Securing Ai Systems: a Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity

dc.contributor.author Garcia, Jose Luis Cano
dc.contributor.author Udechukwu, Izuchukwu Patrick
dc.contributor.author Ibrahim, Isiaq Bolaji
dc.contributor.author Chukwu, Ikechukwu John
dc.contributor.author Dag, Hasan
dc.contributor.author Dimitrova, Vesna
dc.contributor.author Mollakuqe, Elissa
dc.date.accessioned 2024-10-15T19:38:59Z
dc.date.available 2024-10-15T19:38:59Z
dc.date.issued 2024
dc.description MOLLAKUQE, Elissa/0000-0003-0508-105X en_US
dc.description.abstract The rapid evolution of artificial intelligence (AI) has introduced transformative changes across industries, accompanied by escalating security concerns. This paper contributes to the imperative need for robust security measures in AI systems based on the application of cryptographic techniques. This research analyzes AI-ML systems vulnerabilities and associated risks and identifies existing cryptographic methods that could constitute security measures to mitigate such risks. Information assets subject to cyberattacks are identified, such as training data and model parameters, followed by a description of existing encryption algorithms and a suggested approach to use a suitable technique, such as homomorphic encryption CKKS, along with digital signatures based on ECDSA to protect the digital assets through all the AI system life cycle. These methods aim to safeguard sensitive data, algorithms, and AI-generated content from unauthorized access and tampering. The outcome offers potential and practical solutions against privacy breaches, adversarial attacks, and misuse of AI-generated content. Ultimately, this work aspires to bolster public trust in AI technologies, fostering innovation in a secure and reliable AI-driven landscape. en_US
dc.identifier.citationcount 0
dc.identifier.doi 10.1109/MECO62516.2024.10577883
dc.identifier.isbn 9798350387568
dc.identifier.isbn 9798350387575
dc.identifier.issn 2377-5475
dc.identifier.scopus 2-s2.0-85199511185
dc.identifier.uri https://doi.org/10.1109/MECO62516.2024.10577883
dc.identifier.uri https://hdl.handle.net/20.500.12469/6301
dc.language.iso en en_US
dc.publisher Ieee en_US
dc.relation.ispartof 13th Mediterranean Conference on Embedded Computing (MECO) -- JUN 11-14, 2024 -- Budva, MONTENEGRO en_US
dc.relation.ispartofseries Mediterranean Conference on Embedded Computing
dc.rights info:eu-repo/semantics/closedAccess en_US
dc.subject Artificial Intelligence en_US
dc.subject Cryptography en_US
dc.subject Security en_US
dc.subject Neural Networks en_US
dc.title Securing Ai Systems: a Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity en_US
dc.type Conference Object en_US
dspace.entity.type Publication
gdc.author.id MOLLAKUQE, Elissa/0000-0003-0508-105X
gdc.author.institutional Dağ, Hasan
gdc.author.scopusid 59232916800
gdc.author.scopusid 59232916900
gdc.author.scopusid 59233422300
gdc.author.scopusid 59233764600
gdc.author.scopusid 6507328166
gdc.author.scopusid 37010805100
gdc.author.scopusid 37010805100
gdc.author.wosid MOLLAKUQE, ELISSA/HKO-9388-2023
gdc.bip.impulseclass C5
gdc.bip.influenceclass C5
gdc.bip.popularityclass C5
gdc.coar.access metadata only access
gdc.coar.type text::conference output
gdc.description.department Kadir Has University en_US
gdc.description.departmenttemp [Garcia, Jose Luis Cano; Udechukwu, Izuchukwu Patrick; Ibrahim, Isiaq Bolaji; Chukwu, Ikechukwu John; Dag, Hasan; Mollakuqe, Elissa] Kadir Has Univ, Istanbul, Turkiye; [Dimitrova, Vesna] Cyril & Methodius Univ, Skopje, North Macedonia en_US
gdc.description.endpage 257 en_US
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı en_US
gdc.description.startpage 250 en_US
gdc.description.woscitationindex Conference Proceedings Citation Index - Science
gdc.identifier.openalex W4400277247
gdc.identifier.wos WOS:001268606200069
gdc.oaire.diamondjournal false
gdc.oaire.impulse 0.0
gdc.oaire.influence 2.5942106E-9
gdc.oaire.isgreen false
gdc.oaire.popularity 2.9478422E-9
gdc.oaire.publicfunded false
gdc.openalex.fwci 0.0
gdc.openalex.normalizedpercentile 0.0
gdc.opencitations.count 0
gdc.plumx.mendeley 11
gdc.plumx.scopuscites 1
gdc.scopus.citedcount 1
gdc.wos.citedcount 0
relation.isAuthorOfPublication e02bc683-b72e-4da4-a5db-ddebeb21e8e7
relation.isAuthorOfPublication.latestForDiscovery e02bc683-b72e-4da4-a5db-ddebeb21e8e7
relation.isOrgUnitOfPublication ff62e329-217b-4857-88f0-1dae00646b8c
relation.isOrgUnitOfPublication acb86067-a99a-4664-b6e9-16ad10183800
relation.isOrgUnitOfPublication b20623fc-1264-4244-9847-a4729ca7508c
relation.isOrgUnitOfPublication.latestForDiscovery ff62e329-217b-4857-88f0-1dae00646b8c

Files