A Privacy-Preserving Federated Learning Method with Homomorphic Encryption for Chronic Kidney Disease Stage Prediction
Received: 5 May 2025 | Revised: 27 May 2025 and 9 June 2025 | Accepted: 15 June 2025 | Online: 16 July 2025
Corresponding author: M. Gayathri Hegde
Abstract
Federated Learning (FL) enables collaborative model training across decentralized healthcare institutions without requiring the sharing of Electronic Healthcare Records (EHRs), thereby ensuring data locality and reducing privacy risks. In this study, a baseline FL framework was implemented with one central server and four hospital clients, utilizing a real-time Chronic Kidney Disease (CKD) dataset. However, privacy assessments conducted using three simulated adversarial attacks, model inversion, Membership Inference Attacks (MIA), and gradient leakage, revealed significant vulnerabilities in the plain FL setup. To address these vulnerabilities, this work proposes a secure Federated Learning-Homomorphic Encryption (FL-HE) framework that integrates FL with encryption techniques using the TenSEAL library. The proposed FL-HE framework introduces a layer-wise encryption strategy, securing model parameters, bias, and feature normalization, ensuring end-to-end confidentiality. While the integration of HE introduces computational overhead, the FL-HE framework achieves a high prediction accuracy of 98.6%, nearly identical to the 98.7% achieved by the unencrypted FL model. These results underscore the strong privacy-preserving capabilities of the FL-HE framework without compromising the performance of the model, making it suitable for applications like in healthcare, where the privacy of data is of utmost importance.
Keywords:
federated learning, homomorphic encryption, electronic health records, privacy-preservation, secure model aggregationDownloads
References
B. A. Satterfield, O. Dikilitas, and I. J. Kullo, "Leveraging the Electronic Health Record to Address the COVID-19 Pandemic," Mayo Clinic Proceedings, vol. 96, no. 6, pp. 1592–1608, Jun. 2021. DOI: https://doi.org/10.1016/j.mayocp.2021.04.008
J. Fu, Z. Chen, and X. Han, "Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise," in 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Wuhan, China, Dec. 2022, pp. 656–663. DOI: https://doi.org/10.1109/TrustCom56396.2022.00094
C. Song, Z. Wang, W. Peng, and N. Yang, "Secure and Efficient Federated Learning Schemes for Healthcare Systems," Electronics, vol. 13, no. 13, Jul. 2024, Art. no. 2620. DOI: https://doi.org/10.3390/electronics13132620
L. Chen, D. Xiao, Z. Yu, and M. Zhang, "Secure and efficient federated learning via novel multi-party computation and compressed sensing," Information Sciences, vol. 667, May 2024, Art. no. 120481. DOI: https://doi.org/10.1016/j.ins.2024.120481
J. Park and H. Lim, "Privacy-Preserving Federated Learning Using Homomorphic Encryption," Applied Sciences, vol. 12, no. 2, Jan. 2022, Art. no. 734. DOI: https://doi.org/10.3390/app12020734
G. Long, Y. Tan, J. Jiang, and C. Zhang, "Federated Learning for Open Banking," in Lecture Notes in Computer Science, Cham: Springer International Publishing, 2020, pp. 240–254. DOI: https://doi.org/10.1007/978-3-030-63076-8_17
A. Alwabli, "Federated Learning for Privacy-Preserving Air Quality Forecasting using IoT Sensors," Engineering, Technology & Applied Science Research, vol. 14, no. 4, pp. 16069–16076, Aug. 2024. DOI: https://doi.org/10.48084/etasr.7820
D. Shenaj, G. Rizzoli, and P. Zanuttigh, "Federated Learning in Computer Vision," IEEE Access, vol. 11, pp. 94863–94884, 2023. DOI: https://doi.org/10.1109/ACCESS.2023.3310400
D. Dhinakaran, N. Jagadish Kumar, N. P. Ponnuviji, and B. Praveen Kumar, "Safeguarding confidentiality and privacy in cloud-enabled healthcare systems with spectrasafe encryption and dynamic k-anonymity algorithm," Expert Systems with Applications, vol. 279, Jun. 2025, Art. no. 127584. DOI: https://doi.org/10.1016/j.eswa.2025.127584
D. Dhinakaran, G. Prabaharan, K. Valarmathi, S. M. Udhaya Sankar, and R. Sugumar, "Safeguarding Privacy by utilizing SC-DℓDA Algorithm in Cloud-Enabled Multi Party Computation," KSII Transactions on Internet and Information Systems, vol. 19, no. 2, Feb. 2025. DOI: https://doi.org/10.3837/tiis.2025.02.014
D. Dhinakaran, L. Srinivasan, D. Selvaraj, and T. P. Anish, "A Novel Privacy Preservation of Healthcare Data with Information Entropy-Based Multi-Scheme Fully Homomorphic Encryption and Rivest Shamir Adleman Techniques," Biomedical Engineering: Applications, Basis and Communications, Feb. 2025. DOI: https://doi.org/10.4015/S1016237224500601
L. Zhang, G. Fang, and Z. Tan, "FedCCW: a privacy-preserving Byzantine-robust federated learning with local differential privacy for healthcare," Cluster Computing, vol. 28, no. 3, Jun. 2025. DOI: https://doi.org/10.1007/s10586-024-04894-6
A. P. Kalapaaking, I. Khalil, and X. Yi, "Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems," arXiv, 2023. DOI: https://doi.org/10.1109/TETC.2023.3268186
K. B. Nampalle, P. Singh, U. V. Narayan, and B. Raman, "Vision Through the Veil: Differential Privacy in Federated Learning for Medical Image Classification," arXiv, Jun. 2023.
