A_Robust_Data_Security_Model_Development_to_Maintain_the_Integrity_of_Information_Using_Artificial_Intelligence_and_Cyber_Laws
A_Robust_Data_Security_Model_Development_to_Maintain_the_Integrity_of_Information_Using_Artificial_Intelligence_and_Cyber_Laws
Abstract—The field of artificial intelligence (AI) has seen the capabilities of artificial intelligence (AI) both today as
significant advancements in recent years. These days, artificial well as in the near future [2, 3].
intelligence (AI) tools are being utilized by organizations in
both the public and commercial sectors all over the world. On the other hand, these very same technical
2024 International Conference on Intelligent Systems for Cybersecurity (ISCS) | 979-8-3503-7523-7/24/$31.00 ©2024 IEEE | DOI: 10.1109/ISCS61804.2024.10581024
Individuals, organizations, and society as a whole will reap advancements bring up significant concerns, such as those
broad and significant advantages as a result of the capabilities
regarding the conflict that exists between artificial
of artificial intelligence (AI) both today and in the near future.
Nevertheless, these very same technical advancements give rise intelligence and data protection legislation [4]. Furthermore,
to significant concerns, such as the question of how to ensure in light of the technical realities of the 21st century, we are
that artificial intelligence technology is built and implemented in a position to review the efficacy of the data protection
in a manner that is in accordance with the applicable data rules that are now in place, which are both an opportunity as
privacy laws and standards. The fast development of artificial well as an obligation. We require data protection rules and
intelligence presents substantial hurdles in terms of protecting policies that not only successfully protect privacy in an era
customers' privacy and the confidentiality of their data. The of artificial intelligence and the vast data on which it
purpose of this essay is to suggest an all-encompassing strategy frequently depends, but also do not impose additional
for the development of a framework to solve these concerns.
hurdles for the development of these breakthrough
First, an overview of prior research on security and privacy in
artificial intelligence is presented, with an emphasis on both technologies in the future. We cannot make a decision
the progress that has been made and the limits that still among the already routine advantages of artificial
remain. In the same vein, open research topics and gaps that intelligence and the safety of personal data; rather, we must
need to be addressed in order to improve existing frameworks develop practical solutions to ensure both [5]. This is
are recognized. Regarding the development of the framework, something that has been emphasized in multiple reports by
the topic of data protection in artificial intelligence is the government and regulators. There has been a significant
discussed. This includes elaborating on the significance of increase in the analytical capacity of modern computers,
protecting the data that is utilized in artificial intelligence which is posing an increasing challenge to the laws and
models, as well as elaborating on the policies and practices that
conventions that govern data protection [6]. The term
are in place to ensure the data's safety and the methods that
are utilized to maintain the data's integrity. Additionally, the "artificial intelligence" is frequently used to refer to these
security of artificial intelligence is investigated, which includes advancements. This word is used to define the overarching
an analysis of the vulnerabilities and dangers that are present objective of enabling "computer systems to perform tasks
in artificial intelligence systems, as well as the presentation of which normally require human intelligence, including visual
instances of potential assaults and malevolent manipulations, perception, speech recognition, decision-making, and
as well as security frameworks that are designed to prevent translation among languages."1. This one term incorporates
these risks. The model that has been suggested is known as the a vast range of technical advancements, each of which may
Artificial Intelligence based Secured Data Handler (AISDH), provide a unique set of difficulties to the data protection
and in order to test the effectiveness of the proposed scheme, it
regulations that are already in place [7].
is cross-validated with the traditional Blowfish Algorithm
(BA).
