• Skip to primary navigation
  • Skip to main content

CINA.

  • About
    • Mission
    • People
  • Research
    • Research
    • Projects
    • RFPs
  • Education
    • Resources
    • Internships
  • Publications
    • Newsletter Archive
    • Director’s Blog
  • News & Events
    • News
    • CINA Director’s Blog
    • Digital Archive
    • Events
    • Work with Us
  • Contact
  • Search Toggle
  • Skip to content

A Survey on Secure and Private Federated Learning Using Blockchain: Theory and Application in Resource-Constrained Computing

Jul 09, 2023

  • News

By Ervin Moore; Ahmed Imteaj; Shabnam Rezapour; M. Hadi Amini

Abstract:

Federated learning (FL) has gained widespread popularity in recent years due to the fast booming of advanced machine learning and artificial intelligence, along with emerging security and privacy threats. Federated learning (FL) enables efficient model generation from local data storage of the edge devices without revealing the sensitive data to any entities. While this paradigm partly mitigates the privacy issues of users’ sensitive data, the performance of the FL process can be threatened and reach a bottleneck due to the growing cyber threats and privacy violation techniques. To expedite the proliferation of the FL process, the integration of blockchain for FL environments has drawn increasing attention from academia and industry. Blockchain has the potential to prevent security and privacy threats with its decentralization, immutability, consensus, and transparency characteristics. However, if the blockchain mechanism requires costly computational resources, then the resource-constrained FL clients cannot be involved in the training. Considering that, this survey focuses on reviewing the challenges, solutions, and future directions for the successful deployment of blockchain in resource-constrained FL environments. We comprehensively review variant blockchain mechanisms suitable for the FL process and discuss their tradeoffs for a limited resource budget. Furthermore, we extensively analyze the cyber threats that could be observed in a resource-constrained FL environment, and how blockchain can play a key role in blocking those cyberattacks. To this end, we highlight some potential solutions for the coupling of blockchain and FL that can offer high levels of reliability, data privacy, and distributed computing performance.

Read More

Investigators:

  • M. Hadi Amini

Topics:

  • Innovation and Technology
  • Networks

*The programs and services offered by George Mason University are open to all who seek them. George Mason does not discriminate on the basis of race, color, religion, ethnic national origin (including shared ancestry and/or ethnic characteristics), sex, disability, military status (including veteran status), sexual orientation, gender identity, gender expression, age, marital status, pregnancy status, genetic information, or any other characteristic protected by law. After an initial review of its policies and practices, the university affirms its commitment to meet all federal mandates as articulated in federal law, as well as recent executive orders and federal agency directives.

CINA Now

Events

All Events

Publications

The Key to Deobfuscation is Pattern of Life, not Overcoming Encryption

Published: Oct 4, 2025

The Organized Activities of Ransomware Groups: A Social network Approach

Published: Mar 14, 2025
All Publications

News

CINA Distinguished Speaker Series with Colton Seale: Interviewer Mindset

CINA  |   April 3, 2025  |   Posted In:
  • Digital Archive
  • Uncategorized

CINA  |   March 6, 2025  |   Posted In:
  • Uncategorized
All News

Science and Technology Directorate’s Office of University Programs
CINA at George Mason University Logo
Copyright © 2025 All Rights Reserved | CINA Is A Department of Homeland Security Center of Excellence led by George Mason University
  • Facebook
  • Twitter
  • Instagram
  • Linkedin
  • YouTube