ARTIFICIAL INTELLIGENCE AND BLOCKCHAIN TECHNOLOGY FOR SECURE DATA AND PRIVACY
DOI:
https://doi.org/10.53555/nncse.v9i7.1844Keywords:
Artificial, Intelligence, Blockchain, Technology, Data Security, SecNet, Privacy.Abstract
Data, which is then processed in order to extract the desirable characteristics, serves as the input for a number of different AI algorithms. However, the facts that can be found on the internet are incredible and tough to authenticate. Given the complexity of the internet, it is quite challenging to validate the data for the consumers. Consequently, in this research, we suggested using SecNet as a solution. An architecture that assists in the protection of data storage, the processing of data, and the sharing of large-scale Internet settings is known as SecNet. The primary objective of this architecture is to enhance the performance of artificial intelligence algorithms across a variety of data sources in order to provide a cyberspace that is more safe and to make use of actual big data. This architecture combines and supplies the following three primary components: 1) The trading of data based on a blockchain is carried out with the ownership of the data being assured. This enables the interchange of accurate data in a wide-ranging environment and contributes to the formation of actual "big data. 2) The protection of an AI-based secure computing platform that is powered by artificial intelligence to develop more astute security standards and contribute to the establishment of a cyberspace that is more reliable. 3) The trustworthy value-sharing Security Service buy Mechanism gives participants a fantastic opportunity to gain Economic Rewards for the provision of data or services, which makes data sharing easier and ultimately leads to improved AI performance".
References
. J. Yang, S. He, Y. Xu, L. Chen, J. Ren, "A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks," Sensors, vol. 19 no. 4,DOI: 10.3390/s19040970, 2019.
. J. Chen, S. Micali, "Algorand: a secure and efficient distributed ledger," Theoretical Computer Science, vol. 777, pp. 155-183, DOI: 10.1016/j.tcs.2019.02.001, 2019.
. L. Demetrio, A. Valenza, G. Costa, G. Lagorio, "Waf-a-mole: evading web application firewalls through adversarial machine learning," Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp. 1745-1752, .
. Dr. Abdul Hannan Abdul Mannan Shaikh, “Blockchain Technology for Beginners”, 1 Nov 2022, Book Nation Press, Ltd. Channai, Tamilnadu, India.
. M. Lecuyer, R. Spahn, R. Geambasu, T.-K. Huang and S. Sen, (2018) "Enhancing selectivity in big data", IEEE Security Privacy, vol. 16, no. 1, pp. 34-42,.
. A. de Montjoye, E. Shmueli, S. S. Wang and A. S. Pentland,(2014.) "openPDS: Protecting the privacy of metadata through SafeAnswers", PLoS ONE, vol. 9, no. 7,
. H. Yin, D. Guo, K. Wang, Z. Jiang, Y. Lyu and J. Xing,( 2018) "Hyperconnected network: A decentralized trusted computing and networking paradigm", IEEE Netw., vol. 32, pp. 112-117.
. K. Fan, W. Jiang, H. Li and Y. Yang, (2018) "Lightweight RFID protocol for medical privacy protection in IoT", IEEE Trans Ind. Informat., vol. 14, no. 4, pp. 1656-1665.
. Zheng Z, Dai H, Wu J.(2019) Blockchain Intelligence: When Blockchain Meets Artificial Intelligence 2020. arXiv preprint arXiv:1912.06485.
. Bertino E, Kundu A, Sura Z.(2020) Data Transparency with Blockchain and AI Ethics. Data and Information Quality; 2019. https://doi.org/10.1145/3312750
. ElGayyar M, ElYamany H, Grolinger K, Capretz M, Mir S.(2021) Blockchain-Based Federated Identity and Auditing. International Journal of Blockchains and Cryptocurrencies. 2020.p. 179-205.
