ARTIFICIAL INTELLIGENCE AND BLOCKCHAIN TECHNOLOGY FOR SECURE DATA AND PRIVACY

Authors

  • Shaikh Abdul Hannan Assistant Professor, Department of Computer Science and Information Technology, AlBaha University, AlBaha, Kingdom of Saudi Arabia.

DOI:

https://doi.org/10.53555/nncse.v9i7.1844

Keywords:

Artificial, Intelligence, Blockchain, Technology, Data Security, SecNet, Privacy.

Abstract

Data, which is then processed in order to extract the desirable characteristics, serves as the input for a number of different AI algorithms. However, the facts that can be found on the internet are incredible and tough to authenticate. Given the complexity of the internet, it is quite challenging to validate the data for the consumers. Consequently, in this research, we suggested using SecNet as a solution. An architecture that assists in the protection of data storage, the processing of data, and the sharing of large-scale Internet settings is known as SecNet. The primary objective of this architecture is to enhance the performance of artificial intelligence algorithms across a variety of data sources in order to provide a cyberspace that is more safe and to make use of actual big data. This architecture combines and supplies the following three primary components: 1) The trading of data based on a blockchain is carried out with the ownership of the data being assured. This enables the interchange of accurate data in a wide-ranging environment and contributes to the formation of actual "big data. 2) The protection of an AI-based secure computing platform that is powered by artificial intelligence to develop more astute security standards and contribute to the establishment of a cyberspace that is more reliable. 3) The trustworthy value-sharing Security Service buy Mechanism gives participants a fantastic opportunity to gain Economic Rewards for the provision of data or services, which makes data sharing easier and ultimately leads to improved AI performance".

References

. J. Yang, S. He, Y. Xu, L. Chen, J. Ren, "A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks," Sensors, vol. 19 no. 4,DOI: 10.3390/s19040970, 2019.

. J. Chen, S. Micali, "Algorand: a secure and efficient distributed ledger," Theoretical Computer Science, vol. 777, pp. 155-183, DOI: 10.1016/j.tcs.2019.02.001, 2019.

. L. Demetrio, A. Valenza, G. Costa, G. Lagorio, "Waf-a-mole: evading web application firewalls through adversarial machine learning," Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp. 1745-1752, .

. Dr. Abdul Hannan Abdul Mannan Shaikh, “Blockchain Technology for Beginners”, 1 Nov 2022, Book Nation Press, Ltd. Channai, Tamilnadu, India.

. M. Lecuyer, R. Spahn, R. Geambasu, T.-K. Huang and S. Sen, (2018) "Enhancing selectivity in big data", IEEE Security Privacy, vol. 16, no. 1, pp. 34-42,.

. A. de Montjoye, E. Shmueli, S. S. Wang and A. S. Pentland,(2014.) "openPDS: Protecting the privacy of metadata through SafeAnswers", PLoS ONE, vol. 9, no. 7,

. H. Yin, D. Guo, K. Wang, Z. Jiang, Y. Lyu and J. Xing,( 2018) "Hyperconnected network: A decentralized trusted computing and networking paradigm", IEEE Netw., vol. 32, pp. 112-117.

. K. Fan, W. Jiang, H. Li and Y. Yang, (2018) "Lightweight RFID protocol for medical privacy protection in IoT", IEEE Trans Ind. Informat., vol. 14, no. 4, pp. 1656-1665.

. Zheng Z, Dai H, Wu J.(2019) Blockchain Intelligence: When Blockchain Meets Artificial Intelligence 2020. arXiv preprint arXiv:1912.06485.

. Bertino E, Kundu A, Sura Z.(2020) Data Transparency with Blockchain and AI Ethics. Data and Information Quality; 2019. https://doi.org/10.1145/3312750

. ElGayyar M, ElYamany H, Grolinger K, Capretz M, Mir S.(2021) Blockchain-Based Federated Identity and Auditing. International Journal of Blockchains and Cryptocurrencies. 2020.p. 179-205.

. T. Chajed, J. Gjengset, J. Van Den Hooff, M. F. Kaashoek, J. Mickens, R. Morris, et al., (2015) "Amber: Decoupling user data from Web applications", Proc. 15th Workshop Hot Topics Oper. Syst. (HotOS XV), pp. 1-6.

. J.-H. Lee(2017)"BIDaaS: Blockchain based ID as a service", IEEE Access, vol. 6, pp. 2274-2278,.

. Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du and M. Guizani, "MeDShare: Trust-less medical data sharing among cloud service providers via blockchain", IEEE Access, vol. 5, pp. 14757-14767, 2017.

. J. Wang, M. Li, Y. He, H. Li, K. Xiao and C. Wang, (2018) "A blockchain based privacy-preserving incentive mechanism in crowdsensing applications", IEEE Access, vol. 6, pp. 17545-17556,.

. C. Sun, A. Shrivastava, S. Singh and A. Gupta, (2017)"Revisiting unreasonable effectiveness of data in deep learning era", Proc. IEEE Int. Conf. Comput. Vis. (ICCV), pp. 843-852,.

. Meng, E. W. Tischhauser, Q. Wang, Y. Wang and J. Han,( 2018) "When intrusion detection meets blockchain technology: A review", IEEE Access, vol. 6, pp. 10179-10188,.

. Conti, M., Sandeep Kumar, E., Lal, C., and Ruj, S. (2018). A Survey on Security and Privacy Issues of Bitcoin. IEEE Commun. Surv. Tutorials 20 (4), 3416–3452. doi:10.1109/comst.2018.2842460.

. Azzaoui, A. E., Singh, S. K., Pan, Y., and Park, J. H. (2020). Block5GIntell: Blockchain for AI-Enabled 5G Networks. IEEE Access 8, 145918–145935. doi:10.1109/ACCESS.2020.3014356

. A. B. Kurtulmus and K. Daniel, (2018), "Trustless machine learning contracts; evaluating and exchanging machine learning models on the ethereum blockchain" in arXiv:1802.10185, [online] Available: https://arxiv.org/abs/1802.10185.

Downloads

Published

2023-09-09

How to Cite

Abdul Hannan, S. . (2023). ARTIFICIAL INTELLIGENCE AND BLOCKCHAIN TECHNOLOGY FOR SECURE DATA AND PRIVACY. Journal of Advance Research in Computer Science & Engineering (ISSN 2456-3552), 9(7), 1-8. https://doi.org/10.53555/nncse.v9i7.1844