rani, Shashikala Valiki, Venkata Krishna Azith Teja Ganti | ||
DOI : 10.14445/22312803/IJCTT-V73I1P110 |
How to Cite?
Ravi Kumar Vankayalapati, P.R. Sudha Rani, Shashikala Valiki, Venkata Krishna Azith Teja Ganti, "Federated Edge Computing for Privacy-Preserving Analytics in Healthcare and IoT Systems," International Journal of Computer Trends and Technology, vol. 73, no. 1, pp. 80-90, 2025. Crossref, https://doi.org/10.14445/22312803/IJCTT-V73I1P110
Abstract
Federated Learning and Edge Computing, also known as Federated Edge Computing, have emerged as breakthrough technologies that enhance the privacy of patients and overall data privacy compliance. Federated Learning has been developed as a distributed learning approach to train machine learning models that exchange and learn only the model parameters from different databases. At the same time, the data remains local to the clients, hence avoiding the possibility of privacy erosion. The combination of Federated Learning and Edge Computing essentially extends the aggregation of learning parameters happening in Federated Learning from traditional edge nodes to increasingly underutilized resources at mobile phones, IoT, or other devices acting as smaller-scale edge nodes. A lot of work has been published to improve machine learning in a federated learning environment. Privacy, especially in the healthcare domain and in IoT, is a vital issue. More and more data is collected by IoT sensors, wearables, tablets, networks, compute resources, and even facilities. The collected data can range from energy management, visitor monitoring, equipment performance analytics, home/building security, surveillance, and even patient vitals, among others. There are many challenges in storing and processing this data. Given its sensitive nature, this data must be securely stored. They should possibly also be computed upon, creating insights or making decisions based on the data before importing it to less secure environments. In addition, compliance with privacy rules and regulations transmitted in healthcare communication acts must be met when storing and processing medical data/protected health information. Federated Learning provides a model set to instantiate and execute. In contrast, federated edge computing provides an instantiation on edge hardware to run the workloads and functionalities in a federated learning environment. With federated learning, all the processing of data, specifically medical data, will be kept within pockets of edge nodes themselves. Thus, this approach addresses safe and secure processing and the privacy of the user, patient, or community being observed.
Keywords
Federated Learning, Edge Computing, Federated Edge Computing, Data Privacy Compliance, Distributed Learning, Model Parameters Exchange, Local Data Processing, Privacy Erosion Prevention, Healthcare Privacy, IoT Sensors, Wearables, Mobile Edge Nodes, Data Security, Medical Data Processing, Protected Health Information, Privacy Regulations, Edge Node Aggregation, Secure Data Storage, Healthcare Communication Compliance, Patient Vitals Monitoring.
Reference
[1] Ramanakar Reddy Danda, “Financial Services in the Capital Goods Sector: Analyzing Financing Solutions for Equipment Acquisition,” Library Progress International, vol. 44, no. 3, pp. 25066-25075, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Rama Chandra Rao Nampalli, and Shakir Syed, “AI-Enabled Rail Electrification and Sustainability: Optimizing Energy Usage with Deep Learning Models,” Letters in High Energy Physics, vol. 2024, pp. 822-831, 2024.
[Google Scholar] [Publisher Link]
[3] Shakir Syed, “Enhancing School Bus Engine Performance: Predictive Maintenance and Analytics for Sustainable Fleet Operations,” Library Progress International, vol. 44, no. 3, pp. 17765-17775, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Manikanth Sarisa et al., “Stock Market Prediction Through AI: Analyzing Market Trends With Big Data Integration,” Migration Letters, vol. 21, no. 4, pp. 1846-1859, 2024.
[Google Scholar] [Publisher Link]
[5] Rajesh Kumar Malviya et al., “Evolving Neural Network Designs with Genetic Algorithms: Applications in Image Classification, NLP, and Reinforcement Learning,” Global Research and Development Journals, vol. 9, no. 12, pp. 9-19, 2024.
[Publisher Link]
[6] Ramanakar Reddy Danda et al., “AI and Deep Learning Techniques for Health Plan Satisfaction Analysis and Utilization Patterns in Group Policies,” International Journal of Medical Toxicology & Legal Medicine, vol. 27, no. 2, pp. 422-431, 2024.
[Google Scholar] [Publisher Link]
[7] Rama Chandra Rao Nampalli, “Leveraging AI and Deep Learning for Predictive Rail Infrastructure Maintenance: Enhancing Safety and Reducing Downtime,” International Journal of Engineering and Computer Science, vol. 12, no. 12, pp. 26014-26027, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Shakir Syed, “Planet 2050 and the Future of Manufacturing: Data-Driven Approaches to Sustainable Production in Large Vehicle Manufacturing Plants,” Journal of Computational Analysis and Applications, vol. 33, no. 8, pp. 799-808, 2024.
