Synergistic Disruption: Harnessing AI and Blockchain for Enhanced Privacy and Security in Federated Learning
DOI:
https://doi.org/10.15575/join.v10i1.1392Keywords:
Artificial Intelligence, Blockchain, Federated Learning, Privacy, Smart ContractsAbstract
References
[1] R. Zhang, R. Xue, and L. Liu, “Security and Privacy on Blockchain,” ACM Comput Surv, vol. 52, no. 3, pp. 1–34, May 2020, doi: 10.1145/3316481.
[2] M. Shayan, C. Fung, C. J. M. Yoon, and I. Beschastnikh, “Biscotti: A Blockchain System for Private and Secure Federated Learning,” IEEE Transactions on Parallel and Distributed Systems, vol. 32, no. 7, pp. 1513–1525, Jul. 2021, doi: 10.1109/TPDS.2020.3044223.
[3] D. C. Nguyen et al., “Federated Learning Meets Blockchain in Edge Computing: Opportunities and Challenges,” IEEE Internet Things J, vol. 8, no. 16, pp. 12806–12825, Aug. 2021, doi: 10.1109/JIOT.2021.3072611.
[4] D. Li et al., “Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey,” Soft comput, vol. 26, no. 9, pp. 4423–4440, May 2022, doi: 10.1007/s00500-021-06496-5.
[5] Z. Li, J. Liu, J. Hao, H. Wang, and M. Xian, “CrowdSFL: A Secure Crowd Computing Framework Based on Blockchain and Federated Learning,” Electronics (Basel), vol. 9, no. 5, p. 773, May 2020, doi: 10.3390/electronics9050773.
[6] A. Qammar, A. Karim, H. Ning, and J. Ding, “Securing federated learning with blockchain: a systematic literature review,” Artif Intell Rev, vol. 56, no. 5, pp. 3951–3985, May 2023, doi: 10.1007/s10462-022-10271-9.
[7] S. R. Pokhrel and J. Choi, “Federated Learning With Blockchain for Autonomous Vehicles: Analysis and Design Challenges,” IEEE Transactions on Communications, vol. 68, no. 8, pp. 4734–4746, Aug. 2020, doi: 10.1109/TCOMM.2020.2990686.
[8] S. Wang, X. Tang, Y. Zhang, and J. Chen, “Auditable Protocols for Fair Payment and Physical Asset Delivery Based on Smart Contracts,” IEEE Access, vol. 7, pp. 109439–109453, 2019, doi: 10.1109/ACCESS.2019.2933860.
[9] H. R. Hasan and K. Salah, “Proof of Delivery of Digital Assets Using Blockchain and Smart Contracts,” IEEE Access, vol. 6, pp. 65439–65448, 2018, doi: 10.1109/ACCESS.2018.2876971.
[10] S. Rahmadika and K. H. Rhee, “Enhancing data privacy through a decentralised predictive model with blockchain-based revenue,” International Journal of Ad Hoc and Ubiquitous Computing, vol. 37, no. 1, p. 1, 2021, doi: 10.1504/IJAHUC.2021.115104.
[11] J. Zhu, J. Cao, D. Saxena, S. Jiang, and H. Ferradi, “Blockchain-empowered Federated Learning: Challenges, Solutions, and Future Directions,” ACM Comput Surv, vol. 55, no. 11, pp. 1–31, Nov. 2023, doi: 10.1145/3570953.
[12] S. Rahmadika and K.-H. Rhee, “Unlinkable Collaborative Learning Transactions: Privacy-Awareness in Decentralized Approaches,” IEEE Access, vol. 9, pp. 65293–65307, 2021, doi: 10.1109/ACCESS.2021.3076205.
[13] W. Issa, N. Moustafa, B. Turnbull, N. Sohrabi, and Z. Tari, “Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey,” ACM Comput Surv, vol. 55, no. 9, pp. 1–43, Sep. 2023, doi: 10.1145/3560816.
[14] B. Bünz, S. Agrawal, M. Zamani, and D. Boneh, “Zether: Towards Privacy in a Smart Contract World,” 2020, pp. 423–443. doi: 10.1007/978-3-030-51280-4_23.
[15] C. Antal, T. Cioara, I. Anghel, M. Antal, and I. Salomie, “Distributed Ledger Technology Review and Decentralized Applications Development Guidelines,” Future Internet, vol. 13, no. 3, p. 62, Feb. 2021, doi: 10.3390/fi13030062.
[16] R. Myrzashova, S. H. Alsamhi, A. V. Shvetsov, A. Hawbani, and X. Wei, “Blockchain Meets Federated Learning in Healthcare: A Systematic Review With Challenges and Opportunities,” IEEE Internet Things J, vol. 10, no. 16, pp. 14418–14437, Aug. 2023, doi: 10.1109/JIOT.2023.3263598.
