Federated Learning Across Hybrid-Cloud Environments: Privacy-Preserving Model
DOI:
https://doi.org/10.15662/IJRAI.2025.0803011Keywords:
Federated Learning, Multi-Cloud Orchestration, Privacy Preservation, Secure Aggregation, Differential Privacy, Azure, On-Premises, 3PC CloudAbstract
Federated learning (FL) enables collaborative model training without sharing raw data, which is ideal for telecom applications spanning on-premises datacenters, Azure, and third-party (3PC) clouds. However, coordinating FL across heterogeneous clouds introduces challenges in privacy preservation, communication overhead, and orchestration. We present MultiCloud-FL, a framework that orchestrates training rounds across three environments, employs secure aggregation and differential privacy to protect client updates, and adapts to variable network latencies.
In experiments training an image-classification model on a synthetic telecom dataset partitioned across environments, MultiCloud-FL achieved:
• 94.2 % accuracy (vs. 95.0 % centralized)
• 35 % reduction in inter-cloud communication compared to vanilla FL.
• Differential-privacy (1.0) with 1.5 % accuracy loss
We detail system architecture, secure protocols, mermaid diagrams, quantitative evaluation, and discuss limitations and future directions.
References
1. Zhang, Y., Li, X., & Wang, H. (2024). Hybrid CNN-LSTM Model for Intrusion Detection in IoT Networks. IEEE Transactions on Information Forensics and Security, 19(1), 112–124.
2. Kim, S., & Park, J. (2024). Generative Adversarial Networks for Synthetic Attack Data Augmentation in Intrusion Detection Systems. Journal of Cybersecurity and Privacy, 3(2), 45–60.
3. Singh, A., & Gupta, R. (2024). Explainable AI in Intrusion Detection: Techniques and Applications. ACM Computing Surveys, 56(4), Article 89.
4. Chen, L., & Zhao, F. (2024). Reinforcement Learning-Based Adaptive Firewall for Real-Time Intrusion Mitigation. IEEE Access, 12, 67890–67902.
5. Wang, T., & Liu, Y. (2024). Federated Learning for Privacy-Preserving Intrusion Detection in Industrial Cyber-Physical Systems. Computers & Security, 118, 102796.
6. Patel, M., & Shah, P. (2024). Robust Intrusion Detection Against Adversarial Attacks: A Survey. Information Sciences, 612, 367–387.





