Integrating Federated Transfer Learning for Secure Multi-Tenant Data Management in Decentralized Cloud Infrastructures
DOI:
https://doi.org/10.59461/ijdiic.v5i1.262Keywords:
Federated Transfer Learning, Cloud Infrastructures, Tenant-Aware Security, Privacy-Preserving, Data ManagementAbstract
Ensuring secure multi-tenant data management while enabling cross-domain knowledge sharing is challenging in decentralized cloud infrastructures. Traditional centralized learning methods pose risks like data leakage and non-compliance with privacy regulations. To address these concerns, this research integrates Federated Transfer Learning (FTL) for secure and efficient multi-tenant data management. The proposed approach employs Federated Learning (FL) to enable collaborative model training while keeping raw data localized, preserving privacy. Additionally, BERT-based transfer learning improves knowledge sharing by adapting pre-trained models to tenant-specific tasks, enhancing efficiency and reducing computational overhead. A tenant-aware security mechanism dynamically assesses trust levels to ensure secure workload allocation and mitigate risks. Furthermore, a decentralized aggregation strategy enhances data privacy and prevents single-point failures, improving system robustness. The framework was evaluated using real-world datasets, assessing privacy, adaptability, communication overhead, and computational efficiency. Experimental results demonstrate that FTL-driven decentralized architectures achieve low latency (6ms), high throughput (850000 requests/sec at 10000 tenants), better utilization of resources (83%), and good security compliance (9.5/10). Consistency models also come with a 50% overhead for strong consistency, which shows the trade-offs involved in ensuring data consistency. The results confirm the proposed model as a scalable, efficient, and privacy-preserving solution for multi-tenant cloud environments.
Downloads
References
S. Deochake and V. Channapattan, “Identity and Access Management Framework for Multi-tenant Resources in Hybrid Cloud Computing,” in Proceedings of the 17th International Conference on Availability, Reliability and Security, Aug. 2022, pp. 1–8, https://doi.org/10.1145/3538969.3544896.
A. Bhargava, D. Bhargava, P. N. Kumar, G. S. Sajja, and S. Ray, “Industrial IoT and AI implementation in vehicular logistics and supply chain management for vehicle mediated transportation systems,” International Journal of System Assurance Engineering and Management, vol. 13, no. S1, pp. 673–680, Mar. 2022, https://doi.org/10.1007/s13198-021-01581-2.
S. Saxena, D. Yagyasen, C. N. Saranya, R. S. K. Boddu, A. K. Sharma, and S. K. Gupta, “Hybrid Cloud Computing for Data Security System,” in 2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA), Oct. 2021, pp. 1–8, https://doi.org/10.1109/ICAECA52838.2021.9675493.
A. M. Mostafa et al., “Decentralized Identity Management in Cloud Computing: A Blockchain‐Based Solution With Automatic Provisioning Techniques,” International Journal of Intelligent Systems, vol. 2025, no. 1, Jan. 2025, https://doi.org/10.1155/int/2969737.
Y. Zhang, X. Chang, and X. Liu, “Inference of gene regulatory networks using pseudo-time series data,” Bioinformatics, vol. 37, no. 16, pp. 2423–2431, Aug. 2021, https://doi.org/10.1093/bioinformatics/btab099.
U. S. Basha, “Fortifying Healthcare Data Security in the Cloud: A Comprehensive Examination of the EPM-KEA Encryption Protocol,” Computers, Materials & Continua, vol. 79, no. 2, pp. 3397–3416, 2024, https://doi.org/10.32604/cmc.2024.046265.
N. Manikandan, P. Thejasree, K. E. K. Vimal, K. Sivakumar, and J. Kiruthika, “Applications of Artificial Intelligence Tools in Advanced Manufacturing,” 2024, pp. 29–42.
M. K. Horton, S. Dwaraknath, and K. A. Persson, “Promises and perils of computational materials databases,” Nature Computational Science, vol. 1, no. 1, pp. 3–5, Jan. 2021, https://doi.org/10.1038/s43588-020-00016-5.
