A Decentralized Cloud-Edge Infrastructure for Social Commerce: Accelerating Privacy-Preserving LLM Inference via Trusted Execution Environments

Authors

  • Elias Vance Department of Computer Science and Information Systems, Bradley University
  • Alan Davenport Department of Electrical Engineering and Computer Science, University of New Mexico
  • Douglas Redmond Department of Management Information Systems, University of Delaware

Keywords:

Distributed Systems, Social Commerce, Trusted Execution Environments, Edge Computing, Large Language Models, Privacy-Preserving AI, Socio-Technical Infrastructure.

Abstract

The convergence of social networking and electronic commerce, termed social commerce, has necessitated a paradigm shift in how personalized digital experiences are delivered. At the heart of this evolution is the deployment of Large Language Models (LLMs) to facilitate context-aware interactions, personalized recommendations, and automated customer service. However, the centralization of user data required for LLM inference poses significant privacy risks and creates substantial latency bottlenecks in high-throughput environments. This paper proposes a novel decentralized cloud-edge infrastructure designed specifically for the social commerce domain. By distributing LLM inference tasks across a continuum of edge nodes and cloud servers, the proposed architecture minimizes data movement and optimizes response times. Central to this infrastructure is the integration of hardware-assisted security through Trusted Execution Environments (TEEs), which ensure that sensitive user data remains encrypted and isolated even during the inference process. We provide an exhaustive system-level analysis of this framework, emphasizing the structural trade-offs between computational overhead and security guarantees. The discussion extends to broader socio-technical implications, including infrastructure governance, environmental sustainability of decentralized AI, and the policy challenges associated with hardware-verified privacy. Our findings suggest that a tiered, TEE-augmented approach not only enhances user privacy but also provides the necessary scalability for the next generation of global social commerce platforms.

References

1.Abadi, M., Chu, A., Goodfellow, I., McMahan, H. B., Mironov, I., Talwar, K., & Zhang, L. (2016). Deep learning with differential privacy. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 308–318.

2.Acquisti, A., Taylor, C., & Wagman, L. (2016). The economics of privacy. Journal of Economic Literature, 54(2), 442–492.

3.Anati, I., Gueron, S., Johnson, S., & Scarlata, V. (2013). Innovative instructions and software model for isolated execution. Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, 10(1).

4.Bonawitz, K., Eichner, H., Grieskamp, W., Huba, D., Ingerman, A., Ivanov, V., ... & Roselander, J. (2019). Towards federated learning at scale: System design. arXiv preprint arXiv:1902.01046.

5.Brown, T., Mann, B., Ryder, N., Subbiah, M., Kaplan, J. D., Dhariwal, P., ... & Amodei, D. (2020). Language models are few-shot learners. Advances in Neural Information Processing Systems, 33, 1877–1901.

6.Chen, Y., & Sun, Y. (2020). Social commerce: A systematic review and future research directions. Journal of Business Research, 111, 1–10.

7.Costan, V., & Devadas, S. (2016). Intel SGX explained. Cryptology ePrint Archive.

8.Chen, X. (2024, November). Cloud Storage User Behavior Analysis and Dynamic Replica Strategy Optimization Based on Improved RFM and Fuzzy Clustering. In International Conference on Cognitive based Information Processing and Applications (pp. 425-434). Singapore: Springer Nature Singapore.

9.Dwork, C. (2008). Differential privacy: A survey of results. International Conference on Theory and Applications of Models of Computation, 1–19.

10.Ghoshal, B., & Tucker, A. (2022). Scalable inference for deep learning in finance. Quantitative Finance, 22(10), 1845–1860.

11.Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press.

12.Hardt, M., Price, E., & Srebro, N. (2016). Equality of opportunity in supervised learning. Advances in Neural Information Processing Systems, 29.

13.Kairouz, P., McMahan, H. B., Avent, B., Bellet, A., Bennis, M., Bhagoji, A. N., ... & Zhao, S. (2021). Advances and open problems in federated learning. Foundations and Trends® in Machine Learning, 14(1–2), 1–210.

14.Li, T., Sahu, A. K., Talwalkar, A., & Smith, V. (2020). Federated learning: Challenges, methods, and future directions. IEEE Signal Processing Magazine, 37(3), 50–60.

15.McMahan, B., Moore, E., Ramage, D., Hampson, S., & y Arcas, B. A. (2017). Communication-efficient learning of deep networks from decentralized data. Artificial Intelligence and Statistics, 1273–1282.

16.Narayanan, A., & Shmatikov, V. (2008). Robust de-anonymization of large sparse datasets. 2008 IEEE Symposium on Security and Privacy, 111–125.

17.Nisan, N., Roughgarden, T., Tardos, E., & Vazirani, V. V. (2007). Algorithmic Game Theory. Cambridge University Press.

18.Pasquale, F. (2015). The Black Box Society: The Secret Algorithms That Control Money and Information. Harvard University Press.

19.Shalf, J. (2020). The future of computing beyond Moore’s Law. Philosophical Transactions of the Royal Society A, 378(2166).

20.Stoica, I., et al. (2017). Ray: A distributed framework for emerging AI applications. 13th USENIX Symposium on Operating Systems Design and Implementation.

21.Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A. N., ... & Polosukhin, I. (2017). Attention is all you need. Advances in Neural Information Processing Systems, 30.

22.Varian, H. R. (2007). Position auctions. International Journal of Industrial Organization, 25(6), 1163–1178.

23.Wu, C., Wu, F., Lyu, L., Huang, Y., & Xie, X. (2022). Communication-efficient federated learning via knowledge distillation. Nature Communications, 13(1), 2032.

24.Yang, Q., Liu, Y., Chen, T., & Tong, Y. (2019). Federated machine learning: Concept and applications. ACM Transactions on Intelligent Systems and Technology (TIST), 10(2), 1–19.

25.Yi, X. (2026). Privacy-Enhanced Ad Targeting for Social E-Commerce: A Federated Learning Framework with Zero-Knowledge Verification for Creator Monetization. Frontiers in Business and Finance, 3(1), 102-113.

26.Zaharia, M., et al. (2012). Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. 9th USENIX Symposium on Networked Systems Design and Implementation.

27.Zhao, Y., Li, M., Lai, L., Suda, N., Civin, D., & Chandra, V. (2018). Federated learning with non-iid data. arXiv preprint arXiv:1806.00582.

28.Zhu, H., Xu, Z., & Huang, Y. (2021). Federated learning for social recommendations. Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2416–2420.

29.Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs.

30.Zhang, C., Xie, Y., Bai, H., Yu, B., Li, W., & Gao, Y. (2023). A survey on federated learning for large language models. arXiv preprint arXiv:2306.05499.

31.Wang, J., et al. (2021). A field guide to federated optimization. arXiv preprint arXiv:2107.06917.

32.Rothchild, D., et al. (2020). FetchSGD: Communication-efficient federated learning with sketching. Proceedings of the 37th International Conference on Machine Learning.

33.Mo, F., Haddadi, H., Katiyar, K., Ansari, R., & Chuah, C. N. (2021). PPFL: Privacy-preserving federated learning with trusted execution environments. Proceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services, 94–108.

Downloads

Published

2026-04-04

How to Cite

Elias Vance, Alan Davenport, & Douglas Redmond. (2026). A Decentralized Cloud-Edge Infrastructure for Social Commerce: Accelerating Privacy-Preserving LLM Inference via Trusted Execution Environments. International Journal of Artificial Intelligence Research, 1(1). Retrieved from https://www.isipress.org/index.php/IJAIR/article/view/109