[Google Scholar] [Publisher Link]
[9] Hemanth Kumar Gollangi et al., “Data Engineering Solutions: The Impact of AI and ML on ERP Systems and Supply Chain Management,” Nanotechnology Perceptions, vol. 20, no. S9, pp. 1-13, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Shaik Abdul Kareem et al., “Neural Transformers for Zero-Day Threat Detection in Real-Time Cybersecurity Network Traffic Analysis,” International Journal of Global Innovations and Solutions, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Ramanakar Reddy Danda et al., “Smart Medicine: The Role of Artificial Intelligence and Machine Learning in Next-Generation Healthcare Innovation,” South Eastern European Journal of Public Health, vol. 25, no. 1, pp. 1693-1703, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Rama Chandra Rao Nampalli, “Moderlizing AI Applications in Ticketing and Reservation Systems: Revolutionizing Passenger Transport Services,” Journal for ReAttach Therapy and Developmental Diversities, vol. 6, no. 10, pp. 2547-2554, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Shakir Syed, “Big Data Analytics in Heavy Vehicle Manufacturing: Advancing Planet 2050 Goals for a Sustainable Automotive Industry,” Journal for ReAttach Therapy and Developmental Diversities, vol. 6, no. 10, pp. 2555-2563, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Chandrakanth Rao Madhavaram et al., “The Future of Automotive Manufacturing: Integrating AI, ML, and Generative AI for Next-Gen Automatic Cars,” International Multidisciplinary Research Journal Reviews, vol. 1, no. 1, pp. 20-28, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Pradeep Chintale et al., “Levy Flight Osprey Optimization Algorithm for Task Scheduling in Cloud Computing,” International Conference on Intelligent Algorithms for Computational Intelligence Systems, Hassan, India, pp. 1-5, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Ramanakar Reddy Danda, “Decision-Making in Medicare Prescription Drug Plans: A Generative AI Approach to Consumer Behavior Analysis,” Journal for ReAttach Therapy and Developmental Diversities, vol. 6, no. 10, pp. 2587-2598, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Rama Chandra Rao Nampalli, “Neural Networks for Enhancing Rail Safety and Security: Real-Time Monitoring and Incident Prediction,” Journal of Artificial Intelligence and Big Data, vol. 2, no. 1, pp. 49-63, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Shakir Syed, “Zero Carbon Manufacturing in the Automotive Industry: Integrating Predictive Analytics to Achieve Sustainable Production,” Journal of Artificial Intelligence and Big Data, vol. 3, no. 1, pp. 17-28, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Siddharth Konkimalla et al., “A Comparative Analysis of Network Intrusion Detection Using Different Machine Learning Techniques,” Journal of Contemporary Education Theory & Artificial Intelligence, pp. 1-7, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Shaik Abdul Kareem, Ram Chandra Sachan, and Rajesh Kumar Malviya, “AI-Driven Adaptive Honeypots for Dynamic Cyber Threats,” SSRN, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Ramanakar Reddy Danda, “Generative AI in Designing Family Health Plans: Balancing Personalized Coverage and Affordability,” Utilitas Mathematica, vol. 121, pp. 316-332, 2024.
[Google Scholar] [Publisher Link]
[22] Rama Chandra Rao Nampalli, and Balaji Adusupalli, “Using Machine Learning for Predictive Freight Demand and Route Optimization in Road and Rail Logistics,” Library Progress International, vol. 44, no. 3, pp. 17754-17764, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Shakir Syed, “Sustainable Manufacturing Practices for Zero-Emission Vehicles: Analyzing the Role of Predictive Analytics in Achieving Carbon Neutrality,” Utilitas Mathematica, vol. 121, pp. 333-351, 2024.
[Google Scholar] [Publisher Link]
[24] Janardhana Rao Sunkara et al., “Optimizing Cloud Computing Performance with Advanced DBMS Techniques: A Comparative Study,” Journal for ReAttach Therapy and Developmental Diversities, vol. 6, no. 10, pp. 2493-2502, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Pradeep Chintale et al., “Leveraging Aiml Ops for Fraud Detection and Prevention in Fintech,” Journal of Harbin Engineering University, vol. 45, no. 9, pp. 70-75, 2024.
[Google Scholar] [Publisher Link]
[26] Chandrashekar Pandugula et al., “Omni-Channel Retail: Leveraging Machine Learning for Personalized Customer Experiences and Transaction Optimization,” Utilitas Mathematica, vol. 121, pp. 389-401, 2024.
