Federated Learning-Based Recommender System with Data Anonymization and Encryption

Authors

  • Sathish Kumar S Assistant professor, Department of Artificial intelligence & Data Science, K.L.N. College of Engineering, Sivagangai, Tamil Nadu, India Author
  • Surya Prakash P, Annapoorani J, Yashica M Student, Department of Artificial intelligence & Data Science, K.L.N. College of Engineering, Sivagangai, Tamil Nadu, India Author

DOI:

https://doi.org/10.15662/IJEETR.2026.0802104

Keywords:

Federated Learning, Privacy-Preserving Recommender System, Data Anonymization, Encryption, Differential Privacy, Collaborative Filtering, Cosine Similarity, Secure Aggregation, User–Item Interaction Modeling, Dynamic Recommendations

Abstract

This work presents a federated learning-based recommender system that combines data anonymization, encryption, and differential privacy to ensure strong protection of user data in distributed settings. A large synthetic dataset simulates real-world user-item interactions, with all personally identifiable information removed and replaced by anonymized unique identifiers. To improve security, encrypted communication is used during parameter transmission between federated clients. Each client trains a collaborative filtering model locally, using user-item interaction matrices and applying cosine similarity to capture user preference patterns. Instead of sharing raw data, only encrypted and privacy-preserved model updates are sent to the central aggregator, where they are combined to create a global recommendation model

Differential privacy mechanisms are added to obscure individual user contributions, enhancing resistance to inference attacks. The performance of the federated recommendation framework is assessed using Mean Squared Error (MSE). The results show that the system maintains high recommendation accuracy while significantly improving data privacy. This approach is scalable, secure and well-suited for modern applications that need privacy-preserving personalized recommendations. The framework also supports dynamic updates, allowing continuous improvement of recommendation quality as new user interactions occur

References

[1] Y. Koren, R. Bell and C. Volinsky, “Matrix Factorization Techniques for Recommender Systems,” IEEE Computer, 2009.

[2] C. Dwork, “Differential Privacy: A Survey of Results,” Theory and Applications of Models of Computation, Springer, 2008.

[3] C. C. Aggarwal, Privacy-Preserving Data Mining: Models and Algorithms, Springer, 2008.

[4] F. Ricci, L. Rokach, and B. Shapira, Recommender Systems Handbook, Springer, 2011.

[5] A. Singh and M. Sharma, “User-Based Collaborative Filtering with Cosine Similarity,” IEEE Int. Conf. on Information Technology, 2017.

[6] L. Sweeney, “k-Anonymity: A Model for Protecting Privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002.

[7] H. Brendan McMahan et al., “Communication-Efficient Learning of Deep Networks from Decentralized Data,” Proc. AISTATS, 2017. (FedAvg)

[8] P. Kairouz et al., “Advances and Open Problems in Federated Learning,” Foundations and Trends in Machine Learning, 2021.

[9] N. Papernot et al., “Scalable Private Learning with PATE,” ICLR, 2018.

[10] R. Shokri and V. Shmatikov, “Privacy-Preserving Deep Learning,” ACM CCS, 2015.

[11] Y. Zhao et al., “Federated Learning with Non-IID Data,” arXiv:1806.00582, 2018.

[12] J. Dean et al., “Large-Scale Distributed Deep Networks,” Advances in Neural Information Processing Systems, 2012.

[13] B. M. Sarwar, G. Karypis and J. Konstan, “Item-Based Collaborative Filtering Recommendation Algorithms,” WWW Conf., 2001.

[14] S. Berkovsky, Y. Eytani and T. Kuflik, “Privacy-Preserving Collaborative Filtering Using Random Perturbation Techniques,” RecSys, 2007.

[15] D. J. Wu et al., “Secure Multiparty Computation for Machine Learning,” IEEE Security & Privacy, 2016.

[16] Z. Yang, M. Lyu, and I. King, “A Survey of Collaborative Filtering Techniques,” IEEE Trans. Systems, Man and Cybernetics, 2019.

