Open Access Open Access  Restricted Access Subscription Access

Privacy-Preserving AI on Edge Devices: A Comparative Study of On-Device Learning and Cloud Processing

Mission Franklin

Abstract


The rise of edge computing has transformed how artificial intelligence (AI) processes personal and sensitive data. Traditional cloud-based AI architectures raise privacy concerns due to the transmission and centralized storage of user data. On-device learning, by contrast, enables local inference, enhancing data privacy and reducing network dependency. This study conducts a comparative analysis of on-device learning and cloud-based AI processing using a human activity recognition (HAR) task. We evaluate both approaches on model accuracy, latency, energy consumption, and privacy exposure. Our findings reveal that while cloud-based models slightly outperform in accuracy and energy efficiency, on-device models offer significantly lower latency and enhanced privacy by eliminating the need for data transmission. The results support a privacy-preserving edge AI paradigm, particularly for applications in healthcare, personal security, and mobile computing. Recommendations are provided to guide system architects in selecting deployment strategies aligned with privacy, performance, and regulatory requirements.


Full Text:

PDF

References


Abadi, M., Chu, A., Goodfellow, I., McMahan, H. B., Mironov, I., Talwar, K., & Zhang, L. (2016). Deep learning with differential privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (pp. 308–318). ACM. https://doi.org/10.1145/2976749.2978318

Banbury, C. R., Reddi, V. J., Lam, M., Fu, W., Fazel, A., Holleman, J., … Yadav, P. (2020). Benchmarking TinyML Systems: Challenges and Direction. In SysML 2020 Proceedings. (arXiv:2003.04821)

Bertani, A., Caraccio, D., Zanero, S., & Polino, M. (2025). Confidential computing: A security overview and future research directions. In CEUR Workshop Proceedings (Vol. 3962). CEUR-WS.org.

Bonawitz, K., Eichner, H., Grieskamp, W., Huba, D., Ingerman, A., Ivanov, V., Kiddon, C., Konečný, J., Mazzocchi, S., McMahan, H. B., Van Overveldt, T., Petrou, D., Ramage, D., &

Roselander, J. (2019). Towards federated learning at scale: System design [Preprint]. arXiv. https://doi.org/10.48550/arXiv.1902.01046

Chauhan , M., & Shiaeles, S. (2023). An analysis of cloud security frameworks, problems and proposed solutions. Network, 3(3), 422–450. https://doi.org/10.3390/network3030018

Daruvuri, R., & Patibandla, K. K. (2023). Enhancing data security and privacy in edge computing: A comprehensive review of key technologies and future directions. International Journal of Research in Electronics and Computer Engineering (IJRECE), 11(1), 77–88.

Deng, S., Zhao, H., Fang, W., Yin, J., Dustdar, S., & Zomaya, A. Y. (2020). Edge intelligence: The confluence of edge computing and artificial intelligence. IEEE Internet of Things Journal, 7(8), 7457–7469. https://doi.org/10.1109/JIOT.2020.2984887

Geyer, R. C., Klein, T., & Nabi, M. (2017). Differentially Private Federated Learning: A Client Level Perspective. arXiv preprint arXiv:1712.07557. https://arxiv.org/abs/1712.07557

Gill, S. S., Golec, M., Hu, J., Xu, M., Du, J., Wu, H., Walia, G. K., Murugesan, S. S., Ali, B.,


Refbacks

  • There are currently no refbacks.