Blockchain-Integrated Support Vector Machine Framework for Privacy-Preserving Predictive Analytics
DOI:
https://doi.org/10.22399/ijcesen.4055Keywords:
Machine Learning, Blockchain Integration, Privacy-Preserving Algorithms, Sentiment Analysis, Data SecurityAbstract
This paper presents a blockchain-integrated Support Vector Machine (SVM) framework that addresses the privacy, trust, and ownership limitations of conventional client–server architectures. In the proposed design, clients train local SVM models and share only encrypted parameters, while blockchain ensures secure aggregation, tamper-proof logging, and transparent auditability.This study proposes a framework that combines blockchain technology with Support Vector Machines (SVM) to improve privacy, transparency, and accountability in predictive analytics. Experiments on MNIST and CIFAR-10 show that the framework achieves accuracy comparable to conventional SVMs (0.92 vs. 0.93), while enabling tamper-resistant predictions and verifiable model operations. Blockchain integration introduces moderate overhead—latency of 18–19 ms and transaction costs around 22,500 gas units—but these are outweighed by gains in data security, decentralized control, and auditability. To the best of our knowledge, this is among the first efforts to merge SVM with blockchain for secure predictive modeling. The framework is scalable, reliable, and well-suited for sensitive domains such as healthcare, finance, and intelligent transportation systems.
References
[1] A. L. Samuel, “Some studies in machine learning using the game of checkers,” IBM Journal of Research and Development, vol. 3, no. 3, pp. 210–229, 1959.
[2] F. Rosenblatt, “The perceptron: A probabilistic model for information storage and organization in the brain,” Psychological Review, vol. 65, no. 6, pp. 386–408, 1958.
[3] D. E. Rumelhart, G. E. Hinton, and R. J. Williams, “Learning representations by back-propagating errors,” Nature, vol. 323, no. 6088, pp. 533–536, 1986.
[4] C. Cortes and V. Vapnik, “Support-vector networks,” Machine Learning, vol. 20, no. 3, pp. 273–297, 1995.
[5] L. Breiman, “Random forests,” Machine Learning, vol. 45, no. 1, pp. 5–32, 2001.
[6] I. T. Jolliffe, Principal Component Analysis, 2nd ed. New York: Springer, 2002.
[7] O. Chapelle, B. Schölkopf, and A. Zien, “Semi-supervised learning using Gaussian fields and harmonic functions,” Machine Learning, vol. 62, pp. 239–259, 2006.
[8] K. Liu and T. Yu, “Privacy-preserving SVM classification on vertically partitioned data,” in Proc. IEEE Int. Conf. Data Mining Workshops (ICDMW), 2013, pp. 647–654.
[9] S. Tavara, “Federated SVM: A privacy-preserving support vector machine for decentralized learning,” Future Generation Computer Systems, vol. 132, pp. 231–242, 2022.
[10] Z. Xiong, Y. Zhang, D. Niyato, J. Kang, and P. Wang, “Blockchain for secure and efficient data sharing in vehicular edge computing and networks,” IEEE Internet of Things Journal, vol. 7, no. 4, pp. 2449–2462, Apr. 2020.
[11] C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proc. 41st ACM Symp. Theory Comput., 2009, pp. 169–178.
[12] K. Bonawitz et al., “Practical secure aggregation for privacy-preserving machine learning,” in Proc. ACM SIGSAC Conf. Computer and Communications Security (CCS), 2017, pp. 1175–1191.
[13] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf
[14] G. Wood, “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum Project Yellow Paper, 2014.
[15] Y. Zhang and H. A. Jacobsen, “Towards dependable, scalable, and pervasive distributed ledgers with Blockchains,” Proc. VLDB Endowment, vol. 10, no. 12, pp. 1730–1731, 2018.
[16] P. Kairouz et al., “Advances and open problems in federated learning,” Foundations and Trends® in Machine Learning, vol. 14, nos. 1–2, pp. 1–210, 2021.
[17] R. Shokri and V. Shmatikov, “Privacy-preserving deep learning,” in Proc. 22nd ACM SIGSAC Conf. Computer and Communications Security (CCS), 2015, pp. 1310–1321.
[18] T. Li, A. K. Sahu, A. Talwalkar, and V. Smith, “Federated learning: Challenges, methods, and future directions,” IEEE Signal Processing Magazine, vol. 37, no. 3, pp. 50–60, May 2020.
[19] M. Abadi et al., “Deep learning with differential privacy,” in Proc. 2016 ACM SIGSAC Conf. Computer and Communications Security (CCS), 2016, pp. 308–318.
[20] A. C. Yao, “Protocols for secure computations,” in Proc. 23rd Annu. Symp. Foundations of Computer Science (SFCS), 1982, pp. 160–164.
[21] R. Zhang, R. Xue, and L. Liu, “Security and privacy on blockchain,” ACM Computing Surveys, vol. 52, no. 3, pp. 1–34, 2019.
[22] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the Internet of Things,” IEEE Access, vol. 4, pp. 2292–2303, 2016.
[23] S. Wang, L. Ouyang, Y. Yuan, X. Ni, X. Han, and F. Y. Wang, “Blockchain-enabled smart contracts: Architecture, applications, and future trends,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 49, no. 11, pp. 2266–2277, Nov. 2019.
[24] G. Zyskind, O. Nathan, and A. Pentland, “Decentralizing privacy: Using blockchain to protect personal data,” in Proc. IEEE Security and Privacy Workshops (SPW), 2015, pp. 180–184.
[25] M. Risius and K. Spohrer, “A blockchain research framework,” Business & Information Systems Engineering, vol. 59, no. 6, pp. 385–409, 2017.
[26] J. Han, M. Kamber, and J. Pei, Data Mining: Concepts and Techniques, 3rd ed. Elsevier, 2012.
[27] C. Aggarwal and C. Zhai, Mining Text Data. New York: Springer, 2012.
[28] Y. Kim, “Convolutional neural networks for sentence classification,” in Proc. EMNLP, 2014, pp. 1746–1751.
[29] A. Huang, “Similarity measures for text document clustering,” in Proc. Sixth NZ Computer Science Research Student Conf., 2008, pp. 49–56.
[30] M. T. Ribeiro, S. Singh, and C. Guestrin, “Why should I trust you?: Explaining the predictions of any classifier,” in Proc. ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining (KDD), 2016, pp. 1135–1144.
[31] T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient estimation of word representations in vector space,” arXiv preprint arXiv:1301.3781, 2013.
[32] P. Domingos, “A few useful things to know about machine learning,” Communications of the ACM, vol. 55, no. 10, pp. 78–87, 2012.
[33] B. McMahan et al., “Communication-efficient learning of deep networks from decentralized data,” in Proc. AISTATS, 2017, pp. 1273–1282.
[34] J. Konečný, H. B. McMahan, F. X. Yu, P. Richtárik, A. T. Suresh, and D. Bacon, “Federated learning: Strategies for improving communication efficiency,” in Proc. NIPS Workshop on Private Multi-Party Machine Learning, 2016.
[35] R. Rivest, L. Adleman, and M. Dertouzos, “On data banks and privacy homomorphisms,” Foundations of Secure Computation, vol. 4, no. 11, pp. 169–180, 1978.
[36] K. Christidis, “Blockchain-based trust management in IoT,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 2292–2303, 2017.
[37] H. W. Lim, M. R. Asghar, and H. B. Kang, “Blockchain technology for machine learning: A survey,” Electronics, vol. 12, no. 3, pp. 1–21, 2023.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 International Journal of Computational and Experimental Science and Engineering

This work is licensed under a Creative Commons Attribution 4.0 International License.