AI-POWERED DATA MASKING FOR PRIVACYPRESERVING CLOUD DATA SHARING

Authors

  • Narayana Gaddam Department of Technology and Innovation, City National Bank, USA Author

DOI:

https://doi.org/10.5281/zenodo.15268466

Keywords:

Edge computing, cloud computing, Internet of Things, IoT systems, distributed computing, resource utilization

Abstract

Cloud computing has become increasingly dependent on using cloud environments for storing and processing of sensitive data and thus ensuring data privacy in cloud environments is very important. In this research, we introduce an AI powered data masking framework that covers all levels of precision in order to improve the privacy preserving data sharing in the cloud environment. The proposed methodology use advanced machine learning algorithms e.g Generative Adversarial Networks, GANs to generate synthetic data that resembles the original datasets ensuring secure data exchange without disclosing sensitive data in the datasets. Moreover, data leakage is prevented by integrating differential privacy techniques to provide mathematical guarantees of data leakage even in the presence of malicious entities trying to reverse engineer masked data. The framework adopts federated learning models to do decentralized model training, in which the risk of exposure to direct data is reduced. We evaluate it and show good data utility and acceptable performance overheads lending itself to scalable cloud architectures. Adoption of light weight encryption algorithm to operate efficiently in resource constrained environments including the IoT devices. Additionally, the solution also focuses on employing secure multi party computation (SMPC) to keep the data encrypted through the entire computation process. The experimental results demonstrate the reduction of risks due to the data exposure, in comparison to the traditional anonymization techniques, while still providing utility for analytics tasks. In this regard, this research helps address the growing need for privacy preserving AI solutions, which is consonant with the latest legislations including GDPR and HIPAA.

References

Majeed, Abdul, and Seong Oun Hwang. "When AI meets information privacy: The adversarial role of AI in data sharing scenario." IEEE Access 11 (2023): 76177-76195.

Tyagi, Amit Kumar, ed. Privacy preservation and secured data storage in cloud computing. IGI Global, 2023.

A. K. Singh and R. Gupta, "A Privacy-Preserving Model Based on Differential Approach for Sensitive Data in Cloud Environment," arXiv preprint arXiv:2212.12534, Dec. 2022. [Online]. Available: https://arxiv.org/abs/2212.12534

H. Hashemi, Y. Wang, and M. Annavaram, "DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware," arXiv preprint arXiv:2207.00083, Jun. 2022. [Online]. Available:https://arxiv.org/abs/2207.00083

Khalid, Nazish, Adnan Qayyum, Muhammad Bilal, Ala Al-Fuqaha, and Junaid Qadir. "Privacy-preserving artificial intelligence in healthcare: Techniques and applications." Computers in Biology and Medicine 158 (2023): 106848.

R. Gupta and A. K. Singh, "A Differential Approach for Data and Classification Service based Privacy-Preserving Machine Learning Model in Cloud Environment," arXiv preprint arXiv:2212.10177, Dec. 2022. [Online]. Available:https://arxiv.org/abs/2212.10177

B. Novković, A. Božić, M. Golub, and S. Groš, "Confidential Computing," in 202144th International Convention on Information, Communication and Electronic

Technology (MIPRO), Sep. 2021. [Online]. Available:https://en.wikipedia.org/wiki/Confidential_computing

Wu, Yulei. "Cloud-edge orchestration for the Internet of Things: Architecture and AIpowered data processing." IEEE Internet of Things Journal 8, no. 16 (2020): 12792-12805.

Duan, Sijing, Dan Wang, Ju Ren, Feng Lyu, Ye Zhang, Huaqing Wu, and Xuemin Shen. "Distributed artificial intelligence empowered by end-edge-cloud computing: A survey." IEEE Communications Surveys & Tutorials 25, no. 1 (2022): 591-624.

Meurisch, Christian, and Max Mühlhäuser. "Data protection in AI services: A survey."ACM Computing Surveys (CSUR) 54, no. 2 (2021): 1-38.

Downloads

Published

2024-08-30