{"id":"https://openalex.org/W4312743089","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927802","title":"Privacy Preservation using Federated Learning and Homomorphic Encryption: A Study","display_name":"Privacy Preservation using Federated Learning and Homomorphic Encryption: A Study","publication_year":2022,"publication_date":"2022-09-12","ids":{"openalex":"https://openalex.org/W4312743089","doi":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927802"},"language":"en","primary_location":{"id":"doi:10.1109/dasc/picom/cbdcom/cy55231.2022.9927802","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927802","pdf_url":null,"source":{"id":"https://openalex.org/S4363605495","display_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001458101","display_name":"D M Ajay","orcid":null},"institutions":[{"id":"https://openalex.org/I96211989","display_name":"HCL Technologies (India)","ror":"https://ror.org/02nbb5780","country_code":"IN","type":"company","lineage":["https://openalex.org/I96211989"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ajay D M","raw_affiliation_strings":["HCL Technologies,Engineering and R&#x0026;D Services (ERS) Research,Chennai,India"],"affiliations":[{"raw_affiliation_string":"HCL Technologies,Engineering and R&#x0026;D Services (ERS) Research,Chennai,India","institution_ids":["https://openalex.org/I96211989"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5001458101"],"corresponding_institution_ids":["https://openalex.org/I96211989"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15874811,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9086651802062988},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7631210088729858},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5751546025276184},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5199533700942993},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.48927637934684753},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4364360272884369}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9086651802062988},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7631210088729858},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5751546025276184},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5199533700942993},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.48927637934684753},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4364360272884369}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dasc/picom/cbdcom/cy55231.2022.9927802","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dasc/picom/cbdcom/cy55231.2022.9927802","pdf_url":null,"source":{"id":"https://openalex.org/S4363605495","display_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":73,"referenced_works":["https://openalex.org/W1518622464","https://openalex.org/W1520914943","https://openalex.org/W1534388293","https://openalex.org/W1970823784","https://openalex.org/W2031533839","https://openalex.org/W2043944888","https://openalex.org/W2132172731","https://openalex.org/W2159015104","https://openalex.org/W2295292576","https://openalex.org/W2309997581","https://openalex.org/W2572504188","https://openalex.org/W2767970885","https://openalex.org/W2781091734","https://openalex.org/W2784621220","https://openalex.org/W2795097198","https://openalex.org/W2801958627","https://openalex.org/W2810065831","https://openalex.org/W2949073274","https://openalex.org/W2963844355","https://openalex.org/W2970606380","https://openalex.org/W2981645102","https://openalex.org/W2990595670","https://openalex.org/W3000479830","https://openalex.org/W3004155269","https://openalex.org/W3014538993","https://openalex.org/W3019437576","https://openalex.org/W3048715803","https://openalex.org/W3084847664","https://openalex.org/W3087391814","https://openalex.org/W3088309363","https://openalex.org/W3088384496","https://openalex.org/W3090107331","https://openalex.org/W3094542121","https://openalex.org/W3100779497","https://openalex.org/W3111919937","https://openalex.org/W3133856821","https://openalex.org/W3140753276","https://openalex.org/W3163960008","https://openalex.org/W3164712068","https://openalex.org/W3167424384","https://openalex.org/W3185309611","https://openalex.org/W3185987447","https://openalex.org/W3191470662","https://openalex.org/W3203932036","https://openalex.org/W3206162503","https://openalex.org/W3213815372","https://openalex.org/W4205423013","https://openalex.org/W4206320562","https://openalex.org/W4206573848","https://openalex.org/W4207073300","https://openalex.org/W4210630464","https://openalex.org/W4210968720","https://openalex.org/W4220928404","https://openalex.org/W4285554319","https://openalex.org/W4288563649","https://openalex.org/W4288578176","https://openalex.org/W4289129300","https://openalex.org/W4328028979","https://openalex.org/W6747855403","https://openalex.org/W6748321238","https://openalex.org/W6752600739","https://openalex.org/W6756766609","https://openalex.org/W6758201434","https://openalex.org/W6763116988","https://openalex.org/W6763736615","https://openalex.org/W6770634426","https://openalex.org/W6773039429","https://openalex.org/W6790034021","https://openalex.org/W6791468106","https://openalex.org/W6794482448","https://openalex.org/W6798563395","https://openalex.org/W6805491549","https://openalex.org/W6810757738"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W2538581760","https://openalex.org/W3195097297","https://openalex.org/W4225340788","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W2905822832"],"abstract_inverted_index":{"The":[0,59,113],"resurgence":[1],"of":[2,17,43,61,92,115,124,159,180],"Artificial":[3],"Intelligence":[4],"(AI)":[5],"and":[6,19,41,49,133,141,157,174,178],"its":[7],"broader":[8],"adoption":[9],"into":[10],"major":[11,57],"fields":[12],"has":[13,53,69],"revolutionized":[14],"the":[15,39,75,106,130,143,155],"operations":[16],"organizations":[18],"applications.":[20],"AI":[21],"depends":[22],"on":[23,129],"Machine":[24],"Learning":[25,51,63],"(ML)":[26],"models":[27,94],"that":[28,89,145],"are":[29,146],"suitably":[30],"trained":[31],"using":[32],"data":[33,46,97,108,137],"generated":[34],"by":[35],"global":[36,44],"users.":[37],"Preserving":[38],"privacy":[40,76,138,164],"security":[42],"user\u2019s":[45],"in":[47,139,148,166],"ML":[48,67],"Deep":[50],"(DL)":[52],"emerged":[54,70],"as":[55,71],"a":[56,72,85,110,121],"concern.":[58],"advent":[60],"Federated":[62],"(FL)":[64],"-":[65],"an":[66],"paradigm,":[68],"solution":[73],"for":[74],"concerns":[77],"related":[78],"to":[79,109,119],"traditional":[80],"training":[81,87,107],"models.":[82],"FL":[83,140],"is":[84,118],"decentralized":[86],"method":[88],"enables":[90],"computation":[91],"well-trained":[93],"over":[95],"remote":[96],"sources":[98],"located":[99],"at":[100],"different":[101],"geographical":[102],"locations":[103],"without":[104],"sharing":[105],"centralized":[111],"location.":[112],"aim":[114],"this":[116],"study":[117],"provide":[120],"detailed":[122],"understanding":[123],"FL.":[125,167,181],"This":[126,152,168],"work":[127,169],"focuses":[128],"significant":[131],"challenges":[132,173],"attacks":[134],"associated":[135],"with":[136],"also":[142,170],"solutions":[144],"available":[147],"addressing":[149],"these":[150],"attacks.":[151],"paper":[153],"highlights":[154],"features":[156],"importance":[158],"Homomorphic":[160],"Encryption":[161],"(HE)":[162],"towards":[163],"preservation":[165],"discusses":[171],"open":[172],"potential":[175],"future":[176],"scope":[177],"applications":[179]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
