Privacy-Utility Tradeoffs in Federated Financial Analytics: An Optimization Framework

Main Article Content

Yiyi Cai

Abstract

Cross-institutional financial analytics face fundamental challenges balancing privacy protection, model utility, and computational efficiency. This paper presents a comprehensive optimization framework addressing privacy-utility tradeoffs in federated learning for financial services. We propose adaptive privacy budget allocation mechanisms combined with a hybrid Trusted Execution Environment and Secure Multi-Party Computation protocols. Our framework targets KYC/AML workflows where regulatory compliance demands stringent data protection without sacrificing analytical AUC‑ROC. Experimental evaluation demonstrates superior performance across multiple financial datasets, achieving AUC-ROC = 0.867 at ε=2.0, while reducing per-round bandwidth costs by ~94% via gradient compression; TEE-assisted aggregation reduces compute/round-trip overhead rather than bandwidth. (achieving 3.21× speedup over a pure MPC-based secure aggregation baseline and reducing round time from 847s to 264s). The proposed approach ensures algorithmic fairness through demographic parity constraints and provides quantifiable privacy risk metrics aligned with commonly used industry thresholds and internal policy targets. Metric Convention: Unless otherwise specified, all performance metrics reported in this paper are AUC‑ROC; any occurrences labeled as 'AUC‑ROC' in results refer to AUC‑ROC for binary classification.

Article Details

Section

Articles

How to Cite

Privacy-Utility Tradeoffs in Federated Financial Analytics: An Optimization Framework. (2026). Journal of Science, Innovation & Social Impact, 2(1), 80-95. https://sagespress.com/index.php/JSISI/article/view/83

References

1. T. Li, A. K. Sahu, A. Talwalkar, and V. Smith, "Federated learning: Challenges, methods, and future directions," IEEE signal processing magazine, vol. 37, no. 3, pp. 50-60, 2020. doi: 10.1109/msp.2020.2975749

2. G. Long, Y. Tan, J. Jiang, and C. Zhang, "Federated learning for open banking," In Federated learning: privacy and incentive, 2020, pp. 240-254. doi: 10.1007/978-3-030-63076-8_17

3. N. Kumar, M. Rathee, N. Chandran, D. Gupta, A. Rastogi, and R. Sharma, "Cryptflow: Secure tensorflow inference," In 2020 IEEE Symposium on Security and Privacy (SP), May, 2020, pp. 336-353. doi: 10.1109/sp40000.2020.00092

4. K. Wei, J. Li, M. Ding, C. Ma, H. H. Yang, F. Farokhi, and H. V. Poor, "Federated learning with differential privacy: Algorithms and performance analysis," IEEE transactions on information forensics and security, vol. 15, pp. 3454-3469, 2020.

5. T. Awosika, R. M. Shukla, and B. Pranggono, "Transparency and privacy: the role of explainable ai and federated learning in financial fraud detection," IEEE access, vol. 12, pp. 64551-64560, 2024. doi: 10.1109/access.2024.3394528

6. K. Wei, J. Li, C. Ma, M. Ding, W. Chen, J. Wu, and H. V. Poor, "Personalized federated learning with differential privacy and convergence guarantee," IEEE Transactions on Information Forensics and Security, vol. 18, pp. 4488-4503, 2023. doi: 10.1109/tifs.2023.3293417

7. D. Pessach, and E. Shmueli, "A review on fairness in machine learning," ACM Computing Surveys (CSUR), vol. 55, no. 3, pp. 1-44, 2022. doi: 10.1145/3494672

8. Z. Dong and R. Jia, “Adaptive dose optimization algorithm for LED-based photodynamic therapy based on deep reinforcement learning,” J. Sustain., Policy, Pract., vol. 1, no. 3, pp. 144–155, 2025.

9. D. Byrd, and A. Polychroniadou, "Differentially private secure multi-party computation for federated learning in financial applications," In Proceedings of the first ACM international conference on AI in finance, October, 2020, pp. 1-9. doi: 10.1145/3383455.3422562

10. G. Andrew, O. Thakkar, B. McMahan, and S. Ramaswamy, "Differentially private learning with adaptive clipping," Advances in Neural Information Processing Systems, vol. 34, pp. 17455-17466, 2021.

11. M. Keller, "MP-SPDZ: A versatile framework for multi-party computation," In Proceedings of the 2020 ACM SIGSAC conference on computer and communications security, October, 2020, pp. 1575-1590. doi: 10.1145/3372297.3417872

12. V. Costan, and S. Devadas, "Intel SGX explained," Cryptology ePrint Archive, 2016.

13. S. Sav, A. Pyrgelis, J. R. Troncoso-Pastoriza, D. Froelicher, J. P. Bossuat, J. S. Sousa, and J. P. Hubaux, "POSEIDON: Privacy-preserving federated neural network learning," arXiv preprint arXiv:2009.00349, 2020.

14. M. Abadi, A. Chu, I. Goodfellow, H. B. McMahan, I. Mironov, K. Talwar, and L. Zhang, "Deep learning with differential privacy," In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, October, 2016, pp. 308-318. doi: 10.1145/2976749.2978318

15. Z. Song, Y. Zhang, and I. King, "Towards fair financial services for all: A temporal GNN approach for individual fairness on transaction networks," In Proceedings of the 32nd ACM international conference on information and knowledge management, October, 2023, pp. 2331-2341. doi: 10.1145/3583780.3615091.