[Google Scholar] [Publisher Link]
[27] Seshagirirao Lekkala, Raghavaiah Avula, and Priyanka Gurijala, “Next-Gen Firewalls: Enhancing Cloud Security with Generative AI,” Journal of Artificial Intelligence & Cloud Computing, vol. 3, no. 4, pp. 1-9, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Ravi Kumar Vankayalapati et al., “Unifying Edge and Cloud Computing: A Framework for Distributed AI and Real-Time Processing,” Journal for ReAttach Therapy and Developmental Diversities, vol. 6, no. 9, pp. 1913-1926, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Tulasi Naga Subhash Polineni et al., “AI-Driven Insights Into End-of-Life Decision-Making: Ethical, Legal, and Clinical Perspectives on Leveraging Machine Learning to Improve Patient Autonomy and Palliative Care Outcomes,” Migration Letters, vol. 19, no. 6, pp. 1159 1172, 2022.
[Google Scholar] [Publisher Link]
[30] Kiran Kumar Maguluri et al., “Advancing Pain Medicine with AI and Neural Networks: Predictive Analytics and Personalized Treatment Plans for Chronic and Acute Pain Managements,” Journal of Artificial Intelligence and Big Data, vol. 2, no. 1, pp. 112-126, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Srinivas Kalisetty, Chandrashekar Pandugula, and Goli Mallesham, “Leveraging Artificial Intelligence to Enhance Supply Chain Resilience: A Study of Predictive Analytics and Risk Mitigation Strategies,” Journal of Artificial Intelligence and Big Data, vol. 3, no. 1, pp. 29-45, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Lakshminarayana Reddy Kothapalli Sondinti et al., “Towards Quantum-Enhanced Cloud Platforms: Bridging Classical and Quantum Computing for Future Workloads,” Journal for ReAttach Therapy and Developmental Diversities, vol. 6, no. 10, pp. 492-504, 2023.
[CrossRef] [Publisher Link]
[33] Seshagirirao Lekkala, Raghavaiah Avula, and Priyanka Gurijala, “Big Data and AI/ML in Threat Detection: A New Era of Cybersecurity,” Journal of Artificial Intelligence and Big Data, vol. 2, no. 1, pp. 32-48, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Dilip Kumar Vaka, “Procurement 4.0: Leveraging Technology for Transformative Processes,” Journal of Scientific and Engineering Research, vol. 11, no. 3, pp. 278-282, 2024.
[Google Scholar] [Publisher Link]
[35] Seshagirirao Lekkala, and Priyanka Gurijala, “Establishing Robust Perimeter Defenses,” Security and Privacy for Modern Networks: Strategies and Insights for Safeguarding Digital Infrastructures, pp. 133-142, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Dilip Kumar Vaka, and Rajesh Azmeera, “Transitioning to S/4HANA: Future Proofing of cross industry Business for Supply Chain Digital Excellence,” International Journal of Science and Research, vol. 13, no. 4, pp. 488-494, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Dilip Kumar Vaka, “Enhancing Supplier Relationships: Critical Factors in Procurement Supplier Selection,” Journal of Artificial Intelligence, Machine Learning and Data Science, vol. 2, no. 1, pp. 229-233, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[38] Priyanka Gurijala, and Seshagirirao Lekkala, “Securing Networks with SDN and SD-WAN,” Security and Privacy for Modern Networks: Strategies and Insights for Safeguarding Digital Infrastructures, pp. 121-131, 2024.
[Publisher Link]
[39] Dilip Kumar Vaka, “From Complexity to Simplicity: AI’s Route Optimization in Supply Chain Management,” Journal of Artificial Intelligence, Machine Learning and Data Science, vol. 2, no. 1, pp. 386-389, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Tulasi Naga Subhash Polineni et al., “AI-Driven Automation in Monitoring Post-Operative Complications Across Health Systems,” Global Journal of Medical Case Reports, vol. 2, no. 1, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Seshagirirao Lekkala, and Priyanka Gurijala, “Cloud and Virtualization Security Considerations,” Security and Privacy for Modern Networks: Strategies and Insights for Safeguarding Digital Infrastructures, pp. 143-154, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Dilip Kumar Vaka, “Integrating Inventory Management and Distribution: A Holistic Supply Chain Strategy,” International Journal of Managing Value and Supply Chains, vol. 15, no. 2, pp. 13-23, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[43] Seshagirirao Lekkala, and Priyanka Gurijala, Leveraging AI and Machine Learning for Cyber Defense,” Security and Privacy for Modern Networks: Strategies and Insights for Safeguarding Digital Infrastructures, pp. 167-179, 2024.
[CrossRef] [Google Scholar] [Publisher Link]