. T. Chajed, J. Gjengset, J. Van Den Hooff, M. F. Kaashoek, J. Mickens, R. Morris, et al., (2015) "Amber: Decoupling user data from Web applications", Proc. 15th Workshop Hot Topics Oper. Syst. (HotOS XV), pp. 1-6.
. J.-H. Lee(2017)"BIDaaS: Blockchain based ID as a service", IEEE Access, vol. 6, pp. 2274-2278,.
. Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du and M. Guizani, "MeDShare: Trust-less medical data sharing among cloud service providers via blockchain", IEEE Access, vol. 5, pp. 14757-14767, 2017.
. J. Wang, M. Li, Y. He, H. Li, K. Xiao and C. Wang, (2018) "A blockchain based privacy-preserving incentive mechanism in crowdsensing applications", IEEE Access, vol. 6, pp. 17545-17556,.
. C. Sun, A. Shrivastava, S. Singh and A. Gupta, (2017)"Revisiting unreasonable effectiveness of data in deep learning era", Proc. IEEE Int. Conf. Comput. Vis. (ICCV), pp. 843-852,.
. Meng, E. W. Tischhauser, Q. Wang, Y. Wang and J. Han,( 2018) "When intrusion detection meets blockchain technology: A review", IEEE Access, vol. 6, pp. 10179-10188,.
. Conti, M., Sandeep Kumar, E., Lal, C., and Ruj, S. (2018). A Survey on Security and Privacy Issues of Bitcoin. IEEE Commun. Surv. Tutorials 20 (4), 3416–3452. doi:10.1109/comst.2018.2842460.
. Azzaoui, A. E., Singh, S. K., Pan, Y., and Park, J. H. (2020). Block5GIntell: Blockchain for AI-Enabled 5G Networks. IEEE Access 8, 145918–145935. doi:10.1109/ACCESS.2020.3014356
. A. B. Kurtulmus and K. Daniel, (2018), "Trustless machine learning contracts; evaluating and exchanging machine learning models on the ethereum blockchain" in arXiv:1802.10185, [online] Available: https://arxiv.org/abs/1802.10185.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Journal of Advance Research in Computer Science & Engineering (ISSN: 2456-3552)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Terms & Condition
Submission -
Author can submit the manuscript through our online submission process or email us at the designated email id in contact details.
The other mode of submission not accepted than online and email.
Before submission please read the submission guidelines.
NN Publication accepts only article submitted in pdf/doc/docx/rtf file format. Another format except given file formats will no be considered .
Author will be responsible for the error mistakes in the submission files. The minor changes can be done without any cost after publication. But for major changes NN Publication may charges you the editing charges.
Publication (Online) -
The online publication is scheduled on last date of every month, but it can be delayed by 24 to 48 hours due to editorial process if huge number of articles comes to publish in single issue.
Automatic notificatation email will be sent to the all users on publication of an issue, so its author’s duty to check their email inbox or SPAM folder to get this notification.
After publication of article author can not withdraw their article.
If editor’s found any issue after publication of article then the NN Publication have the authority to remove the article from online website.
No refund will be provided after online publication of article.
Publication (Print) -
The print copy publication are sent as per the author’s request after 2 weeks of online publication of that issue.
NN Publication will ship the article by India Post and provide the consignment number on dispatch of print copy.
NN Publication follows all the guidelines of delivery provided by IndiaPost and hence not responsible for delay in delivery due to any kind of reasons.
Refund of hard copy will not be provided after dispatch or print of the journal.
NN Publication will be responsible for raise a complain if there is any issue occurs in delivery, but still will not be responsible for providing the refund.
NN Publication will be responsible to resend the print copy only and only if the print copy is lost or print copy is damaged in delivery / or there is delay more than 6 months.
According to India Post the delivery should be completed with in 1-3 weeks after dispatch of articles.
Privacy Policy-
NN Publicationl uses the email ids of authors and editors and readers for sending editorial or publication notification only, we do not reveal or sell the email ids to any other website or company.