This is owing to advancements in processing power
Index Terms—Data Security, Data Integrity, Artificial as well as the massive amounts of digital data that are
Intelligence, AI, Cyber Laws, Secured Data Handler, AISDH, available for study [8]. The foundation of other tools, a few
BA, Blowfish Algorithm of which are described below, is machine learning, which is
widely used today to perform a wide variety of tasks. These
I. INTRODUCTION tasks include the detection of fraud, the filtering of email,
the detection of cyber-threats including network intruders or
In the past few years, there has been a rapid malicious insiders, the recommendation of books or films,
development in artificial intelligence (AI) [1]. These days, and the provision of other services based on previous or
artificial intelligence (AI) tools are being utilized by unusual behavior. Deep learning frequently makes use of
organizations in both the public and private sectors all over larger data sets in order to generate larger models and train
the world. Individuals, organizations, and society as a whole those models in the most effective manner [9].
will reap widespread and significant benefits as a result of
Authorized licensed use limited to: Pontificia Universidad Catolica Del Peru. Downloaded on November 10,2024 at 16:29:26 UTC from IEEE Xplore. Restrictions apply.
II. RELATED STUDY computing over building their own IT infrastructure due to
the significantly reduced cost of the services offered.
With the rise of new technologies like distributed Computing and data storage are outsourced to third-party
computing, utility computing, and grid computing, the cloud companies under the cloud computing model. Apps and
computing movement is picking up speed [11]. One of the customer data are not entirely under the control of the
most important trends in modern computing, cloud customer. Customers' principal concern when contemplating
computing has the ability to give accessible, elastic, and cloud services is the security of their data, which carries
powerful resources over the internet at a reasonable price. with it the additional burden of security concerns. This study
Virtual computers access data through a network resource delves into different cloud computing service deployment
and the cloud provides the ability to store and access data patterns and the Internet of Things (IoT), identifies the data
remotely. In addition, the fourth industrial revolution is security challenges that come along with each, and proposes
spearheaded by cloud computing. When using Dropbox, a metric-based approach to evaluate the security of cloud
other Google services, or Microsoft Office 365, everyone is services [13].
always interacting with the cloud. Although there are
numerous benefits to such an environment, there are also A critical issue for the network community is
security concerns, including data availability, privacy, and managing the massive IoT infrastructure [14]. Many believe
security; access control; cyber-attacks; and performance and that Software Defined Networking (SDN) is the best way to
reliability challenges. Providers of cloud services have an oversee the Internet of Things (IoT) because of its
obligation to their customers to take reasonable precautions centralized network management features. In order to
to protect their data in a way that is both private and localize cloud demands, edge computing provides cloud
accessible at all times. However, consumers have not been resources close to the IoT. Thus, a framework that combines
well served by cloud service providers in terms of SDN, the Internet of Things (IoT), and edge computing may
dependable and secure services. Cloud computing is being be built to establish a powerful SDIoT-Edge architecture.
enhanced by a technology called blockchain. In order to This architecture can effectively orchestrate cloud services
address security issues, this groundbreaking technique and make flexible use of IoT devices with constrained
provides data integrity features that are convincing. The resources. In addition to the widespread use of IoT,
difficulties associated with cloud privacy and security is attackers can exploit the OpenFlow channel through
examined in depth in this study. In this case study, we focus Distributed Denial of Service (DDoS) attacks due to the
on smart campus security to highlight the significance of vulnerabilities in this less secure architecture. A major
security challenges; hopefully, this will inspire future challenge with SDIoT-Edge is providing security for the
studies to investigate cloud computing security [11]. OpenFlow channel, since DDoS attacks on this channel
might impair the entire network. In order to address the
Everyone can benefit from enhanced physical security issues with this design, we offer a framework that
health by getting enough quality sleep [12]. In order to we term SDIoT-Edge Security (SIESec). For effective
maintain a healthy body and mind, it is essential to evaluate defence against DDoS attacks, the SIESec prototype uses a
the sleep cycle, since irregular sleep patterns may be a sign categorization technique based on machine learning,
of the illness leading to persistent sadness. The provision of integrates blacklists, and filters contextual network flows.
high-quality health care facilities through the use of cost- Using the Mininet network simulator and the Floodlight
effective instruments and technology has been one of many controller, we run comprehensive simulations. Our findings
issues investigated in the context of globalization, alongside demonstrate that SIESec offers robust protection against
the expansion of facilities. Creating a reliable and affordable distributed denial of service (DDoS) attacks over OpenFlow
system to track patients' sleep quality is one of the stated channels while imposing minimal network burden [14].
