2022
DOI: 10.3390/sym14020273
|View full text |Cite
|
Sign up to set email alerts
|

Toward Data Integrity Architecture for Cloud-Based AI Systems

Abstract: AI has been implemented in many sectors such as security, health, finance, national defense, etc. However, together with AI’s groundbreaking improvement, some people exploit AI to do harmful things. In parallel, there is rapid development in cloud computing technology, introducing a cloud-based AI system. Unfortunately, the vulnerabilities in cloud computing will also affect the security of AI services. We observe that compromising the training data integrity means compromising the results in the AI system its… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 32 publications
0
13
0
1
Order By: Relevance
“…• Unlike [3], [27], [29]- [34], We introduce the error localization method of public auditing at the block index level and also introduce the encrypted data recovery method by modular technique at the DO side.…”
Section: B Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…• Unlike [3], [27], [29]- [34], We introduce the error localization method of public auditing at the block index level and also introduce the encrypted data recovery method by modular technique at the DO side.…”
Section: B Contributionmentioning
confidence: 99%
“…Research papers [3], [32], [33] require two pairing operations, and another paper [34] requires j pairing operations.…”
Section: Research Scenariomentioning
confidence: 99%
See 1 more Smart Citation
“…Cryptographic algorithms are: i) symmetric encryption: used to hide the contents of streams or blocks of data of whatever size, including messages, encryption keys, files, and passwords; ii) asymmetric encryption: used to hide small data blocks, such as hash function values and encryption keys, used in the digital signatures [28]; iii) data integrity algorithms: used to protect the blocks of data, like messages, from alteration [28], [29] and iv) authentication protocols: these schemes depend on cryptographic algorithms to authenticate the entities' identity [28].…”
Section: Cryptography Algorithmsmentioning
confidence: 99%
“…In the NFV paradigm, traditional middleboxes are managed as single modules of software programmed to perform the role of a particular VNF [20]. This transformation helps to adapt and capitalize on specific goals such as speed and efficiency enhancement.…”
Section: Related Workmentioning
confidence: 99%