{"id":"https://openalex.org/W7115006543","doi":"https://doi.org/10.48550/arxiv.2512.10341","title":"A Privacy-Preserving Cloud Architecture for Distributed Machine Learning at Scale","display_name":"A Privacy-Preserving Cloud Architecture for Distributed Machine Learning at Scale","publication_year":2025,"publication_date":"2025-12-11","ids":{"openalex":"https://openalex.org/W7115006543","doi":"https://doi.org/10.48550/arxiv.2512.10341"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2512.10341","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.10341","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2512.10341","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Punniyamoorthy, Vinoth","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Punniyamoorthy, Vinoth","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Parthi, Ashok Gadi","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Parthi, Ashok Gadi","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Palanigounder, Mayilsamy","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Palanigounder, Mayilsamy","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Kodali, Ravi Kiran","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kodali, Ravi Kiran","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Kumar, Bikesh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kumar, Bikesh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Kannan, Kabilan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kannan, Kabilan","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.5453000068664551,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.5453000068664551,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.06669999659061432,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.06539999693632126,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7314000129699707},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6380000114440918},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.6161999702453613},{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.5351999998092651},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5063999891281128},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.4456999897956848},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.43880000710487366},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.42239999771118164},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.40380001068115234}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7889000177383423},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7314000129699707},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6380000114440918},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.6161999702453613},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5393000245094299},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.5351999998092651},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5138999819755554},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5063999891281128},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4860000014305115},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.4456999897956848},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.43880000710487366},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.42239999771118164},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.40380001068115234},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.3950999975204468},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.36410000920295715},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.3368000090122223},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.335999995470047},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3334999978542328},{"id":"https://openalex.org/C149810388","wikidata":"https://www.wikidata.org/wiki/Q5374873","display_name":"Emulation","level":2,"score":0.3287000060081482},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.3174000084400177},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3163999915122986},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.29330000281333923},{"id":"https://openalex.org/C98025372","wikidata":"https://www.wikidata.org/wiki/Q477538","display_name":"Systems architecture","level":3,"score":0.28870001435279846},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2883000075817108},{"id":"https://openalex.org/C77967617","wikidata":"https://www.wikidata.org/wiki/Q4677561","display_name":"Active learning (machine learning)","level":2,"score":0.272599995136261},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2630000114440918},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.2619999945163727},{"id":"https://openalex.org/C112972136","wikidata":"https://www.wikidata.org/wiki/Q7595718","display_name":"Stability (learning theory)","level":2,"score":0.2581000030040741},{"id":"https://openalex.org/C204434341","wikidata":"https://www.wikidata.org/wiki/Q357789","display_name":"Adjudication","level":2,"score":0.2535000145435333}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2512.10341","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.10341","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2512.10341","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.10341","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.5181711912155151,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Distributed":[0],"machine":[1,121],"learning":[2,122],"systems":[3,123],"require":[4],"strong":[5],"privacy":[6,80],"guarantees,":[7],"verifiable":[8,56],"compliance,":[9],"and":[10,15,34,47,61,82,118],"scalable":[11],"deployment":[12],"across":[13,59,68,91],"heterogeneous":[14],"multi-cloud":[16],"environments.":[17],"This":[18],"work":[19],"introduces":[20],"a":[21,112],"cloud-native":[22],"privacy-preserving":[23],"architecture":[24,97],"that":[25,95],"integrates":[26],"federated":[27],"learning,":[28],"differential":[29,87],"privacy,":[30],"zero-knowledge":[31],"compliance":[32],"proofs,":[33],"adaptive":[35],"governance":[36],"powered":[37],"by":[38],"reinforcement":[39],"learning.":[40],"The":[41,108],"framework":[42,110],"supports":[43],"secure":[44],"model":[45,84],"training":[46],"inference":[48],"without":[49],"centralizing":[50],"sensitive":[51],"data,":[52],"while":[53,103],"enabling":[54],"cryptographically":[55],"policy":[57],"enforcement":[58,77],"institutions":[60],"cloud":[62],"platforms.":[63],"A":[64],"full":[65],"prototype":[66],"deployed":[67],"hybrid":[69],"Kubernetes":[70],"clusters":[71],"demonstrates":[72],"reduced":[73],"membership-inference":[74],"risk,":[75],"consistent":[76],"of":[78],"formal":[79],"budgets,":[81],"stable":[83],"performance":[85],"under":[86],"privacy.":[88],"Experimental":[89],"evaluation":[90],"multi-institution":[92],"workloads":[93],"shows":[94],"the":[96],"maintains":[98],"utility":[99],"with":[100],"minimal":[101],"overhead":[102],"providing":[104],"continuous,":[105],"risk-aware":[106],"governance.":[107],"proposed":[109],"establishes":[111],"practical":[113],"foundation":[114],"for":[115],"deploying":[116],"trustworthy":[117],"compliant":[119],"distributed":[120],"at":[124],"scale.":[125]},"counts_by_year":[],"updated_date":"2025-12-16T23:43:54.943958","created_date":"2025-12-13T00:00:00"}