goals of IoT technology development. There are a number
of alternative systems that provide this function, but they are Physical characteristics of wounds, such as their
prohibitively expensive and complex to set up. An width, form, color, etc., have been the primary focus of
innovative approach to track and analyze sleep patterns clinical wound assessment studies [15]. However, the most
based on environmental factors is proposed as a solution to important component influencing the healing process is the
this problem in this study. The suggested method is robust wound's appearance. But there are other aspects outside the
enough to accurately track patients' sleep using COS sensors wound's appearance that play a role in the healing process.
and make predictions based on the data provided by the An example of a factor that might have an effect on healing
random forest model. The study's findings demonstrate that is the wound's internal and exterior environment. The
the recommended method has a 95% success rate. Through widespread use of the Internet of Things (IoT) in nearly
the validation of manual results, which yield the lowest error every industry and household over the past decade has
rate, this method is tested using the patient's sleep data. The contributed significantly to its meteoric rise in popularity.
use of the Internet of Things (IoT) to create a smart system Thus, in this study, we present an Internet of Things (IoT)
to monitor sleep quality on a variable number of people at a based intelligent wound assessment system that uses
low cost is highlighted in this work [12]. decision tree entropy and information gain statistics to
classify assessment results as good, satisfactory, or
The term "cloud computing" refers to an emerging alarming, reflecting the status of the wound assessment.
paradigm in the IT industry that uses the Internet to provide Using MATLAB, we built a decision tree and used the ID3
computer resources to users on demand [13]. Small and algorithm to choose the optimum feature to split the tree
medium-sized enterprises (SMEs) often choose cloud based on entropy and information gain. Decision tree
Authorized licensed use limited to: Pontificia Universidad Catolica Del Peru. Downloaded on November 10,2024 at 16:29:26 UTC from IEEE Xplore. Restrictions apply.
performance and training accuracy were both enhanced by
an effective feature split [15].
III. METHODOLOGY
Authorized licensed use limited to: Pontificia Universidad Catolica Del Peru. Downloaded on November 10,2024 at 16:29:26 UTC from IEEE Xplore. Restrictions apply.
our horizons, develop our skills, and find better ways to
organize what we already know. This calls for computer
learning. From the most fundamental kind of learning-
parametric learning, or understanding the meaning of such
quantities to the most advanced forms of abstract teaching
concept, grammar, usability, and behavioral learning, there
is a vast spectrum of difficulties.
Authorized licensed use limited to: Pontificia Universidad Catolica Del Peru. Downloaded on November 10,2024 at 16:29:26 UTC from IEEE Xplore. Restrictions apply.
data, facial recognition technology may be utilized as a
login credential for any system. System administrators can
determine who should have access to sensitive information
by implementing biometric authentication, which compares
a user's face to a database of previously stored images.
Using facial recognition technologies, it is possible to detect
and track people who are unauthorized accessing data or
systems.
Authorized licensed use limited to: Pontificia Universidad Catolica Del Peru. Downloaded on November 10,2024 at 16:29:26 UTC from IEEE Xplore. Restrictions apply.
Figure 6 shows the data integrity ratio of the
AISDH model, which is cross-validated with the traditional
BA to assess the data integrity ratio of the plan. What
follows is a descriptive table of the same information, Table
4.
TABLE-4: DATA INTEGRITY ANALYSIS
Fig. 6 shows the data security ratio of the AISDH 4000 89.37 95.59
model, which is cross-validated with the standard BA to 4500 89.24 95.58
measure the degree to which the proposed system improves
data security. Table 3 provides a descriptive representation 5000 89.11 95.59
of the same. 5500 88.97 95.60
Authorized licensed use limited to: Pontificia Universidad Catolica Del Peru. Downloaded on November 10,2024 at 16:29:26 UTC from IEEE Xplore. Restrictions apply.
utilize the ideas of machine learning in the context of data
security if we have a thorough grasp of them.
REFERENCES
[1] Wang Shaohui, Pan Xiaoxiao, Wang Zhiwei, Xiao Fu and Wang
Ruchuan, "Identity-based cloud storage data integrity verification scheme
supporting forward security [J]", Journal of Nanjing University of Posts
and Telecommunications (Natural Science Edition), vol. 39, no. 01, pp. 79-
86, 2019.