[1] C.Nagarajan and M.Madheswaran - ‘Stability Analysis of Series Parallel Resonant Converter with Fuzzy Logic Controller Using State Space Techniques’- Taylor &Francis, Electric Power Components and Systems, Vol.39 (8), pp.780-793, May 2011. DOI: 10.1080/15325008.2010.541746

[2] C.Nagarajan and M.Madheswaran - ‘Experimental verification and stability state space analysis of CLL-T Series Parallel Resonant Converter’ - Journal of Electrical Engineering, Vol.63 (6), pp.365-372, Dec.2012. DOI: 10.2478/v10187-012-0054-2

[3] C.Nagarajan and M.Madheswaran - ‘Performance Analysis of LCL-T Resonant Converter with Fuzzy/PID Using State Space Analysis’- Springer, Electrical Engineering, Vol.93 (3), pp.167-178, September 2011. DOI 10.1007/s00202-011-0203-9

[4] S.Tamilselvi, R.Prakash, C.Nagarajan,“Solar System Integrated Smart Grid Utilizing Hybrid Coot-Genetic Algorithm Optimized ANN Controller” Iranian Journal Of Science And Technology-Transactions Of Electrical Engineering, DOI10.1007/s40998-025-00917-z,2025

[5] S.Tamilselvi, R.Prakash, C.Nagarajan,“ Adaptive sliding mode control of multilevel grid-connected inverters using reinforcement learning for enhanced LVRT performance” Electric Power Systems Research 253 (2026) 112428, doi.org/10.1016/j.epsr.2025.112428

[6] S.Thirunavukkarasu, C. Nagarajan, 2024, “Performance Investigation on OCF and SCF study in BLDC machine using FTANN Controller," Journal of Electrical Engineering And Technology, Volume 20, pages 2675–2688, (2025), doi.org/10.1007/s42835-024-02126-w

[7] C. Nagarajan, M.Madheswaran and D.Ramasubramanian- ‘Development of DSP based Robust Control Method for General Resonant Converter Topologies using Transfer Function Model’- Acta Electrotechnica et Informatica Journal , Vol.13 (2), pp.18-31,April-June.2013, DOI: 10.2478/aeei-2013-0025.

[8] C.Nagarajan and M.Madheswaran - ‘DSP Based Fuzzy Controller for Series Parallel Resonant converter’- Springer, Frontiers of Electrical and Electronic Engineering, Vol. 7(4), pp. 438-446, Dec.12. DOI 10.1007/s11460-012-0212-0.

[9] C.Nagarajan and M.Madheswaran - ‘Experimental Study and steady state stability analysis of CLL-T Series Parallel Resonant Converter with Fuzzy controller using State Space Analysis’- Iranian Journal of Electrical & Electronic Engineering, Vol.8 (3), pp.259-267, September 2012.

[10] C.Nagarajan and M.Madheswaran, “Analysis and Simulation of LCL Series Resonant Full Bridge Converter Using PWM Technique with Load Independent Operation” has been presented in ICTES’08, a IEEE / IET International Conference organized by M.G.R.University, Chennai.Vol.no.1, pp.190-195, Dec.2007

[11] Suganthi Mullainathan, Ramesh Natarajan, “An SPSS and CNN modelling based quality assessment using ceramic materials and membrane filtration techniques”, Revista Materia (Rio J.) Vol. 30, 2025, DOI: https://doi.org/10.1590/1517-7076-RMAT-2024-0721

[12] M Suganthi, N Ramesh, “Treatment of water using natural zeolite as membrane filter”, Journal of Environmental Protection and Ecology, Volume 23, Issue 2, pp: 520-530,2022

[17] R. Rajkumar et al., “Federated Learning for Recommender Systems: Challenges and Opportunities,” ACM Computing Surveys, 2022.

[18] M. Abadi et al., “Deep Learning with Differential Privacy,” ACM CCS, 2016.

[19] A. Hard et al., “Federated Learning for Mobile Keyboard Prediction,” arXiv:1811.03604, 2018.

[20] S. Bonawitz et al., “Practical Secure Aggregation for Privacy-Preserving Machine Learning,” ACM CCS, 2017.

[21] Garg, V. K., Soundappan, S. J., & Kaur, E. M. (2020). Enhancement in intrusion detection system for WLAN using genetic algorithms. South Asian Research Journal of Engineering and Technology, 2(6), 62–64. https://doi.org/10.36346/sarjet.2020.v02i06.003

[22] Sugumar, R. (2025). Secure and Explainable AI Systems in Cloud-Based Applications: Bridging Trust and Performance. International Journal of Engineering & Extended Technologies Research (IJEETR), 7(4), 10328-10335.

[23] Mathew, A., & Alex, H. (2023). From Code to Cure: The Role of AI in Accelerating Drug Discovery. Advances and Challenges in Science and Technology Vol. 2, 94-102.

Downloads

Published

2026-03-28

How to Cite

Federated Learning-Based Recommender System with Data Anonymization and Encryption. (2026). International Journal of Engineering & Extended Technologies Research (IJEETR), 8(2), 1450-1457. https://doi.org/10.15662/IJEETR.2026.0802104