ijact-book-coverT

EdgeSecFL: A Lightweight Federated Learning Model for Intrusion Detection in IoT-Cloud Ecosystems

© 2024 by IJACT

Volume 2 Issue 4

Year of Publication : 2024

Author : Faraz Ahmed

:10.56472/25838628/IJACT-V2I4P121

Citation :

Faraz Ahmed, 2024. "EdgeSecFL: A Lightweight Federated Learning Model for Intrusion Detection in IoT-Cloud Ecosystems", ESP International Journal of Advancements in Computational Technology (ESP-IJACT)  Volume 2, Issue 4: 163-176.

Abstract :

As IoT devices continue to proliferate and integrate with cloud computing platforms, the attack surface for cyber threats has expanded significantly. The paper is a review of EdgeSecFL framework, which is a light federated learning (FL) model introduced to deal with prevention of intrusion in the IoT-cloud ecosystem. EdgeSecFL uses decentralized training, secure aggregation and blockchain-based logging to achieve greater privacy, cut down on communication overhead, and establish tamper-evident auditability. The model supports adaptive edge coordination and cost-efficient cloud deployment, making it suitable for resource-constrained environments. Comparative analysis proves that EdgeSecFL is superior to previous FL-based IDS systems in the following parameters: latency, scalability and data protection. Other ethical and governance considerations such as explainability, fairness, alignment with emergent regulatory frameworks are addressed in the review as well. Lastly, the article presents future areas of research such as quantum-resistant cryptographic integration and self-orchestrated FL. EdgeSecFL stands as a robust foundation for developing secure, policy-aware, and scalable intrusion detection systems across modern distributed infrastructures.

References :

[1] K. Valaskova et al., "Blockchain-enabled Internet of Things and Virtual Sensor Networks, Mobile Cloud and Edge Computing Systems, and Predictive Modeling and Cognitive Data Fusion Techniques in Big Data-driven Digital Twin Urban Geopolitics and Immersive Hyper-Connected Virtual Spaces," Geopolitics, History, and International Relations, vol. 15, no. 1, pp. 46–60, 2023.
[2] A. Sehgal et al., "Management of resource constrained devices in the internet of things," IEEE Communications Magazine, vol. 50, no. 12, pp. 144–149, Dec. 2012.
[3] G. Dhayanidhi, "Research on IoT threats & implementation of AI/ML to address emerging cybersecurity issues in IoT with cloud computing," 2022.
[4] E. T. M. Beltrán et al., "Decentralized federated learning: Fundamentals, state of the art, frameworks, trends, and challenges," IEEE Communications Surveys & Tutorials, vol. 25, no. 4, pp. 2983–3013, 2023.
[5] N. Kshetri, "Privacy and security issues in cloud computing: The role of institutions and institutional evolution," Telecommunications Policy, vol. 37, no. 4–5, pp. 372–386, 2013.
[6] F. Ahmed, "Cloud Security Posture Management (CSPM): Automating Security Policy Enforcement in Cloud Environments," ESP Int. J. Adv. Comput. Technol. (ESP-IJACT), vol. 1, no. 3, pp. 157–166, 2023.
[7] M. A. Serhani et al., "Self-adapting cloud services orchestration for fulfilling intensive sensory data-driven IoT workflows," Future Generation Computer Systems, vol. 108, pp. 583–597, 2020.
[8] M. Kosicki et al., "Big Data and Cloud Computing for the Built Environment," in Industry 4.0 for the Built Environment: Methodologies, Technologies and Skills, Cham: Springer, 2021, pp. 131–155.
[9] A. R. Biswas and R. Giaffreda, "IoT and cloud convergence: Opportunities and challenges," in Proc. 2014 IEEE World Forum on Internet of Things (WF-IoT), 2014.
[10] P. Anand et al., "IoT vulnerability assessment for sustainable computing: Threats, current solutions, and open challenges," IEEE Access, vol. 8, pp. 168825–168853, 2020.
[11] I. Butun, P. Österberg, and H. Song, "Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures," IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 616–644, 2019.
[12] J. Jangid et al., "Enhancing security and efficiency in wireless mobile networks through blockchain," Int. J. Intell. Syst. Appl. Eng., vol. 11, no. 4, pp. 958–969, 2023.
[13] M. F. Elrawy, A. I. Awad, and H. F. A. Hamed, "Intrusion detection systems for IoT-based smart environments: a survey," J. Cloud Comput., vol. 7, no. 1, pp. 1–20, 2018.
[14] S. AbdulRahman et al., "A survey on federated learning: The journey from centralized to distributed on-site learning and beyond," IEEE Internet Things J., vol. 8, no. 7, pp. 5476–5497, 2020.
[15] B. Nagajayanthi, "Decades of internet of things towards twenty-first century: A research-based introspective," Wireless Personal Communications, vol. 123, no. 4, pp. 3661–3697, 2022.
[16] R. Morabito et al., "Consolidate IoT edge computing with lightweight virtualization," IEEE Network, vol. 32, no. 1, pp. 102–111, 2018.
[17] J. Jangid, "Efficient Training Data Caching for Deep Learning in Edge Computing Networks," Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 7, no. 5, pp. 337–362, 2020.
[18] O. A. Wahab et al., "Federated machine learning: Survey, multi-level classification, desirable criteria and future directions in communication and networking systems," IEEE Communications Surveys & Tutorials, vol. 23, no. 2, pp. 1342–1397, 2021.
[19] J. Jangid, "Secure microservice communication in optical networks," J. Inf. Syst. Eng. Manag., vol. 10, no. 21s, 2025. doi: 10.52783/jisem.v10i21s.3455
[20] F. Ahmed, "Cybersecurity Policy Frameworks for AI in Government: Balancing National Security and Privacy Concerns," Int. J. Multidiscip. Sci. Manag., vol. 1, no. 4, pp. 43–53, 2024.
[21] S. Muzukwe, A Governance Framework for Security in Cloud Architecture, MS Thesis, Univ. of Johannesburg, South Africa, 2023.
[22] A. Chakraborty et al., "Adversarial attacks and defences: A survey," arXiv preprint arXiv:1810.00069, 2018.
[23] A. Acar et al., "A survey on homomorphic encryption schemes: Theory and implementation," ACM Comput. Surv., vol. 51, no. 4, pp. 1–35, 2018.
[24] C. Zhao et al., "Secure multi-party computation: theory, practice and applications," Information Sciences, vol. 476, pp. 357–372, 2019.
[25] F. Ahmed, "Quantum-Resistant Cryptography for National Security: A Policy and Implementation Roadmap," Int. J. Multidiscip. Sci. Manag., vol. 1, no. 4, pp. 54–65, 2024.
[26] J. Jangid and S. Malhotra, "Optimizing Software Upgrades in Optical Transport Networks: Challenges and Best Practices," Nanotechnology Perceptions, vol. 18, no. 2, pp. 194–206, 2022.
[27] A. Ali et al., "BCALS: Blockchain‐based secure log management system for cloud computing," Trans. Emerg. Telecommun. Technol., vol. 33, no. 4, e4272, 2022.
[28] K. Demertzis et al., "Anomaly detection via blockchained deep learning smart contracts in industry 4.0," Neural Comput. Appl., vol. 32, no. 23, pp. 17361–17378, 2020.
[29] K. A. Awan et al., "Privacy-preserving big data security for IoT with federated learning and cryptography," IEEE Access, vol. 11, pp. 120918–120934, 2023.

Keywords :

Federated Learning, Intrusion Detection Systems, IoT-Cloud Security, Blockchain, Secure Aggregation, Privacy-Preserving Machine Learning.