[2] V. M et al, "Deep Reinforcement Learning for Energy Efficient Routing
and Throughput Maximization in Various Networks," (I-SMAC), Dharan,
Nepal, 2022, pp. 204-210, doi: 10.1109/I-SMAC55078.2022.9987395.
[3] Huang Xuerong and Guo Rongzuo, "Data integrity audit protocol based
on identity proxy off-line signature [J]", COMPUTER ENGINEERING
AND DESIGN, vol. 41, no. 06, pp. 1553-1561, 2020.
[4] T. M. et al, “Effective control of non linear parameters using artificial
intelligence,” 2016 IEEE International Conference on Computational
Intelligence and Computing Research (ICCIC), Dec. 2016, Published, doi:
10.1109/iccic.2016.7919659.
[5] Wang Yanling, "Cloud data integrity verification algorithm for
accounting informationization in sharing mode [J]", Modern Electronics
Technique, vol. 42, no. 05, pp. 87-89, 2019.
[6] S. S. Abdul-Jabbar, A. Aldujaili, S. G. Mohammed and H. S. Saeed,
"Integrity and security in cloud computing environment: a review", Journal
of Southwest Jiaotong University, vol. 55, no. 1, 2020.
[7] R. Umamaheswari, D. Lakshmi, V. S. Pandi, B. Geetha, S. Sumithra
and R. P. Y, "An Advanced Deep Learning Approach for Primary
Osteoporosis Prediction Using Radiographs with Clinical Covariates," 2023
7th International Conference on Electronics, Communication and
Aerospace Technology (ICECA), Coimbatore, India, 2023, pp. 788-793, doi:
10.1109/ICECA58529.2023.10395285.
[8] Liu Xueyan, Lu Tingting and Yang Xiaotao, "Verifiable Attribute-
based Keyword Search Scheme with Privacy Preservation [J]", Journal of
Electronics & Infonnation Technology, vol. 43, no. 01, pp. 218-225, 2021.
[9] R. K. Sadavarte, G. D. Kurundkar and D. Parbhani, "Data security and
integrity in cloud computing: Threats and Solutions", 2020.
[10] B. Sarwar, I. S. Bajwa, N. Jamil, S. Ramzan and N. Sarwar, "An
intelligent fire warning application using IoT and an adaptive neurofuzzy
inference system", Sensors, vol. 19, no. 14, pp. 3150, 2019.
[11] J. J. J, B. V. Prabha, B. Yasotha, J. J, C. Senthilkumar and V. S. Pandi,
"Enhancing Residential Security with AI-Powered Intrusion Detection
Systems," 2023 International Conference on Sustainable Communication
Networks and Application (ICSCNA), Theni, India, 2023, pp. 1510-1515,
doi: 10.1109/ICSCNA58489.2023.10370042.
[12] K. Saleem, I. S. Bajwa, N. Sarwar, W. Anwar and A. Ashraf, "IoT
healthcare: design of smart and cost-effective sleep quality monitoring
system", Journal of Sensors, 2020.
[13] D. K. Saini, K. Kumar and P. Gupta, "Security Issues in IoT and CC
Service Models with Suggested Solutions", Security and Communication
Networks, vol. 2022, 2022.
[14] W. Rafique, M. Khan, N. Sarwar and W. Dou, "A security framework
to protect edge-supported software-defined Internet of Things
infrastructure", In International Conference on Collaborative Computing:
Networking Applications and Worksharing, pp. 71-88, 2019.
[15] H. Sattar, I. S. Bajwa, R. U. Amin, N. Sarwar, N. Jamil, M. A. Malik,
et al., "An IoT-based intelligent wound monitoring system", IEEE Access,
vol. 7, pp. 144500-144515, 2019.
Authorized licensed use limited to: Pontificia Universidad Catolica Del Peru. Downloaded on November 10,2024 at 16:29:26 UTC from IEEE Xplore. Restrictions apply.