Rahul Gupta, 2024. "Safeguarding Digital Privacy with AI-Driven Solutions" ESP International Journal of Advancements in Computational Technology (ESP-IJACT) Volume 2, Issue 1: 126-142.
Data protection has emerged as one of the most significant issues in the modern world due to the ever-increasing accumulation and use of personal information. The use and application of artificial intelligence include the following opportunities and threats that are associated with the subject. This article aims to discuss multiple approaches to AI-based solutions targeting the protection of individuals’ data and innovative implementations of the mentioned approaches. Explaining methods related to privacy-preserving of AI, like differential privacy that adds noise to the data to prevent identification of individuals or federated learning that enables joint model updating across devices, but without pooling data. Also, it is important to review modern encryption types, such as homomorphic encryption, that allow computational operations on encrypted information without their decryption. The paper also looks at the cardinal issue of how privacy can be preserved while making information as useful as possible. This section focuses on the ethical implications with a common understanding of their importance, which includes the aspects of openness, equal treatment, and responsibility. In addition, the article also discusses some of the existing regulations, such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), that offer guidance in data protection and privacy Shields. Thus, through the reasonable implementation of AI, it becomes possible to design effective protection of individuals’ rights to privacy alongside progress in technologies. This holistic approach ensures that personal data is safeguarded from breaches and other forms of misuse, hence enhancing security, especially in the contemporary world. This way, the study is going to try to dissect the directions of AI utilization to improve digital privacy while recognizing the opportunities and limits of these technologies.
[1] Gentry, C. (2009). Fully Homomorphic Encryption using Ideal Lattice. STOC.
[2] National Institute of Standards and Technology. (2020). NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management. NIST.
[3] National Institute of Standards and Technology. (2018). Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1). NIST.
[4] Hassan, M. U., Rehmani, M. H., & Chen, J. (2019). Differential privacy techniques for cyber-physical systems: A survey. IEEE Communications Surveys & Tutorials, 22(1), 746-789.
[5] National Institute of Standards and Technology. (2019). Risk Management Framework for Information Systems and Organizations. NIST Special Publication 800-37 Revision 2. NIST.
[6] Binhammad, M., Alqaydi, S., Othman, A., & Abuljadayel, L. H. (2024). The Role of AI in Cyber Security: Safeguarding Digital Identity. Journal of Information Security, 15(02), 245-278.
[7] Chamikara, M. A. P., Bertok, P., Khalil, I., Liu, D., & Camtepe, S. (2020). Privacy preserving face recognition utilizing differential privacy. Computers & Security, 97, 101951.
[8] Yao, X., Zhou, X., & Ma, J. (2016, April). Differential privacy of big data: an overview. In 2016, IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS) (pp. 7-12). IEEE.
[9] Keshk, M., Turnbull, B., Sitnikova, E., Vatsalan, D., & Moustafa, N. (2021). Privacy-preserving schemes for safeguarding heterogeneous data sources in cyber-physical systems. IEEE Access, 9, 55077-55097.
[10] Ha, T., Dang, T. K., Dang, T. T., Truong, T. A., & Nguyen, M. T. (2019, November). Differential privacy in deep learning: an overview. In 2019 International Conference on Advanced Computing and Applications (ACOMP) (pp. 97-102). IEEE.
[11] Silva, P., Gonçalves, C., Antunes, N., Curado, M., & Walek, B. (2022). Privacy risk assessment and privacy-preserving data monitoring. Expert Systems with Applications, 200, 116867.
[12] Torkzadehmahani, R., Nasirigerdeh, R., Blumenthal, D. B., Kacprowski, T., List, M., Matschinske, J. & Baumbach, J. (2022). Privacy-preserving artificial intelligence techniques in biomedicine. Methods of information in medicine, 61(S 01), e12-e27.
[13] Curzon, J., Kosa, T. A., Akalu, R., & El-Khatib, K. (2021). Privacy and artificial intelligence. IEEE Transactions on Artificial Intelligence, 2(2), 96-108.
[14] Li, Q., Wen, Z., Wu, Z., Hu, S., Wang, N., Li, Y., & He, B. (2021). A survey on federated learning systems: Vision, hype and reality for data privacy and protection. IEEE Transactions on Knowledge and Data Engineering, 35(4), 3347-3366.
[15] Archer, D., Chen, L., Cheon, J. H., Gilad-Bachrach, R., Hallman, R. A., Huang, Z., ... & Wang, S. (2017, July). Applications of homomorphic encryption. In Crypto Standardization Workshop, Microsoft Research (Vol. 14, pp. 1-14).
[16] AI and Privacy: Safeguarding Data in the Age of Artificial Intelligence, digitalocean, online. https://www.digitalocean.com/resources/articles/ai-and-privacy
[17] Dhinakaran, D., Sankar, S. M., Selvaraj, D., & Raja, S. E. (2024). Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration. arXiv preprint arXiv:2401.00794.
[18] de Almeida, P. G. R., dos Santos, C. D., & Farias, J. S. (2021). Artificial intelligence regulation: a framework for governance. Ethics and Information Technology, 23(3), 505-525.
[19] Damaraju, A. (2023). Safeguarding Information and Data Privacy in the Digital Age. International Journal of Advanced Engineering Technologies and Innovations, 1(01), 213-241.
[20] Pandya, Anubha, and Prabhat Pandey. “Comparative analysis of encryption techniques.” Int Res J Eng Technol 5.03 (2018): 2010-2012.
[21] Rahul Gupta, 2024. Don't Get Caught in the Cloud: How Data Security Posture Management Can Keep Your Cloud Technology Safe, International Journal of Management, IT & Engineering, Vol. 14 Issue 8.
Digital Privacy, Ai, Differential Privacy, Federated Learning, Data Security, Privacy Laws.