M. H. Fares and A. M. S. E. Saad, "Towards Privacy-Preserving Medical Imaging: Federated Learning with Differential Privacy and Secure Aggregation Using a Modified ResNet Architecture." arXiv, 2024.
B. Wang, H. Li, Y. Guo, and J. Wang, "PPFLHE: A privacy-preserving federated learning scheme with homomorphic encryption for healthcare data," Applied Soft Computing, vol. 146, Art. no. 110677, Oct. 2023. DOI: https://doi.org/10.1016/j.asoc.2023.110677
Y. Xu, J. Zhang, and Y. Gu, "Privacy-Preserving Heterogeneous Federated Learning for Sensitive Healthcare Data." arXiv, 2024. DOI: https://doi.org/10.1109/CAI59869.2024.00204
R. Ahmed, P. K. R. Maddikunta, T. R. Gadekallu, N. K. Alshammari, and F. A. Hendaoui, "Efficient differential privacy enabled federated learning model for detecting COVID-19 disease using chest X-ray images," Frontiers in Medicine, vol. 11, Jun. 2024. DOI: https://doi.org/10.3389/fmed.2024.1409314
B. Zhu and L. Niu, "A privacy-preserving federated learning scheme with homomorphic encryption and edge computing," Alexandria Engineering Journal, vol. 118, pp. 11–20, Apr. 2025. DOI: https://doi.org/10.1016/j.aej.2024.12.070
H. Wang, Q. Wang, Y. Ding, S. Tang, and Y. Wang, "Privacy-preserving federated learning based on partial low-quality data," Journal of Cloud Computing, vol. 13, no. 1, Mar. 2024. DOI: https://doi.org/10.1186/s13677-024-00618-8
T. Muazu, Y. Mao, A. U. Muhammad, M. Ibrahim, U. M. M. Kumshe, and O. Samuel, "A federated learning system with data fusion for healthcare using multi-party computation and additive secret sharing," Computer Communications, vol. 216, pp. 168–182, Feb. 2024. DOI: https://doi.org/10.1016/j.comcom.2024.01.006
S. Li, Y. Liu, F. Feng, Y. Liu, X. Li, and Z. Liu, "HierFedPDP:Hierarchical federated learning with personalized differential privacy," Journal of Information Security and Applications, vol. 86, Nov. 2024, Art. no. 103890. DOI: https://doi.org/10.1016/j.jisa.2024.103890
Z. Shi, Z. Yang, A. Hassan, F. Li, and X. Ding, "A privacy preserving federated learning scheme using homomorphic encryption and secret sharing," Telecommunication Systems, vol. 82, no. 3, pp. 419–433, Mar. 2023. DOI: https://doi.org/10.1007/s11235-022-00982-3
H. Ku, W. Susilo, Y. Zhang, W. Liu, and M. Zhang, "Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption," Computer Standards & Interfaces, vol. 80, Mar. 2022, Art. no. 103583. DOI: https://doi.org/10.1016/j.csi.2021.103583
R. G. Goriparthi, "Federated Learning Models for Privacy-Preserving AI in Distributed Healthcare Systems," International Journal of Machine Learning Research in Cybersecurity and Artificial Intelligence, vol. 14, no. 1, pp. 650–673, 2023.
S. M. Gouse and V. B. Burra, "An Efficient Multi-Class Privacy-Preserving-Based Encryption Framework for Large Distributed Databases," International Journal of Reliability, Quality and Safety Engineering, vol. 30, no. 04, Aug. 2023. DOI: https://doi.org/10.1142/S0218539323410036
A. Garba, S. Khalid, I. Ullah, S. Khusro, and D. Mumin, "Embedding based learning for collection selection in federated search," Data Technologies and Applications, vol. 54, no. 5, pp. 703–717, Oct. 2020. DOI: https://doi.org/10.1108/DTA-01-2019-0005
A. Garba, S. Khalid, and I. Ullah, "Understanding the impact of query expansion on federated search," Multimedia Tools and Applications, vol. 83, no. 4, pp. 10393–10407, Jan. 2024. DOI: https://doi.org/10.1007/s11042-023-15831-x
M. Gayathri Hegde, P. S. Marellavar, G. Sunil Kumar, P. D. Shenoy, K. R. Venugopal, and C. Arvind, "A WebApp Framework for the prediction of e-GFR value and CKD stage using Regression-based Machine Learning Algorithms," in 2024 IEEE 5th India Council International Subsections Conference (INDISCON), Chandigarh, India, Aug. 2024, pp. 1–6. DOI: https://doi.org/10.1109/INDISCON62179.2024.10744278
J. H. Cheon, A. Kim, M. Kim, and Y. Song, "Homomorphic Encryption for Arithmetic of Approximate Numbers," in Lecture Notes in Computer Science, Cham: Springer International Publishing, 2017, pp. 409–437. DOI: https://doi.org/10.1007/978-3-319-70694-8_15
M. Albrecht et al., "Homomorphic Encryption Security Standard," HomomorphicEncryption.org, Toronto, Canada, Technical Report, Nov. 2018.
Downloads
How to Cite
License
Copyright (c) 2025 M. Gayathri Hegde, B. Ruthvika, Ruthu B. Jain, P. Deepa Shenoy, K. R. Venugopal, Arvind Canchi

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