[17] S. Rathore, B. Wook Kwon, and J. H. Park, “BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network,” Journal of Network and Computer Applications, vol. 143, pp. 167–177, Oct. 2019, doi: 10.1016/j.jnca.2019.06.019.
[18] Q. Yang, Y. Zhao, H. Huang, Z. Xiong, J. Kang, and Z. Zheng, “Fusing Blockchain and AI With Metaverse: A Survey,” IEEE Open Journal of the Computer Society, vol. 3, pp. 122–136, 2022, doi: 10.1109/OJCS.2022.3188249.
[19] W. Moulahi, I. Jdey, T. Moulahi, M. Alawida, and A. Alabdulatif, “A blockchain-based federated learning mechanism for privacy preservation of healthcare IoT data,” Comput Biol Med, vol. 167, p. 107630, Dec. 2023, doi: 10.1016/j.compbiomed.2023.107630.
[20] A. Heidari, D. Javaheri, S. Toumaj, N. J. Navimipour, M. Rezaei, and M. Unal, “A new lung cancer detection method based on the chest CT images using Federated Learning and blockchain systems,” Artif Intell Med, vol. 141, p. 102572, Jul. 2023, doi: 10.1016/j.artmed.2023.102572.
[21] D. Mahmudnia, M. Arashpour, and R. Yang, “Blockchain in construction management: Applications, advantages and limitations,” Autom Constr, vol. 140, p. 104379, Aug. 2022, doi: 10.1016/j.autcon.2022.104379.
[22] S. JANG, S. RAHMADIKA, S. U. SHIN, and K.-H. RHEE, “PDPM: A Patient-Defined Data Privacy Management with Nudge Theory in Decentralized E-Health Environments,” IEICE Trans Inf Syst, vol. E104.D, no. 11, p. 2021NGP0015, Nov. 2021, doi: 10.1587/transinf.2021NGP0015.
[23] S. Ali, Q. Li, and A. Yousafzai, “Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey,” Ad Hoc Networks, vol. 152, p. 103320, Jan. 2024, doi: 10.1016/j.adhoc.2023.103320.
[24] S. S. Kushwaha, S. Joshi, D. Singh, M. Kaur, and H.-N. Lee, “Systematic Review of Security Vulnerabilities in Ethereum Blockchain Smart Contract,” IEEE Access, vol. 10, pp. 6605–6621, 2022, doi: 10.1109/ACCESS.2021.3140091.
[25] S. S. Kushwaha, S. Joshi, D. Singh, M. Kaur, and H.-N. Lee, “Ethereum Smart Contract Analysis Tools: A Systematic Review,” IEEE Access, vol. 10, pp. 57037–57062, 2022, doi: 10.1109/ACCESS.2022.3169902.
[26] S. Shitharth et al., “Federated learning optimization: A computational blockchain process with offloading analysis to enhance security,” Egyptian Informatics Journal, vol. 24, no. 4, p. 100406, Dec. 2023, doi: 10.1016/j.eij.2023.100406.
[27] Y. Lin et al., “DRL-Based Adaptive Sharding for Blockchain-Based Federated Learning,” IEEE Transactions on Communications, vol. 71, no. 10, pp. 5992–6004, Oct. 2023, doi: 10.1109/TCOMM.2023.3288591.
[28] S. Ali, Q. Li, and A. Yousafzai, “Blockchain and federated learning-based intrusion detection approaches for edge-enabled industrial IoT networks: a survey,” Ad Hoc Networks, vol. 152, p. 103320, Jan. 2024, doi: 10.1016/j.adhoc.2023.103320.
[29] A. Hadi, S. Rahmadika, B. R. Fajri, G. Farell, K. Budayawan, and W. Lofandri, “Obscuring Transaction Information in Decentralized P2P Wireless Networks,” IEEE Access, vol. 11, pp. 111053–111067, 2023, doi: 10.1109/ACCESS.2023.3321960.
[30] H. Zhang, S. Jiang, and S. Xuan, “Decentralized federated learning based on blockchain: concepts, framework, and challenges,” Comput Commun, vol. 216, pp. 140–150, Feb. 2024, doi: 10.1016/j.comcom.2023.12.042.
[31] S. Ji, J. Zhang, Y. Zhang, Z. Han, and C. Ma, “LAFED: A lightweight authentication mechanism for blockchain-enabled federated learning system,” Future Generation Computer Systems, vol. 145, pp. 56–67, Aug. 2023, doi: 10.1016/j.future.2023.03.014.
Downloads
Published
Issue
Section
Citation Check
License
Copyright (c) 2025 Sandi Rahmadika, Winda Agustiarmi, Ryan Fikri, Bruno Joachim Kweka

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
-
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
- You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
- No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License