Privacy-Preserving Data Pipelines for Federated Learning in Autonomous Driving with Microservices
DOI:
https://doi.org/10.15662/IJRAI.2023.0601003Keywords:
Privacy-preserving, Data pipelines, Federated learning, Autonomous driving, Microservices architecture, Secure aggregation, Differential privacy, Edge computing, Trustworthy AI, Real-time decision makingAbstract
The rapid adoption of autonomous driving technologies generates massive volumes of sensitive data that require secure and efficient processing. Traditional centralized machine learning approaches pose significant privacy risks, as raw data transmission from vehicles to cloud infrastructures can expose personal and location-sensitive information. To address this challenge, this paper proposes a privacy-preserving data pipeline for federated learning (FL) in autonomous driving, implemented through a microservices-based architecture. The framework enables distributed training directly on edge devices while only sharing model updates, thereby mitigating data leakage risks. Each microservice is modularly designed to handle specific tasks such as secure data ingestion, feature engineering, encryption, differential privacy, and secure aggregation. The architecture supports scalability, interoperability, and real-time adaptability, ensuring robust communication between vehicles, roadside units, and cloud servers. Experimental validation demonstrates that the proposed system not only enhances privacy and security but also maintains high model accuracy and low latency for decision-making tasks critical to autonomous navigation. This research contributes to advancing trustworthy AI in autonomous driving by integrating federated learning, privacy-preserving techniques, and microservices engineering into a cohesive and practical pipeline.
References
1. McMahan, H. B., Moore, E., Ramage, D., Hampson, S., & y Arcas, B. A. (2017). Communication-Efficient Learning of Deep Networks from Decentralized Data. Proceedings of the 20th International Conference on Artificial Intelligence and Statistics (AISTATS).
2. Dwork, C. (2006). Differential Privacy. Automata, Languages and Programming, 1–12.
3. Geyer, R. C., Klein, T., & Nabi, M. (2017). Differentially Private Federated Learning: A Client Level Perspective. arXiv preprint arXiv:1712.07557.
4. Sahaj Gandhi, Behrooz Mansouri, Ricardo Campos, and Adam Jatowt. 2020. Event-related query classification with deep neural networks. In Companion Proceedings of the 29th International Conference on the World Wide Web. 324–330.
5. Adari, V. K., Chunduru, V. K., Gonepally, S., Amuda, K. K., & Kumbum, P. K. (2020). Explain ability and interpretability in machine learning models. Journal of Computer Science Applications and Information Technology, 5(1), 1-7.
6. R. Sugumar, A. Rengarajan and C. Jayakumar, Design a Weight Based Sorting Distortion Algorithm for Privacy Preserving Data Mining, Middle-East Journal of Scientific Research 23 (3): 405-412, 2015
7. Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017). Practical Secure Aggregation for Privacy-Preserving Machine Learning. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.
8. Li, T., Sahu, A. K., Talwalkar, A., & Smith, V. (2020). Federated Learning: Challenges, Methods, and Future Directions. IEEE Signal Processing Magazine.
9. Cherukuri, Bangar Raju. "Microservices and containerization: Accelerating web development cycles." (2020).
10. Shi, W., Cao, J., Zhang, Q., Li, Y., & Xu, L. (2016). Edge Computing: Vision and Challenges. IEEE Internet of Things Journal.
11. Bagdasaryan, E., Veit, A., Hua, Y., Estrin, D., & Shmatikov, V. (2020). How To Backdoor Federated Learning. Proceedings of the 23rd International Conference on Artificial Intelligence and Statistics.
12. Nasr, M., Shokri, R., & Houmansadr, A. (2019). Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-box Inference Attacks against Centralized and Federated Learning. IEEE Symposium on Security and Privacy.
13. Burns, B., Grant, B., Oppenheimer, D., Brewer, E., & Wilkes, J. (2016). Borg, Omega, and Kubernetes. Communications of the ACM.
14. Prasad, G. L. V., Nalini, T., & Sugumar, R. (2018). Mobility aware MAC protocol for providing energy efficiency and stability in mobile WSN. International Journal of Networking and Virtual Organisations, 18(3), 183-195.
15. Kim, S., Kim, S., & Park, J. (2021). Federated Learning for Autonomous Driving: A Survey. IEEE Transactions on Intelligent Transportation Systems.





