Balancing Privacy and Performance: Machine Learning Security in Distributed Edge Networks

Authors

  • Arian Li

DOI:

https://doi.org/10.54097/j9re3530

Keywords:

Edge computing, Privacy-preserving Machine Learning, Distributed Systems, Federated Learning, Performance Optimization.

Abstract

Edge computing has transformed how machine learning models are deployed across distributed networks. As computing power gets closer to where data is generated, protecting privacy is becoming more and more important. This review looks at how edge computing and privacy-preserving machine learning come together, especially the trade-offs between privacy, performance, and usability. Past studies have been organized into three main areas: algorithmic approaches like federated learning and differential privacy, cryptographic methods such as secure multi-party computation and homomorphic encryption, and hardware-based techniques that rely on trusted execution environments. This analysis reveals a persistent deployment gap between mathematically elegant privacy guarantees and the practical constraints of resource-limited edge devices, where battery life, latency, and computational overhead force uncomfortable compromises. Key challenges have been identified in multi-objective optimization and evaluate existing balancing mechanisms and propose a conceptual framework that interprets privacy-performance trade-offs through multi-dimensional optimization, clarifying when certain techniques work better depending on deployment scenarios. This review brings together what has been achieved so far and highlights where the field is heading - toward building scalable, regulation-compliant, and efficient privacy-preserving AI systems that can work smoothly in distributed edge environments.

References

[1] F. R. Mughal, J. He, B. Das, et al., “Adaptive federated learning for resource-constrained IoT devices through edge intelligence and multi-edge clustering,” Sci. Rep., vol. 14, art. 28746, 2024.

[2] J. Hong, Y. Hong, X. de Foy, M. Kovatsch, E. Schooler, and D. Kutscher, “Internet of Things (IoT) edge challenges and functions,” Internet Research Task Force, RFC 9556, Apr. 2024.

[3] L. Cui and X. Wu, “ALDP-FL for adaptive local differential privacy in federated learning,” Sci. Rep., vol. 15, art. 26679, 2025.

[4] European Parliament and Council of the European Union, “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation),” Official Journal of the European Union, vol. L119, pp. 1-88, May 4, 2016.

[5] State of California, “California Consumer Privacy Act of 2018,” California Civil Code, Division 3, Part 4, Title 1.81.5, §§ 1798.100-1798.199, 2018.

[6] H. B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. Arcas, “Communication-efficient learning of deep networks from decentralized data,” in Proc. 20th Int. Conf. Artif. Intell. Statist., vol. 54, 2017, pp. 1273-1282.

[7] D. Wang and S. Guan, “FedFR-ADP: Adaptive differential privacy with feedback regulation for robust model performance in federated learning,” Inf. Fusion, vol. 116, art. 102796, 2025.

[8] F. Mo, H. Haddadi, K. Katevas, E. Marin, D. Perino, and N. Kourtellis, “PPFL: Privacy-preserving federated learning with trusted execution environments,” Proc. 19th Annu. Int. Conf. Mobile Syst., Appl., Serv., 2021, pp. 94-108.

[9] P. Giannakopoulos, B. van Knippenberg, K. C. Joshi et al., “Key metrics for monitoring performance variability in edge computing applications,” EURASIP J. Wireless Commun. Netw., vol. 2025, art. 38, 2025.

[10] S. Truex, N. Baracaldo, A. Anwar, T. Steinke, H. Ludwig, R. Zhang, and Y. Zhou, “A hybrid approach to privacy-preserving federated learning,” Proc. 12th ACM Workshop Artif. Intell. Secur., 2019, pp. 1-11.

[11] Y. Ren, Y. Cao, C. Ye et al., “Two-layer accumulated quantized compression for communication-efficient federated learning: TLAQC,” Sci. Rep., vol. 13, art. 11658, 2023.

[12] B. Gușiță, A. A. Anton, C. S. Stângaciu, D. Stănescu, L. I. Găină, and M. V. Micea, “Securing IoT edge: a survey on lightweight cryptography, anonymous routing and communication protocol enhancements,” Int. J. Inf. Secur., 2025.

[13] A. Nof, E. Boyle, N. Gilboa, and Y. Ishai, “Secure multiparty computation with sublinear preprocessing,” Advances in Cryptology - EUROCRYPT 2022, IACR, 2022.

[14] S. Naas, L. Rupprecht, D. Kales, and M. Franz, “Open and resilient remote attestation on decentralized platforms,” arXiv preprint arXiv:2402.08908, 2024.

[15] H. Xu, Y. Zhang, and S. Tang, “Pareto set learning for multi-objective reinforcement learning (PSL-MORL),” arXiv preprint arXiv:2501.06773, 2025.

[16] B. Jayaraman and D. Evans, “Evaluating differentially private machine learning in practice,” in Proc. 28th USENIX Security Symp., 2019, pp. 1895-1912.

[17] H. Habib, K. S. Shrestha, J. Jung, and L. F. Cranor, “Evaluating the usability of privacy choice mechanisms,” in Proc. 18th Symp. Usable Privacy and Security (SOUPS), 2022, pp. 1-17.

Downloads

Published

15-03-2026

Issue

Section

Articles

How to Cite

Li, A. (2026). Balancing Privacy and Performance: Machine Learning Security in Distributed Edge Networks. Mathematical Modeling and Algorithm Application, 9(1), 427-435. https://doi.org/10.54097/j9re3530