S. K. Gupta, A. Alemran, C. P. Ranjith, and M. S. K. Mohideen, “Biometric Authentication for Healthcare Data Security in Cloud Computing—A Machine Learning Approach,” in Advancements in Science and Technology for Healthcare, Agriculture, and Environmental Sustainability, London: CRC Press, 2024, pp. 318–324.
R. Natarajan, G. H. Lokesh, F. Flammini, A. Premkumar, V. K. Venkatesan, and S. K. Gupta, “A Novel Framework on Security and Energy Enhancement Based on Internet of Medical Things for Healthcare 5.0,” Infrastructures, vol. 8, no. 2, p. 22, Feb. 2023, https://doi.org/10.3390/infrastructures8020022.
V. P. Nzanzu et al., “FEDARGOS-V1: A Monitoring Architecture for Federated Cloud Computing Infrastructures,” IEEE Access, vol. 10, pp. 133557–133573, 2022, https://doi.org/10.1109/ACCESS.2022.3231622.
E. A. Adeniyi, R. O. Ogundokun, S. Misra, J. B. Awotunde, and K. M. Abiodun, “Enhanced Security and Privacy Issue in Multi-Tenant Environment of Green Computing Using Blockchain Technology,” 2022, pp. 65–83.
J. M. Parra-Ullauri et al., “Federated Analytics for 6G Networks: Applications, Challenges, and Opportunities,” IEEE Network, vol. 38, no. 2, pp. 9–17, Mar. 2024, https://doi.org/10.1109/MNET.2024.3355218.
B. Han et al., “PBFL: A Privacy-Preserving Blockchain-Based Federated Learning Framework With Homomorphic Encryption and Single Masking,” IEEE Internet of Things Journal, vol. 12, no. 10, pp. 14229–14243, May 2025, https://doi.org/10.1109/JIOT.2024.3524632.
Naveen Kodakandla, “Federated learning in cloud environments: Enhancing data privacy and AI model training across distributed systems,” International Journal of Science and Research Archive, vol. 5, no. 2, pp. 347–356, Apr. 2022, https://doi.org/10.30574/ijsra.2022.5.2.0059.
A. Agrawal, S. Tripathi, M. Vardhan, V. Sihag, G. Choudhary, and N. Dragoni, “BERT-Based Transfer-Learning Approach for Nested Named-Entity Recognition Using Joint Labeling,” Applied Sciences, vol. 12, no. 3, p. 976, Jan. 2022, https://doi.org/10.3390/app12030976.
R. Ibrahim, I. Khider, S. Edam, and T. Mukhtar, “Comprehensive Strategies for Enhancing SD‐WAN: Integrating Security, Dynamic Routing and Quality of Service Management,” IET Networks, vol. 14, no. 1, Jan. 2025, https://doi.org/10.1049/ntw2.70007.
P.-C. Cheng et al., “DeTA: Minimizing Data Leaks in Federated Learning via Decentralized and Trustworthy Aggregation,” in Proceedings of the Nineteenth European Conference on Computer Systems, Apr. 2024, pp. 219–235, https://doi.org/10.1145/3627703.3650082.
K. Reddy, “Scalable Data Management in Distributed Systems: A Sharding-Based Approach for Multi-Tenant Architectures,” International Journal of Emerging Research in Engineering and Technology, vol. 5, pp. 1–12, 2024, https://doi.org/10.63282/3050-922X.IJERET-V5I3P101.
W. Hashim and N. A.-H. K. Hussein, “Securing Cloud Computing Environments: An Analysis of Multi-Tenancy Vulnerabilities and Countermeasures,” SHIFRA, vol. 2024, pp. 8–16, Feb. 2024, https://doi.org/10.70470/SHIFRA/2024/002.
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Aditya Gupta, Sai Kiran Oruganti

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
